Search Results

[58 Matches Found]
Page 1 of 3         1 2 3      
Article icon
by Kehinde Eseyin, Security Architect June 14, 2017
SAP Professional Journal/BI/HR – 

Kehinde Eseyin shows how to activate tracing to resolve authorization errors in SAP HANA. You then can troubleshoot authorization errors related to repository role activation, SQL privileges, and analytical privileges.


Article icon
by Kehinde Eseyin, Security Architect February 24, 2017
SAP Professional Journal/Financials – 
Kehinde Eseyin describes the technical architectural design, setup, and implementation of SAP Fiori in the SAP GRC environment as it relates to SAP Access Control, SAP Risk Management, and SAP Process Control applications.

Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the audit execution and follow-up activities while enforcing process control and risk management.


Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the different facets of the internal audit life cycle including audit planning and preparation while enforcing process control and risk management.


Article icon
by Kehinde Eseyin, Security Architect July 11, 2016
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how to configure SAP Audit Management to harness the benefits of risk-based auditing while integrating the system with SAP Process Control and SAP Risk Management.


Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin explains how to configure an SAP Enterprise Threat Detection (SAP ETD) system and set up the SAP NetWeaver ABAP system as a log provider for enhanced log mining, threat detection, improved system security, and forensic investigation.


Article icon
by Kehinde Eseyin, Security Architect January 4, 2016
SAP Professional Journal/Financials – 

In part 2 of his series, Kehinde Eseyin corrects assumptions about the SAP Access Control system that are not necessarily true and provides guidance on how to meet specific complex business requirements during an implementation project, including maintenance and support activities.


Article icon
by Kehinde Eseyin, Security Architect December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
SAP Professional Journal – 
Kehinde Eseyin acquaints you with the concepts, best practices, optimal settings, tools, and recommendations that are invaluable for SAP HANA database backup and restore operations.

Article icon
by Kehinde Eseyin, Security Architect July 20, 2015
SAP Professional Journal/Financials – 

Kehinde Eseyin provides concise descriptions of associated risks with security vulnerabilities in the SAP HANA landscape and offers recommendations to prevent the identified risks from materializing. The preventive measures he describes provide information about what auditors and auditees should be interested in when planning and performing a technical review of an SAP HANA database system.


Article icon
Financials/SAP Professional Journal – 
Not having acute knowledge of the complexity of the SAP HANA system landscape is a recipe for under-planning and under-scoping an audit. Therefore, an audit questionnaire is invaluable for realistic audit scoping and consequently successful execution of the audit work. Kehinde Eseyin walks you through 30 questions that help you review your SAP HANA technical system.

Article icon
by Kehinde Eseyin, Security Architect November 19, 2014
SAP Professional Journal – 
Kehinde Eseyin shows how to configure, create, and process ad hoc risk escalations using SAP Risk Management 10.1.

Article icon
SAP Professional Journal – 
Kehinde Eseyin shows how implementing SAP Process Control 10.1’s disclosure survey in your business environment enhances transparency, documentation, and adherence to disclosure requirements.

Article icon
SAP Professional Journal – 
Kehinde Eseyin explains the basic configuration activities required to use a risk-scoring analysis method productively in an SAP Risk Management system.

Article icon
SAP Professional Journal – 
Kehinde Eseyin shows you key configurations and customization steps to help you maximize the capabilities and offerings of SAP Fraud Management and SAP Audit Management.

Article icon
SAP Professional Journal – 
Kehinde Eseyin shows you how to use standard tools for the data sources and business rules logistics process in SAP Process Control 10.1.

Article icon
SAP Professional Journal – 

Kehinde Eseyin shows how to enhance user risk analysis and user risk simulation analysis by leveraging a custom user group based on user master data (transaction code SU01) attributes. 


Article icon
by Kehinde Eseyin, Security Architect December 18, 2013
BI/Financials/SAP Professional Journal – 

Kehinde Eseyin explains how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.

 


In Depth
SAP Professional Journal/Financials – 

In this SAPexperts In Depth report, Kehinde Eseyin, a senior SAP GRC consultant at Turnkey Consulting Ltd., explains the top strategies and best practices that you can adopt to gain insight into different control objectives as they relate to the audit of SAP Access Control 10.0.

 


Article icon
by Kehinde Eseyin, Security Architect May 30, 2013
SAP Professional Journal/Financials – 
A typical organization needs to manage multiple rulesets for various reasons ranging from business process control structure to organizational structure make-up. SAP Access Control allows you to choose from more than one ruleset to perform risk analysis automatically. Learn how to use a business rule to influence the ruleset that is automatically applied to an access request based on defined attributes.

Page 1 of 3         1 2 3