Organize your SAP User Access Management: prevent exessive user access and realize effortless, continuous compliance reporting by using powerful workflow and automated utilities.
Map customized workflows for the requesting and approving of users and authorizations in your SAP-system.

Effective User Access Management

Maintain compliance and accelerate day to day SAP security administration of user and role change management with a configurable, web-enabled workflow process that incorporates risk analysis, role owner approval and automatic provisioning. Integration with Access Control Analysis helps identify any new segregation of duty issues that are introduced based on requested changes. Requests with risks are routed to appropriate parties for mitigation.
Plain English reports detailing user access, role assignment, and recent changes are automatically generated and pushed to appropriate approvers via an auditable workflow.

Benefits:

  1. Free up IT and security teams by accelerating the day-to-day SAP® security administration tasks and providing time-saving tools for testing and troubleshooting
  2. Cut audit preparation costs by maintaining a state of constant audit readiness; you can dramatically cut the time and costs of preparing for audits
  3. Empower non-technical users by employing the intuitive self-service you can permit/allow non-technical end-users and helpdesk staff

 

Secure emergency user access

Efficient Emergency Access Management: monitor privileged users, such as emergency users, and their accesses in your SAP®-system without gaps. All transactions, system changes and critical activities are recorded in a tamperproof audit record.

Read access logging of HCM data

Deploy a reliable solution that logs read access by privileged users to SAP HCM data and provides detailed information on this.
Empower SAP HCM users to address three critical HR security needs: monitoring and protection of sensitive HR data, a secure “one-step” process for updating files and a built-in data scrambling routine to protect information used outside of production systems.
The result: better management of employee changes and faster time to value for personnel changes.