SAP Fraud Management


What Is SAP Fraud Management?

Fraud can be devastating to a business, leading to financial and legal consequences. Fraud management seeks to identify potential areas for fraud across business processes both internally and externally with partners. SAP Fraud Management looks at potential for fraud related to SAP customers. The SAP tool related to fraud management is called SAP Business Integrity Screening.

What Is SAP Fraud Management?

Fraud can be devastating to a business, leading to financial and legal consequences. Fraud management seeks to identify potential areas for fraud across business processes both internally and externally with partners. SAP Fraud Management looks at potential for fraud related to SAP customers. The SAP tool related to fraud management is called SAP Business Integrity Screening.

Governance, Risk, and Compliance (GRC) teams are often tasked with managing fraud, and they deploy many standard GRC strategies to deal with fraud risk. For example, they may put fraud controls into place as well as collect process and transactional data for fraud analysis. Fraud management often integrates into other areas of GRC, such as the broader Risk Management.

Tools for fraud management look to centralize fraud risk data and automate fraud screening and analysis. Fraud management tools may have the following capabilities, among others:

  • Exception detection and compliance checks
  • Detection strategy calibration
  • Exception-based scenario analysis
  • Business partner screening
  • Automated workflows and notification
  • Continuous Controls Monitoring (CCM)
  • Integrity screening.

Many risk detection and management tools also feature fraud capabilities. For example, Appsian Security’s threat detection and response solutions seek to identify fraud potential from transactional data. Similarly, Fastpath offers tools for risk quantification and transactional controls that can help manage fraud risks. A company like RSM can help organizations establish fraud management programs, including best practices for fraud prevention and detection.

Key Considerations for SAP Fraud Management

  • GRC and fraud management teams are stretched — in our most recent research into the state of the GRC market, we found they have more responsibility but aren’t growing along with that responsibility. The leading companies in our GRC research are utilizing automation to optimize their GRC resources. For fraud management, this could mean automating controls and detection.
  • Fraud risk analysis can also be done at the user access level. For example, Lundbeck implemented a Security Weaver tool for segregation of duties analysis to identify the potential for users to commit fraud. Consider how you can integrate fraud management across GRC and security functions.
  • Centralize your fraud risk data. You are monitoring areas throughout the business for fraud risk. To best manage that fraud risk, you need a single view of where fraud potential exists and which risk holds the most potential harm for the company. This can help your organization prioritize which threats need to be addressed most imminently.

191 results

  1. Access Controls: Protect Your Company From Fraud With The 5 W’s

    Reading time: 1 min

    Access Controls: Protect Your Company from Fraud with the 5 W’s
  2. Spotlight: Is Your SAP Environment Vulnerable to Heartbleed?

    Reading time: 5 mins

    SAP Professional JournalAn experienced CTO fields some questions about Heartbleed’s impact on SAP systems. The impact of being vulnerable to Heartbleed is that all past and future network traffic could be decrypted, so changing user passwords and SSL certificates is a must. However, the first step should be to update the software and the OpenSSL…...…
  3. Vodafone Group Dials Up Process Controls

    Reading time: 7 mins

    As Vodafone Group expanded globally, it required more stringent process controls to ensure the more than 100,000 users who touched their various business processes could act efficiently. The company sought SAP Process Control to automate its process controls and expand the control footprint by process, systems, and geography. Discover how the company was able to…
  4. Gain Business Insights from Highly Connected Data Through SAP HANA Graph

    Reading time: 4 mins

    Data has been universally recognized as one of the most important pillars of the modern knowledge world. Big data technologies have changed the way data is stored and processed. Modern data visualization tools enable businesses to derive better insights from this data. Big data technologies and appliance-based database systems ensure optimized data storage and retrieval.…
  5. Fraud Monitor For SAP: Making Your Payments Safer

    Reading time: 1 min

    See how you can make your payment transactions more secure by identifying suspicious payments in time and taking appropriate action.
  6. VAT Changes Coming in 2010: Are You Ready?

    Reading time: 16 mins

    Because of the continuous extension of the European Union (EU) and the lack of alignment of local Value Added Tax (VAT) rules, VAT-related fraud is increasing and has resulted in unequal competition among suppliers in different countries. To reduce fraud and give suppliers equal treatment regardless of their country, VAT rules for services between EU…...…
  7. Proven Techniques and Strategies to Fortify Your SAP Landscape from Cybersecurity Threats

    Reading time: 19 mins

    Modern cybersecurity threats are growing in complexity, scale, and speed. In this live Q&A, SAPinsider GRC 2017 speaker Peter Hobson dove into cybersecurity as it relates to your SAP landscape. Read the transcript to get expert answers to your questions on topics like role design, controls, vulnerability scans, supporting tools, and more. What type of…...…
  8. Simple Explanations of Key Artificial Intelligence (AI) Terminology

    Reading time: 7 mins

    This alphabetical guide to key artificial intelligence (AI) terminology can help you put AI technology to work.  This content is available to (General or Premium) members. Sign in or Join for free! Sign In Become a Member
  9. Putting Ethics into Practice with Your SAP Security Strategy

    Putting Ethics into Practice with Your SAP Security Strategy

    Reading time: 13 mins

    As artificial intelligence (AI) moves toward becoming a standard technology in daily business, companies increasingly need to balance the potential risks posed by AI-based software with the pursuit of growth and success. This article provides guidance on how to mitigate the risks posed by AI software by expanding your existing security standards with a clearly…
  10. Monitor Sensitive Fields with R/3’s Dual Control Functionality

    Reading time: 10 mins

    The standard SAP dual control principle imposes segregation of duties for changes to sensitive fields while allowing changes to be made by one person to non-sensitive fields. Key Concept Dual control functionality forces changes made to sensitive fields in customer and vendor master records always to be checked by another authorized employee. Even if two…...…