Integrated Risk Management
Through the application of technology and automation, we'll help you manage your risks efficiently and effectively across the entire enterprise.
Identity and Access Management
We'll help you ensure everybody within your organisation has access to the right systems and data, for the right reasons, and at the right time.
Cyber & Application Security
Our experts will uncover security weaknesses within your security design and business-critical applications. Helping you protect your organisation from both internal and external threats.
About us
A group of passionate individuals with a shared purpose to help the world's leading companies embrace best practices for GRC and risk management.
Turnkey's strategic partner network consists of selected organisations that complement our capabilities.
Corporate Social ResponsibilityCSR
We are committed to being agents for change through our Climate Action Plan, championing diversity in our workplaces, and more.
Get in touch
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Webinars & eBooks
All of Turnkey's webinars, guides and other insights available in one place.
Read the latest insights from our experts on GRC and risk management, covering the latest industry topics.
Press Coverage
See all the publications where Turnkey, our experts and our successes have been noted.
Key events
See the key industry conferences on GRC, SAP security and risk management which we are attending.
Case Studies
Client satisfaction is of the utmost importance to us, and we strive to constantly deliver above expectations, going the extra mile at every opportunity.
8 March 2013

Top 5 Customer Concerns Around Managing Access Risk - Part 5

Last week we discussed lack of visibility of access risks for management and the issues this creates. In this blog, I discuss the fifth and final issue of time and cost of audit, when no automated tools are in place.

Excessive time and cost of audit

Even before an audit, preparing for an audit is time consuming and costly.

Some external auditors will bring their own SoD tools to perform an audit. They will generally charge the client for the use of the tool and the time to set it up. For example, one of our FMCG clients had received a number of negative access audits and was being charged an additional substantive audit fee because the auditors could not place reliance on access controls in the sys.

They recently decided to implement GRC AC to address the issue, and during preparation of the business case, they found the one-off cost of the software purchase will offset the cost of the substantive audit fee.

Our clients who use AC find their auditors are willing to place reliance on the tool and the results. Customers have consequently been able to negotiate reduced audit fees of up to 30%.

Rapid Deployment Solution for AC

Turnkey Consulting Australia are the first in the country to offer a Rapid Deployment Solution (RDS) for GRC Access Control

You can be up and running with Access Risk Analysis and Emergency User Access in as little as 6 weeks for a fixed fee.


About Turnkey 

Turnkey Consulting is helping to make the world a safer place to do business by specialising its expertise across Integrated Risk Management, Identity and Access Management, and Cyber and Application Security. We provide business consulting, technology implementation and managed services to help customers safeguard their application environments - protecting critical ERPs (such as SAP, Oracle and MS Dynamics) and wider enterprise systems.