Segregation of Duties

[52 Matches Found]
Page 1 of 3         1 2 3      
Article icon
by March 15, 2019
Financials – 
SAPinsider and SAP Experts assembled nine popular pieces to provide both strategic and tactical insights for organizations using SAP GRC solutions.

Article icon
Financials – 

Learn how Stanley Black & Decker implemented SAP Access Control to manage and mitigate security risks, improve SoD reporting capabilities, and automate its security provisioning processes. Explore how the company integrated multiple SAP instances onto the application and defined a sustaining model for continued success of GRC initiatives.

 


Article icon
Financials – 

Revlon planned and executed a global SAP security redesign within just a few months. Learn how the company implemented a scalable segregation-of-duties-compliant role architecture in alignment with its GRC ruleset and business processes, and learn tips for managing different project streams efficiently.

 


Article icon
Financials – 

Learn how Mars revamped its SAP security, minimized segregation of duties (SoD) risk, and increased efficiencies around access provisioning. Walk through the redesign of the company’s SAP landscape and the creation of task-based roles that are free of SoD risks and follow a standard naming convention.


Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. December 11, 2017
SAP Professional Journal/Financials – 

Neha Garg explains how to keep mitigation control data integrated, effective, and valid in both SAP Access Control and SAP Process Control.


Article icon
by Suman Puthadi, Associate Architect, SAP Labs India Pvt. Ltd. December 11, 2017
SAP Professional Journal/Financials – 

Suman Puthadi explains the steps for the mass maintenance of mitigation control owners. He also explains the steps for the mass maintenance of risk owners across Access Request Management.


Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. January 12, 2017
SAP Professional Journal/Financials/HR – 

Neha Garg explains what SAP Cloud Identity Access Governance is and what organizations can expect to gain from SAP Cloud Identity Access Governance and its newly released SAP Cloud Identity Access Governance, access analysis service in comparison with SAP Access Control.


Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 16, 2016
SAP Professional Journal/Financials/HR – 

Joshu Madina explains the process of identifying invalid mitigation assignments for user-level mitigations and role-level mitigations. He also provides you with details regarding extending the validity for expired mitigations and deleting invalid mitigation assignments.


Video icon
Financials/SAP Professional Journal – 

Many companies use solutions like SAP Access Control to analyze user access before roles are assigned and then report suspect activity to business owners. In this video, you'll see how leading companies are moving from reporting on these “potential” segregation of duties (SoD) violations to calculating their actual financial exposure by leveraging SAP Access Violation Management.

 


Article icon
by Akansha Gupta, Senior Developer in SAP: Access Control, SAP Labs India Pvt. Ltd. September 28, 2015
SAP Professional Journal/Financials – 

SAP Access Control provides you with the option to create a supplementary rule. The rule gives additional information to prevent a false conflict in a segregation of duties (SoD) risk analysis report. Akansha Gupta outlines the steps you need to complete to enable the supplementary rule.


Video icon
by Vincent Calabrese, Director, KPMG Management Consulting June 29, 2015
Financials/SAP Professional Journal – 

See how to streamline and simplify the Segregation of Duties (SoD) auditing process.


Video icon
by Chris Radkowski, Director of Solution Management, Governance, Risk and Compliance, SAP Labs | Bert Laws, Senior Director, Business Analytic Solutions, SAP Labs LLC June 29, 2015
Financials/SAP Professional Journal – 

Learn about the newest capabilities of SAP Access Control in the cloud.


Article icon
by Jitan Batra, Senior Developer for SAP Access Control and Process Control, SAP Labs India, Pvt. Ltd. June 1, 2015
SAP Professional Journal/Financials – 

Jitan Batra compares the enhanced alerts in Access Control 10.0 and 10.1 with Access Control 5.x releases. From the 10.x release and on alerts are generated only when an access risk is satisfied at the permission level, which eradicates false positive alerts. An example illustrates the enhanced alerts.


Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. | Shilpa Viswanadha, Senior Developer, SAP Labs India Pvt. Ltd. May 1, 2015
SAP Professional Journal/Financials – 
Neha Garg and Shilpa Viswanadha show how to configure different services for using the simplified access request and remediation view in SAP Access Control 10.1 and the advantages of using these two new features.

Video icon
by James Roeske, Co-Founder and Chief Executive Officer, Customer Advisory Group December 30, 2014
SAP Professional Journal/Financials – 
In this video James Roeske explains the process of evaluating your rule set for completeness and accuracy. He shows you how to do a rule set and mitigation control assessment and modernization project using resources you already have.

Video icon
by Ruth Johnson, Senior Advisor and GRC Consultant, Customer Advisory Group December 30, 2014
SAP Professional Journal/Financials – 
In this video Ruth Johnson explains the various options for creating accurate and up-to-date SoD risk analysis reports using the management graph reporting capabilities in SAP Access Control.

Video icon
by Alex Joseph, SAP GRC Practice Manager, itelligence Group November 13, 2014
SAP Professional Journal – 

In this webinar, Alex Joseph of itelligence explains how to get your SAP system clean, how to keep it clean, and how to maintain control of your SAP system with SAP Access Control.

 


Article icon
by Kavitha Nareshetty, SAP GRC Security Senior Consultant (Lead), Capgemini May 22, 2014
SAP Professional Journal – 
SAP Professional Journal – Kavitha Nareshetty explains how you can configure SAP Access Control to allow manual provisioning of non-SAP applications

Quick tips icon
by Meta Hoetjes, SAP Security Expert, CSI-tools December 31, 2013
SAP Professional Journal/Financials – 
Meta Hoetjes defines what access governance is and explains why it is so important for organizations to use good supporting tools for implementing access governance in organizations using SAP systems.

Video icon
by Tracy Levine, SAP Application Consultant, itelligence November 27, 2013
SAP Professional Journal/Financials – 
In this webinar, Tracy Levine, SAP GRC Consultant at itelligence, discusses strategies around surviving an SAP security audit and maintaining compliance objectives long term. Tracy shares her methodology around optimizing your SAP security landscape and utilizing SAP Access Control to prevent reintroduction from risk exposures by taking an audit approach to SAP security.

Page 1 of 3         1 2 3