Once an afterthought in the implementation of ERP systems, security is now a key concern due to easier access to systems and increased vulnerability. We can help you overcome the typical issues associated with application security.
We start with role and authorisation design and plan ahead of your implementation to ensure the right security is in place to minimise your application vulnerabilities.
We ensure your applications comply with necessary regulations and help your organisation to follow application security best practices.
Audits and access reviews often uncover weaknesses and issues within security and authorisation design. We help you take the necessary actions to remediate identified security risks.
We have years of experience in helping organisations meet external audit requirements and the various compliance standards relating to critical applications and their data - so you'll be in good hands.
As part of implementation, we deliver authorisation designs that help you meet your business needs quicker. This reduces the need for costly and time-consuming post-implementation remediation activities.
Sometimes remediation is unavoidable. When that happens, we quickly identify key areas - thanks to our pragmatic approach to risk management - and ensure the process is fast and focused.
Tom is an experienced SAP security architect with over 10 years’ experience in SAP authorisations. He helps clients define SAP security strategies and policies and procedures, while also supporting large, complex SAP implementations. His expertise across several modules of core SAP, as well as SAP GRC enables him to help clients build low maintenance, yet highly secure application environments.
We can help you quantify the level of security exposure in your application environment. We'll provide a comprehensive security assessment against specific criteria, as defined by the Open Web Application Security Project (OWASP). The review will cover 4 key areas, as outlined below:
Our security experts will perform a full application penetration test to validate current security vulnerabilities.
We'll review encryption, password, system updates, patching and so on to identify further vulnerabilities.
We'll explore access controls including frameworks, SoDs, policies and privileges.
We will complete the review by presenting a comprehensive risk assessment report with remediation recommendations.
With more SAP customers committing to S/4 HANA projects, it’s important to learn the lessons from past ERP implementations. Many large SAP programmes initially ignored key issues surrounding access management, authorisations and security, ...
This guide will help you understand the capabilities of SAP GRC 12.0, as well as the impact of any changes and what the likely update, migration and implementation path might look like. Specifically, it covers: Why should you upgrade to SAP ...