SlideShare a Scribd company logo
1 of 20
Automation and Security
Your Presenters
Pat Cameron
Director of Automation Technology
HelpSystems
HelpSystems. All rights reserved.
Agenda
1. Security Headaches
2. Types of control
3. Reporting and documentation
4. Disaster recovery
5. Q&A
Failed audit
S E C U R I T Y A N D A U D I T I N G W I T H S K Y B O T S C H E D U L E R4
Downtime
Security breach
S E C U R I T Y A N D A U D I T I N G W I T H S K Y B O T S C H E D U L E R6
Limits access to systems/applications
Limits access to application passwords
Limits access to databases
Documents all tasks/workflows
Records all changes
Records exceptions
Records date and time of execution
Automation enhances security
Controls based on environments (test vs. production)
Controls based on application
Controls based on job description
Controls who has access to application passwords
Controls timing of workflow/task execution
Types of Control
9
• Role-based security
• Access to specific agents
• Access to specific jobs
• Change, Execute, View, Exclude
• Base roles on department, division, location or customer
• Interface with Active Directory or LDAP server
Security options
S E C U R I T Y A N D A U D I T I N G W I T H S K Y B O T S C H E D U L E R
Automated Password Resets
Limit Access to Users
Limit tasks to view only or execute only
Limit access to specific tasks/workflows
All activities logged
Automated user on-boarding/off-
boarding
Use Case - Automated User Management
System penetration testing
Use Case - Automated System Access Testing
Production Control for all objects
Limited access to services accounts
Limited access to passwords
Limited access to SFTP systems
Export/Import objects to production
Use Case - Limited access to Production Systems
All actions tracked by date, time, user
Aggregate audit data for reporting
Report on system configuration changes
Active Directory User Audit Reports
Use Case –Auditing
Audit Reports
All job steps documented
Graphical workflow view
Changes tracked immediately
No need for tracking on spreadsheets
Use Case - Self-documenting
System changes
Job errors, late starts, overruns
Audit reports of changes to any object
Exception Reports
17
• Logs every database change
• Record changed
• Field changed
• Date and time of change
• User making the change
• Original and new value
• Server History
• Reports
• Audit History Report
• Job History Report
• Agent Event History Report
• Security Report
Audit records and reports
S E C U R I T Y A N D A U D I T I N G W I T H S K Y B O T S C H E D U L E R
Cluster environment supported
High Availability option available
Disaster Recovery
HelpSystems. All rights reserved.
Questions and Answers
Thank You for Attending!
Next steps:
Download FREE trial
Set up FREE automation consultation
Website:
http://www.helpsystems.com/automate
Telephone:
US Sales: 800-328-1000
Outside US: +44 (0) 870.120.3148
Support: 952-933-0609
Technical Experts:
richard.schoen@helpsystems.com
pat.cameron@helpsystems.com

More Related Content

What's hot

Webinar: Salesforce Customization using Visualforce and Lightning Component F...
Webinar: Salesforce Customization using Visualforce and Lightning Component F...Webinar: Salesforce Customization using Visualforce and Lightning Component F...
Webinar: Salesforce Customization using Visualforce and Lightning Component F...APPSeCONNECT
 
Webinar: Embracing REST APIs through APPSeCONNECT
Webinar: Embracing REST APIs through APPSeCONNECTWebinar: Embracing REST APIs through APPSeCONNECT
Webinar: Embracing REST APIs through APPSeCONNECTAPPSeCONNECT
 
Application Performance Management - Solving the Performance Puzzle
Application Performance Management - Solving the Performance PuzzleApplication Performance Management - Solving the Performance Puzzle
Application Performance Management - Solving the Performance PuzzleLDragich
 
UiPath Meetup Service now + mainframe and legacy final
UiPath Meetup Service now + mainframe and legacy finalUiPath Meetup Service now + mainframe and legacy final
UiPath Meetup Service now + mainframe and legacy finalUiPath
 
OpenSpan Proof of Concept use case study
OpenSpan Proof of Concept use case studyOpenSpan Proof of Concept use case study
OpenSpan Proof of Concept use case studyFrank Wagman
 
Application usage monitoring with SysKit
Application usage monitoring with SysKitApplication usage monitoring with SysKit
Application usage monitoring with SysKitSysKit Ltd
 
Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration PresentationJames Garrett
 
Power Automate/ Flow patterns tips and tricks after 3 years with Doctor Flow
Power Automate/ Flow patterns tips and tricks after 3 years with Doctor FlowPower Automate/ Flow patterns tips and tricks after 3 years with Doctor Flow
Power Automate/ Flow patterns tips and tricks after 3 years with Doctor Flowserge luca
 
Webinar: Out of the Box Features of an iPaaS - Cloud Integration Platform as ...
Webinar: Out of the Box Features of an iPaaS - Cloud Integration Platform as ...Webinar: Out of the Box Features of an iPaaS - Cloud Integration Platform as ...
Webinar: Out of the Box Features of an iPaaS - Cloud Integration Platform as ...APPSeCONNECT
 
Teams Provisioning with Power Automate and the Microsoft Graph
Teams Provisioning with Power Automate and the Microsoft GraphTeams Provisioning with Power Automate and the Microsoft Graph
Teams Provisioning with Power Automate and the Microsoft Graphfastlane66
 
Login pi datasheet new
Login pi datasheet newLogin pi datasheet new
Login pi datasheet newMichael Wang
 
Why we love workflow automation tools
Why we love workflow automation tools Why we love workflow automation tools
Why we love workflow automation tools Plugleads
 
Automating The Audit Function Presentation
Automating The Audit Function PresentationAutomating The Audit Function Presentation
Automating The Audit Function PresentationVernon Benjamin
 
Server and infrastructure monitoring from a single console
Server and infrastructure monitoring from a single consoleServer and infrastructure monitoring from a single console
Server and infrastructure monitoring from a single consoleManageEngine, Zoho Corporation
 
AWS Customer Presentation - TapInSystems
AWS Customer Presentation - TapInSystemsAWS Customer Presentation - TapInSystems
AWS Customer Presentation - TapInSystemsAmazon Web Services
 
Webinar: The Power of iPaaS in Business Process Automation in the Digital Age
Webinar: The Power of iPaaS in Business Process Automation in the Digital AgeWebinar: The Power of iPaaS in Business Process Automation in the Digital Age
Webinar: The Power of iPaaS in Business Process Automation in the Digital AgeAPPSeCONNECT
 

What's hot (20)

Webinar: Salesforce Customization using Visualforce and Lightning Component F...
Webinar: Salesforce Customization using Visualforce and Lightning Component F...Webinar: Salesforce Customization using Visualforce and Lightning Component F...
Webinar: Salesforce Customization using Visualforce and Lightning Component F...
 
Webinar: Embracing REST APIs through APPSeCONNECT
Webinar: Embracing REST APIs through APPSeCONNECTWebinar: Embracing REST APIs through APPSeCONNECT
Webinar: Embracing REST APIs through APPSeCONNECT
 
Application Performance Management - Solving the Performance Puzzle
Application Performance Management - Solving the Performance PuzzleApplication Performance Management - Solving the Performance Puzzle
Application Performance Management - Solving the Performance Puzzle
 
OpenSpan POC
OpenSpan POCOpenSpan POC
OpenSpan POC
 
UiPath Meetup Service now + mainframe and legacy final
UiPath Meetup Service now + mainframe and legacy finalUiPath Meetup Service now + mainframe and legacy final
UiPath Meetup Service now + mainframe and legacy final
 
OpenSpan Proof of Concept use case study
OpenSpan Proof of Concept use case studyOpenSpan Proof of Concept use case study
OpenSpan Proof of Concept use case study
 
Application usage monitoring with SysKit
Application usage monitoring with SysKitApplication usage monitoring with SysKit
Application usage monitoring with SysKit
 
Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration Presentation
 
IT Operations Management with OpManager
IT Operations Management with OpManagerIT Operations Management with OpManager
IT Operations Management with OpManager
 
Power Automate/ Flow patterns tips and tricks after 3 years with Doctor Flow
Power Automate/ Flow patterns tips and tricks after 3 years with Doctor FlowPower Automate/ Flow patterns tips and tricks after 3 years with Doctor Flow
Power Automate/ Flow patterns tips and tricks after 3 years with Doctor Flow
 
Webinar: Out of the Box Features of an iPaaS - Cloud Integration Platform as ...
Webinar: Out of the Box Features of an iPaaS - Cloud Integration Platform as ...Webinar: Out of the Box Features of an iPaaS - Cloud Integration Platform as ...
Webinar: Out of the Box Features of an iPaaS - Cloud Integration Platform as ...
 
Teams Provisioning with Power Automate and the Microsoft Graph
Teams Provisioning with Power Automate and the Microsoft GraphTeams Provisioning with Power Automate and the Microsoft Graph
Teams Provisioning with Power Automate and the Microsoft Graph
 
Login pi datasheet new
Login pi datasheet newLogin pi datasheet new
Login pi datasheet new
 
Why we love workflow automation tools
Why we love workflow automation tools Why we love workflow automation tools
Why we love workflow automation tools
 
Automic Support Tips and Tricks
Automic Support Tips and TricksAutomic Support Tips and Tricks
Automic Support Tips and Tricks
 
Automating The Audit Function Presentation
Automating The Audit Function PresentationAutomating The Audit Function Presentation
Automating The Audit Function Presentation
 
Server and infrastructure monitoring from a single console
Server and infrastructure monitoring from a single consoleServer and infrastructure monitoring from a single console
Server and infrastructure monitoring from a single console
 
AWS Customer Presentation - TapInSystems
AWS Customer Presentation - TapInSystemsAWS Customer Presentation - TapInSystems
AWS Customer Presentation - TapInSystems
 
Servicedesk plus 8 Overview
Servicedesk plus 8 OverviewServicedesk plus 8 Overview
Servicedesk plus 8 Overview
 
Webinar: The Power of iPaaS in Business Process Automation in the Digital Age
Webinar: The Power of iPaaS in Business Process Automation in the Digital AgeWebinar: The Power of iPaaS in Business Process Automation in the Digital Age
Webinar: The Power of iPaaS in Business Process Automation in the Digital Age
 

Similar to How to Control Your Data and Stay Compliant with Robotic Process Automation

Operations_Security - Richard Mosher
Operations_Security - Richard MosherOperations_Security - Richard Mosher
Operations_Security - Richard Mosheramiable_indian
 
System Quality Attributes for Software Architecture
System Quality Attributes for Software ArchitectureSystem Quality Attributes for Software Architecture
System Quality Attributes for Software ArchitectureAdnan Masood
 
Document Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateDocument Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateJeff Thomas
 
Neotys PAC 2018 - Gayatree Nalwadad
Neotys PAC 2018 - Gayatree NalwadadNeotys PAC 2018 - Gayatree Nalwadad
Neotys PAC 2018 - Gayatree NalwadadNeotys_Partner
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity LeverKnoldus Inc.
 
Effectively Manage Counterfeit Parts with a Quality Solution
Effectively Manage Counterfeit Parts with a Quality SolutionEffectively Manage Counterfeit Parts with a Quality Solution
Effectively Manage Counterfeit Parts with a Quality SolutionTIP Technologies
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseAnton Chuvakin
 
Continuous validation of office 365
Continuous validation of office 365Continuous validation of office 365
Continuous validation of office 365Montrium
 
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!Richard Robinson
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017Smart ERP Solutions, Inc.
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Oracle
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingPrecisely
 
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key UpdatesCloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key UpdatesIRJET Journal
 
593 Managing Enterprise Data Quality Using SAP Information Steward
593 Managing Enterprise Data Quality Using SAP Information Steward593 Managing Enterprise Data Quality Using SAP Information Steward
593 Managing Enterprise Data Quality Using SAP Information StewardVinny (Gurvinder) Ahuja
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 

Similar to How to Control Your Data and Stay Compliant with Robotic Process Automation (20)

Operations_Security - Richard Mosher
Operations_Security - Richard MosherOperations_Security - Richard Mosher
Operations_Security - Richard Mosher
 
MES systems
MES systemsMES systems
MES systems
 
System Quality Attributes for Software Architecture
System Quality Attributes for Software ArchitectureSystem Quality Attributes for Software Architecture
System Quality Attributes for Software Architecture
 
CH18-CompSec4e.pptx
CH18-CompSec4e.pptxCH18-CompSec4e.pptx
CH18-CompSec4e.pptx
 
Document Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateDocument Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automate
 
Neotys PAC 2018 - Gayatree Nalwadad
Neotys PAC 2018 - Gayatree NalwadadNeotys PAC 2018 - Gayatree Nalwadad
Neotys PAC 2018 - Gayatree Nalwadad
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity Lever
 
Chromatography Data System: Comply with Regulations
Chromatography Data System: Comply with RegulationsChromatography Data System: Comply with Regulations
Chromatography Data System: Comply with Regulations
 
Effectively Manage Counterfeit Parts with a Quality Solution
Effectively Manage Counterfeit Parts with a Quality SolutionEffectively Manage Counterfeit Parts with a Quality Solution
Effectively Manage Counterfeit Parts with a Quality Solution
 
System testing
System testingSystem testing
System testing
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
 
Continuous validation of office 365
Continuous validation of office 365Continuous validation of office 365
Continuous validation of office 365
 
ITGCs.pdf
ITGCs.pdfITGCs.pdf
ITGCs.pdf
 
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
 
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key UpdatesCloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
Cloud Storage Auditing Protocol with Verifiable Outsourcing of Key Updates
 
593 Managing Enterprise Data Quality Using SAP Information Steward
593 Managing Enterprise Data Quality Using SAP Information Steward593 Managing Enterprise Data Quality Using SAP Information Steward
593 Managing Enterprise Data Quality Using SAP Information Steward
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 

More from HelpSystems

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020HelpSystems
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...HelpSystems
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar HelpSystems
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos HelpSystems
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsHelpSystems
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de ITHelpSystems
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3HelpSystems
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPAHelpSystems
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3HelpSystems
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2HelpSystems
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1HelpSystems
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringHelpSystems
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudarHelpSystems
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tourHelpSystems
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...HelpSystems
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scriptsHelpSystems
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanHelpSystems
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security ScanHelpSystems
 

More from HelpSystems (20)

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
 

Recently uploaded

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 

How to Control Your Data and Stay Compliant with Robotic Process Automation

  • 2. Your Presenters Pat Cameron Director of Automation Technology HelpSystems
  • 3. HelpSystems. All rights reserved. Agenda 1. Security Headaches 2. Types of control 3. Reporting and documentation 4. Disaster recovery 5. Q&A
  • 4. Failed audit S E C U R I T Y A N D A U D I T I N G W I T H S K Y B O T S C H E D U L E R4
  • 6. Security breach S E C U R I T Y A N D A U D I T I N G W I T H S K Y B O T S C H E D U L E R6
  • 7. Limits access to systems/applications Limits access to application passwords Limits access to databases Documents all tasks/workflows Records all changes Records exceptions Records date and time of execution Automation enhances security
  • 8. Controls based on environments (test vs. production) Controls based on application Controls based on job description Controls who has access to application passwords Controls timing of workflow/task execution Types of Control
  • 9. 9 • Role-based security • Access to specific agents • Access to specific jobs • Change, Execute, View, Exclude • Base roles on department, division, location or customer • Interface with Active Directory or LDAP server Security options S E C U R I T Y A N D A U D I T I N G W I T H S K Y B O T S C H E D U L E R
  • 10. Automated Password Resets Limit Access to Users Limit tasks to view only or execute only Limit access to specific tasks/workflows All activities logged Automated user on-boarding/off- boarding Use Case - Automated User Management
  • 11. System penetration testing Use Case - Automated System Access Testing
  • 12. Production Control for all objects Limited access to services accounts Limited access to passwords Limited access to SFTP systems Export/Import objects to production Use Case - Limited access to Production Systems
  • 13. All actions tracked by date, time, user Aggregate audit data for reporting Report on system configuration changes Active Directory User Audit Reports Use Case –Auditing
  • 15. All job steps documented Graphical workflow view Changes tracked immediately No need for tracking on spreadsheets Use Case - Self-documenting
  • 16. System changes Job errors, late starts, overruns Audit reports of changes to any object Exception Reports
  • 17. 17 • Logs every database change • Record changed • Field changed • Date and time of change • User making the change • Original and new value • Server History • Reports • Audit History Report • Job History Report • Agent Event History Report • Security Report Audit records and reports S E C U R I T Y A N D A U D I T I N G W I T H S K Y B O T S C H E D U L E R
  • 18. Cluster environment supported High Availability option available Disaster Recovery
  • 19. HelpSystems. All rights reserved. Questions and Answers
  • 20. Thank You for Attending! Next steps: Download FREE trial Set up FREE automation consultation Website: http://www.helpsystems.com/automate Telephone: US Sales: 800-328-1000 Outside US: +44 (0) 870.120.3148 Support: 952-933-0609 Technical Experts: richard.schoen@helpsystems.com pat.cameron@helpsystems.com

Editor's Notes

  1. As mentioned I am Richard Schoen, Director of Document Management Technologies at HelpSystems. I am part of the technical solutions group bringing topics like this to our customers and prospective customers. I have over 30 years of background with IBMi, Windows and Linux platform software development, system integration, managing and delivering forms and documents and helping customers with automation processes. I also have a heavy development background using .Net, Java, RPG and other development languages. My co-host today is Pat Cameron who is our director of automation technology. Pat why don’t you say hello and tell us about what you do here at HelpSystems.
  2. How many of you have failed an audit? Raise your hand – no one will know your name… So you put good policies in place and have rules set up to meet all of the requirements of your auditors. The problem is documenting those policies and showing history of any exceptions. Unless you have a system in place that creates documentation as part of the automation tool, you will still find yourself spending all kinds of time and energy trying to gather together information needed when the auditors show up. It may only be once or twice a year, but who’s got time for that? Several bits of information that our customers have said are required are: Documentation of job failures – including date, time, reason – how and where do you keep that history Documentation of job streams and dependencies – especially cross system dependencies – are these being updated in a spreadsheet?
  3. Downtime Job failures Job delays Missed service level agreements What are some of the causes of unplanned downtime? You always hear people talk about downtime from disasters such as floods and fires, but my experience has shown that more often the cause is internal and not an entire system, but more like the following: I did live through two systems that went casters up in the days before high availability solutions. December of one year and February of the next. It was a rough quarter. The systems were down for days, but our backup (more to the point, our restore) was successful. High availability environments make the likelihood of losing an entire system much less these days, but let’s look at a few other downtime problems. A programming error for example. A user considers the system down if their application is not available and they can’t access the data they need for their job. The wrong version of a program getting put into production can cause downtime for a one business unit or several. Because our applications are so inter-dependent these days, that downtime could leak into other departments as well. A delay in a job steam is also considered downtime to anyone with Service Level Agreements. If processes don’t complete on time and they, in turn, affect other production jobs, that is downtime. Failure to meet SLA’s are painful and can affect a company’s bottom line as well as your own. If you have any examples of downtime that you’ve experienced – feel free to send a chat message to All Participants in the chat window on your right. If you’ve ever had to rerun jobs because a dependency wasn’t available when the job ran, you know downtime. Scheduling jobs based on time and hoping that all of the prerequisites are finished is a scary way to run Information Services . Delays can also be caused because no one is notified if an error occurs or if a job gets into a loop and runs for hours. If you need to log in to the systems at night or for month end to make sure that things are running ok, you know what downtime is. Running jobs manually is also asking for problems. Because we are all so busy these days and stretched so thin, it is very possible that jobs will get run in the wrong order or run at the wrong time. We’re only human. I know many operations areas that have checklists that they go through each shift checking off when jobs were run and initialing them or maintaining spreadsheets as run books. They’re great to show the auditors, but the reality is that you may not be able to check as often as required because of other duties and who has time to constantly be updating those spreadsheets. No one likes a micro-manager and you don’t want to have to micro-manage your systems either. Poor performance can also be considered downtime if it causes delays in your job streams and stretches out that nightly batch type processing into the morning business hours.
  4. Interface with Active Directory Role based security Encrypted communications Going along with the division of duties theme – is using cron or the windows task scheduler providing you with the security that you need regarding access to your production schedule? How many users have administrator rights? Can you limit access to jobs running on specific servers or from an application such as payroll. Do you have the flexibility to allow a Production Control area, for instance to be able to set up and change job schedules without having to give them administrator rights to those servers? Can you limit the type of access to specific jobs such as execute, view only, or exclude? Without the ability to limit the type of access, you certainly may be putting yourself in a position to have security breaches within your data center. If someone from accounting needs to run some reports as they need them, can you also limit his/her access to just that job? These are the types of situations that can put you in danger of having someone breach your security policies.
  5. What are the overall benefits of automation to your security policies?
  6. (Review Polling Results) Thanks for attending our webinar today.