SAP's AI Copilot Joule: Implications for Finance

340 results

  1. How Accounts Payable Can Improve Fraud Detection with Robotics and Machine Learning

    Panelists: Brian Shannon, Dolphin, and Ingo Czok, Hanse Orga Group Date: Thursday, February 8th Sponsor: Hanse Orga Fraud prevention and compliance are pressing issues for global organizations. Read the transcript to get advice on how to optimize and centralize Accounts Payable and Payments processing to improve compliance and reduce the risk of fraud. By applying…...…
  2. Detect and Prevent Malicious Business Transactions with SAP Fraud Management

    Learn how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents. Key Concept The Serious Fraud Office (SFO), which is a department in the office of the US Attorney General, defines fraud as an act of deception intended for personal gain or…...…
  3. Intelligent Solutions for Payment Fraud Risk Management

    The extensive nature of supply chain networks creates many points of risk. One of such risks, within the procure to pay space is supplier payment fraud. Some examples of procurement fraud are supplier spoofing, business email compromise and spoofing an officer of a company. Procurement fraud is not only becoming more prevalent but is also…
  4. Get Your SAP System Landscape Technically Ready for SAP Assurance and Compliance

    Gain insight into important configuration activities that are imperative for harnessing the capabilities and offerings of SAP Fraud Management and SAP Audit Management. Key Concept SAP Assurance and Compliance software is the latest addition to the SAP GRC product suite. It  seeks to address fraud and audit challenges in the business environment. The product helps…...…
  5. An Integrated Approach to Identifying Security Risks

    As technology becomes more sophisticated, so do the cyberattacks that aim to steal and even manipulate data. In response to this new rise in cybercrime, SAP released SAP Enterprise Threat Detection, a native SAP HANA application that quickly identifies suspicious patterns in log data and generates alerts to notify the appropriate personnel to take action.…
  6. Protect Your SAP Systems from Cyberattacks

    This article looks at how SAP Enterprise Threat Detection addresses organizations’ pressing needs for protecting modern SAP landscapes.
  7. Fraud Concerns Driving Payments Innovation

    In recent years, organizational structures and processes have changed dramatically, presenting new opportunities and challenges for modern CFOs and treasurers. Organizations shifting core business processes online and day-to-day operations to the cloud require payment efficiency and flexibility to stay competitive. As businesses expand globally and increasingly rely on electronic payment methods, the opportunities for fraud…...…
  8. Lessons from Costa Rica’s National Bank Heist: Insights from Realtime North America COO Thomas Neudenberger

    The recent $6 million theft at Costa Rica’s National Bank, involving multiple high-ranking employees, has put a spotlight on the pressing need for enhanced security in the financial sector. This major breach not only exposes the frailties of manual processes and outdated technologies but also underscores the inadequacy of traditional financial controls in the digital…
  9. Securing the Intelligent Enterprise with SAP’s Enterprise Threat Detection

    The heightened global prevalence of cyber threats has amplified the urgency for organizations to move beyond the traditional preventive measures. Organizations now need to adopt more stringent protocols for real-time monitoring, threat detection, and swift response in order to effectively protect their businesses. This article discusses SAP’s Enterprise Threat Detection, a comprehensive offering that enables…
  10. How to Configure SAP Enterprise Threat Detection for Increased Surveillance and Real-Time Analysis of Security Threats

    Mining of important security-related logs has always been a challenge for most enterprises in terms of how to gain appropriate security intelligence from collected data sets in order to forestall malicious attacks from within and outside an enterprise. Kehinde Eseyin shows how to set up the SAP Enterprise Threat Detection system landscape to facilitate log…...…