Page 13 - SCP Summit 2020 Solex Handbook
P. 13

SAP Access Violation Management by Greenlight

       One Pager

        Executive Summary                               Challenges & Objectives                                  The Solution
        The SAP Access Violation Management application by  Managing access to enterprise applications is a balancing act.   System Integration Edition:
        Greenlight protects your digital assets across the entire   Granting too much exposes organizations to higher risk but granting   Extends the functionality of the SAP GRC Access Control application
        enterprise by automatically monitoring all business   too little slows business momentum. To make better, more proactive   to all critical business applications, including SAP and third-party
        controls in SAP and non-SAP applications, across all   decisions about access control, you need insight into the financial   applications. It provides real-time SoD risk analysis, compliant user
        users, all transactions, all risks in real-time!   impacts of access risk. The SAP® Access Violation Management   provisioning,  user access reviews, and role management for on-
        With exception-based access violation monitoring and   application by Greenlight can help.               premise, hosted, and cloud-based enterprise applications.
        centralized, standardized  processes, you can automate
        violation identification and review, streamline access-risk   Today, organizations are going beyond traditional methods of   Risk Assessment Edition
                                                                                                                 Is unique in its ability to automatically monitor 100% of transactions
                                                        manual business controls and ad hoc analyses by using integrated
        processes, and cut governance costs.            technology to automate risk identification and assess its impacts on   for violations of business controls across all enterprise applications.
        It provides enterprise wide transparency for internal and   the business. Exception-based monitoring controls and centralized   The risk assessment edition alerts you only when an actual violation
        external auditing. And it covers regulatory pressures                                                    is detected, saving significant time, effort, and costs.
        around financial reporting from the Sarbanes-Oxley Act,   functionality for tracking resolution of those exceptions reduce
        ICFR and security pressures like GDPR among many  manual control efforts and eliminate false positives.   Features
        other regulations.                              Given this new reality, how will your customers:
                                                                                                                  ▪ Summarization of the financial dollar value of access violations
        Target Audiences                                ▪ Enable centralized and standardized processes across business
                                                           applications and IT systems?                           ▪ Alerts only when exceptions occur
        ▪ Chief Financial Officer (CFO), Chief Compliance   ▪ Automate the identification and review of actual access   ▪ Supporting the mitigation of the detected violations
    © 2020 SAP SE or an SAP affiliate company. All rights reserved.
          Officer (CCO), Chief Information Security Officer   violations?
          (CISO), Head of Internal Controls, Chief Audit                                                          ▪ Library of automated segregation-of-duties and other business
                                                                                                                    controls
          Executive                                     ▪ Summarize the financial impact of actual violations?
        SAP Material Codes                              By enabling enterprise-wide access governance and articulating the   Business Benefits
                                                        bottom-line impacts of access risk on your organization, you can
        ▪ System Integration Edition – 7018769, 8007817  drive business changes when traditional manual controls are   ▪ Understand the commercial risk exposure and business impact
                                                        insufficient to mitigate the actual financial exposure of access risks.  ▪ Reduce manual control efforts and eliminate false positives
        ▪ Risk Assessment Edition – 7018770, 8007803
                                                        A certain level of access risk is unavoidable – to eradicate it all   ▪ Centrally track investigation and resolution of access violations
        Contacts
                                                        would limit business productivity. But in many cases, companies put   ▪ Record a complete audit trail of user risk management
        SAP EMEA NORTH – Olav Frijhoff (Head of 3PS)    manually driven and time-consuming controls into place  to mitigate
        Greenlight: – Thomas Gerstner (President EMEA)  risk. With the SAP Access Violation Management application by  ▪ Give users ownership of remediation activities
        (tgerstner@greenlightcorp.com)                  Greenlight, you can see the financial impact of access risk for
                                                        business processes and transactions and enable a risk management   Resources
                                                        strategy that suits your organization.                   ▪ SAP Web Page for Access Violation Mangaement
                                                                                                                 ▪ SAP Solex JAM Site for Greenlight Technologies

                                                                                                                                                                     12

        BigID              BlackLine             DocuSign             Greenlight            NextLabs              OpenText                Syniti               Vistex
   8   9   10   11   12   13   14   15   16   17   18