Access Control

[129 Matches Found]
Page 1 of 7         1 2 3 4 5 6 7      
Article icon
Financials – 

Learn how Stanley Black & Decker implemented SAP Access Control to manage and mitigate security risks, improve SoD reporting capabilities, and automate its security provisioning processes. Explore how the company integrated multiple SAP instances onto the application and defined a sustaining model for continued success of GRC initiatives.

 


Article icon
Financials – 

Learn how Mars revamped its SAP security, minimized segregation of duties (SoD) risk, and increased efficiencies around access provisioning. Walk through the redesign of the company’s SAP landscape and the creation of task-based roles that are free of SoD risks and follow a standard naming convention.


Article icon
by Alka Paradkar , Johnson & Johnson | Neena Nash, Johnson & Johnson March 10, 2019
Financials – 

Learn how Johnson & Johnson deployed a global SAP Access Control blueprint for a highly decentralized environment. Examine challenges that were overcome and explore how the company replaced the traditional support model with a managed services model aimed at continuous process improvements to stabilize the access control program.


Article icon
Financials – 

Examine how Eli Lilly and Company ensures the reliability and auditability of its process control system. Learn how it defines and deploys continuous control monitoring and the process flow it uses to identify issues.


Article icon
Financials – 
Learn how Tyson Foods maintains Sarbanes-Oxley (SOX) compliance by taking full advantage of its SAP governance, risk, and compliance (GRC) solutions to anticipate possible controls violations before they occur. See how the company proactively performs rigorous controls self-assessments using SAP Process Control.

Article icon
Financials – 
Mars transitioned its largest SAP user population to a new global security architecture and governance process. See how Mars completed the phases of the security redesign and learn about the key tasks it performed to ensure proper security role maintenance and user assignment.

Article icon
Financials – 

Learn how ConocoPhillips uses SAP Access Control tools to conduct periodic reviews, gather transaction usage statistics, and determine who is accessing its SAP systems. Find out how the company integrated the access control suite, access request management, and business role management functionality to make user access reviews fully operational in version 10.x.


Article icon
Financials – 
Like many companies, Armstrong Flooring has been through many growth cycles, and its SAP security role environment was a conglomeration of poorly built old roles and properly built new roles. It faced challenges such as managing the roles, dealing with multiple naming conventions, understanding what users needed to do their jobs, and staying SOX compliant. Attend this session to learn how Armstrong Flooring undertook a full role rebuild, leveraging usage reports from SAP Access Control and implementing a task-based architecture.

Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 29, 2017
SAP Professional Journal/Financials – 

Joshu Madina explains the process of Firefighter ID review request creation, assignment reviews, and removal of the Firefighter ID assignments from firefighters. He also provides you with details regarding setting up the workflows for the Firefighter ID reviews.


Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. December 11, 2017
SAP Professional Journal/Financials – 

Neha Garg explains how to keep mitigation control data integrated, effective, and valid in both SAP Access Control and SAP Process Control.


Article icon
by Suman Puthadi, Associate Architect, SAP Labs India Pvt. Ltd. December 11, 2017
SAP Professional Journal/Financials – 

Suman Puthadi explains the steps for the mass maintenance of mitigation control owners. He also explains the steps for the mass maintenance of risk owners across Access Request Management.


Article icon
by Gitu Bijlani, Senior Developer, SAP Labs India Pvt. Ltd. December 4, 2017
SAP Professional Journal/Financials – 

Gitu Bijlani describes a Business Add-In (BAdI) for the Repository object synchronization program. She also provides use-case details about how to use this BAdI.


Article icon
by Vinay Gupta, Senior Software Engineer, SAP Labs India Pvt. Ltd. October 23, 2017
SAP Professional Journal/Financials/HR – 

Ticketing functionality enables role designers to track all role changes using ticket numbers. After you enable ticketing functionality, when a role designer changes a role, a pop-up prompts the designer to enter a ticket number. This ticket number is used in all phases of role methodology, role copy, and mass maintenance. A new tab, Ticket Number, has been added to the Additional Details tab of the role. Vinay Gupta describes this new feature that was introduced in SAP Access Control 10.1.


Article icon
SAP Professional Journal/BI/Financials/HR/SCM – 

Hernan Huwyler goes over the particular requirements for reviewing the user and database access in your SAP system to prepare for the new General Data Protection Regulation (GDPR) in the European Union. Controls should be reinforced on user and database rights to access tables with personal information. Documentation, validation, and coordination should also be more comprehensive. 


Article icon
by Vinay Gupta, Senior Software Engineer, SAP Labs India Pvt. Ltd. July 6, 2017
SAP Professional Journal – 

Role administrators and designers need the ability to update a business role to add or remove a technical role association of a business role while still leaving the approved or active version of the business role to use in Access Request Management and Access Risk Analysis. Business role versioning provides the flexibility to provision an approved version of a business role in Access Request Management. In business role versioning, only the addition and the removal of roles are available for versioning. 


Article icon
by Nibha Kumari, SAP Security Expert, Cintas Corporation | Gary Prewett, Security Practice Lead, NIMBL March 14, 2017
SAP Professional Journal/Financials/SCM – 

Segregation of duties (SoD) risks will not be detected by an out-of-the box SAP system rule set if your organization implements Master Data Governance (MDG).
Nibha Kumari and Gary PrewettIf show how to get a complete picture of SoD risks by modifying the rule set to detect cross-system risks associated with material, customer, and vendor master data maintenance in the MDG system.


Article icon
by Kehinde Eseyin, Security Architect February 24, 2017
SAP Professional Journal/Financials – 
Kehinde Eseyin describes the technical architectural design, setup, and implementation of SAP Fiori in the SAP GRC environment as it relates to SAP Access Control, SAP Risk Management, and SAP Process Control applications.

Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. January 12, 2017
SAP Professional Journal/Financials/HR – 

Neha Garg explains what SAP Cloud Identity Access Governance is and what organizations can expect to gain from SAP Cloud Identity Access Governance and its newly released SAP Cloud Identity Access Governance, access analysis service in comparison with SAP Access Control.


Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 16, 2016
SAP Professional Journal/Financials/HR – 

Joshu Madina explains the process of identifying invalid mitigation assignments for user-level mitigations and role-level mitigations. He also provides you with details regarding extending the validity for expired mitigations and deleting invalid mitigation assignments.


Video icon
Financials/SAP Professional Journal – 

Many companies use solutions like SAP Access Control to analyze user access before roles are assigned and then report suspect activity to business owners. In this video, you'll see how leading companies are moving from reporting on these “potential” segregation of duties (SoD) violations to calculating their actual financial exposure by leveraging SAP Access Violation Management.

 


Page 1 of 7         1 2 3 4 5 6 7