Page 13 - SCP Summit 2020 Solex Handbook
P. 13
SAP Access Violation Management by Greenlight
One Pager
Executive Summary Challenges & Objectives The Solution
The SAP Access Violation Management application by Managing access to enterprise applications is a balancing act. System Integration Edition:
Greenlight protects your digital assets across the entire Granting too much exposes organizations to higher risk but granting Extends the functionality of the SAP GRC Access Control application
enterprise by automatically monitoring all business too little slows business momentum. To make better, more proactive to all critical business applications, including SAP and third-party
controls in SAP and non-SAP applications, across all decisions about access control, you need insight into the financial applications. It provides real-time SoD risk analysis, compliant user
users, all transactions, all risks in real-time! impacts of access risk. The SAP® Access Violation Management provisioning, user access reviews, and role management for on-
With exception-based access violation monitoring and application by Greenlight can help. premise, hosted, and cloud-based enterprise applications.
centralized, standardized processes, you can automate
violation identification and review, streamline access-risk Today, organizations are going beyond traditional methods of Risk Assessment Edition
Is unique in its ability to automatically monitor 100% of transactions
manual business controls and ad hoc analyses by using integrated
processes, and cut governance costs. technology to automate risk identification and assess its impacts on for violations of business controls across all enterprise applications.
It provides enterprise wide transparency for internal and the business. Exception-based monitoring controls and centralized The risk assessment edition alerts you only when an actual violation
external auditing. And it covers regulatory pressures is detected, saving significant time, effort, and costs.
around financial reporting from the Sarbanes-Oxley Act, functionality for tracking resolution of those exceptions reduce
ICFR and security pressures like GDPR among many manual control efforts and eliminate false positives. Features
other regulations. Given this new reality, how will your customers:
▪ Summarization of the financial dollar value of access violations
Target Audiences ▪ Enable centralized and standardized processes across business
applications and IT systems? ▪ Alerts only when exceptions occur
▪ Chief Financial Officer (CFO), Chief Compliance ▪ Automate the identification and review of actual access ▪ Supporting the mitigation of the detected violations
© 2020 SAP SE or an SAP affiliate company. All rights reserved.
Officer (CCO), Chief Information Security Officer violations?
(CISO), Head of Internal Controls, Chief Audit ▪ Library of automated segregation-of-duties and other business
controls
Executive ▪ Summarize the financial impact of actual violations?
SAP Material Codes By enabling enterprise-wide access governance and articulating the Business Benefits
bottom-line impacts of access risk on your organization, you can
▪ System Integration Edition – 7018769, 8007817 drive business changes when traditional manual controls are ▪ Understand the commercial risk exposure and business impact
insufficient to mitigate the actual financial exposure of access risks. ▪ Reduce manual control efforts and eliminate false positives
▪ Risk Assessment Edition – 7018770, 8007803
A certain level of access risk is unavoidable – to eradicate it all ▪ Centrally track investigation and resolution of access violations
Contacts
would limit business productivity. But in many cases, companies put ▪ Record a complete audit trail of user risk management
SAP EMEA NORTH – Olav Frijhoff (Head of 3PS) manually driven and time-consuming controls into place to mitigate
Greenlight: – Thomas Gerstner (President EMEA) risk. With the SAP Access Violation Management application by ▪ Give users ownership of remediation activities
(tgerstner@greenlightcorp.com) Greenlight, you can see the financial impact of access risk for
business processes and transactions and enable a risk management Resources
strategy that suits your organization. ▪ SAP Web Page for Access Violation Mangaement
▪ SAP Solex JAM Site for Greenlight Technologies
12
BigID BlackLine DocuSign Greenlight NextLabs OpenText Syniti Vistex