Integrated Risk Management
Through the application of technology and automation, we'll help you manage your risks efficiently and effectively across the entire enterprise.
Identity and Access Management
We'll help you ensure everybody within your organisation has access to the right systems and data, for the right reasons, and at the right time.
Cyber & Application Security
Our experts will uncover security weaknesses within your security design and business-critical applications. Helping you protect your organisation from both internal and external threats.
About us
A group of passionate individuals with a shared purpose to help the world's leading companies embrace best practices for GRC and risk management.
Partners
Turnkey's strategic partner network consists of selected organisations that complement our capabilities.
Corporate Social ResponsibilityCSR
We are committed to being agents for change through our Climate Action Plan, championing diversity in our workplaces, and more.
Get in touch
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Careers
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Webinars & eBooks
All of Turnkey's webinars, guides and other insights available in one place.
Blogs
Read the latest insights from our experts on GRC and risk management, covering the latest industry topics.
Press Coverage
See all the publications where Turnkey, our experts and our successes have been noted.
Key events
See the key industry conferences on GRC, SAP security and risk management which we are attending.
Case Studies
Client satisfaction is of the utmost importance to us, and we strive to constantly deliver above expectations, going the extra mile at every opportunity.
FAQs
We've put together a comprehensive list of frequently asked questions - along with our responses - to the most common GRC and SAP security issues.
23 October 2015

Access Control 5.3 End Of Life - Time To Upgrade, Or Do You Just Keep The Lights On?

Access Control 5.3 is due to exit “Mainstream Maintenance” and enter Extended Support at the end of 2015. Many organisations will find themselves in a situation of “end of life” with unsupported applications in various states. There is always the view that if it isn’t broken, don’t fix it. If you’re happy with only “keeping the lights on” without doing anything different, then there’s no immediate action.door-access-cheshire-min

However if you have plans to upgrade or patch your existing SAP systems, then you may encounter problems such as GRC systems no longer reporting access violations, or missing out on particular FireFighter functionality. So what should you do?

  • Examine the current SAP roadmap & upgrade plans for the GRC landscape
  • Explore the migration path
  • Decide whether it is worth upgrading
  • Look at the benefits:
  1. Enhanced Risk Analysis, User Interfaces and reporting capabilities
  2. More logging available in the FireFighter scenarios giving you much tighter controls
  3. Inherent workflow capabilities within FireFighter, smoothing the audit of emergency access
  4. A powerful and flexible workflow engine allowing more complex and realistic approval procedures for GRC master data and automated provisioning
  5. More intuitive User Interface is providing much greater personal control
  6. Improved Transport Management, enabling you to manage changes within GRC more efficiently and greater compliance than previous versions
  7. Object level security providing proper robust security and authorisations capability
  • Think about the wider picture
  • Ensure that the project is not seen as a generic upgrade
  • Keep up with technology

About Turnkey 

Turnkey Consulting is helping to make the world a safer place to do business by specialising its expertise across Integrated Risk Management, Identity and Access Management, and Cyber and Application Security. We provide business consulting, technology implementation and managed services to help customers safeguard their application environments - protecting critical ERPs (such as SAP, Oracle and MS Dynamics) and wider enterprise systems.