Data-Centric SAP Security
Organizations realize that the contextual attributes related to data access can best determine risk. Where is a user coming from? What device are they accessing from? Are they accessing a data field that may be especially sensitive (ex. salary info, direct deposit, social security, etc.)? Are they editing a data field in a problematic manner (ex. increase PO amount, discounting, add vendor without documentation, editing Master Data, etc.)? Managing and enforcing business policies designed to prevent fraud and theft quickly become inadequate when provisioning static roles is the primary strategy for maintaining governance, risk, and compliance (GRC.)
View this webinar to understand the myriad of business risks that exist in SAP ERP systems, and how a data-centric strategy that includes attribute-based access controls, fine-grained security, and real-time analytics can greatly strengthen your GRC strategies.
– Pitfalls of relying on static roles and the myriad of business risks that still remain
– How you can implement a strategy that tightly aligns context, data, and level of risk to ultimately determine user access
– How to streamline and centrally manage solutions designed to prevent data leakage (ex. Data Masking)
– How using real-time, fine-grained analytics can accelerate how you identify, alert, and remediate business policy violations BEFORE the violation becomes costly