Once an afterthought in the implementation of ERP systems, security is now a key concern due to easier access to systems and increased vulnerability. We can help you overcome the typical issues associated with application security.
We start with role and authorisation design and plan ahead of your implementation to ensure the right security is in place to minimise your application vulnerabilities.
We ensure your applications comply with necessary regulations and help your organisation to follow application security best practices.
Audits and access reviews often uncover weaknesses and issues within security and authorisation design. We help you take the necessary actions to remediate identified security risks.
We have years of experience in helping organisations meet external audit requirements and the various compliance standards relating to critical applications and their data - so you'll be in good hands.
As part of implementation, we deliver authorisation designs that help you meet your business needs quicker. This reduces the need for costly and time-consuming post-implementation remediation activities.
Sometimes remediation is unavoidable. When that happens, we quickly identify key areas - thanks to our pragmatic approach to risk management - and ensure the process is fast and focused.
Tom is an experienced SAP security architect with over 10 years’ experience in SAP authorisations. He helps clients define SAP security strategies and policies and procedures, while also supporting large, complex SAP implementations. His expertise across several modules of core SAP, as well as SAP GRC enables him to help clients build low maintenance, yet highly secure application environments.
In this 5-10 day process, we'll help you quantify the level of security exposure in your application environment. We are able to review all aspects of application security, providing a comprehensive security assessment or a focused review on specific areas. The review scope covers the following key areas:
SAP Application Security hardening (e.g. password parameters, default users, client settings, etc…) and SoD and sensitive access
User and role administration processes and associated controls; SAP patching procedures
How you manage change and continuous improvement, while ensuring security is covered in all developments
Review of the tools currently available to SAP security and the controls function
With more SAP customers committing to S/4 HANA projects, it’s important to learn the lessons from past ERP implementations. Many large SAP programmes initially ignored key issues surrounding access management, authorisations and security, ...
This guide will help you understand the capabilities of SAP GRC 12.0, as well as the impact of any changes and what the likely update, migration and implementation path might look like. Specifically, it covers: Why should you upgrade to SAP ...