SlideShare a Scribd company logo
1 of 11
The only SAP®-certified identity management software Helping SAP®users achieve Bulletproof Data Security!  © 2011 realtimeNorth America Inc., Tampa, FL. All Rights Reserved.
Why worry about SAP® data security? Your greatest threats may be from insiders! According to the ACFE’s    2010Report to the Nations on Occupational  Fraud and Abuse, based on global data, organizations lose about 5% of annual revenue to fraud. 	   Association of Certified Fraud Examiners  www.acfe.com Schemes can go undetected for years and frequently involve first-time offenders.  Are you protected?
Is your security on the “Honor System”?   Procedures, protocols, segregation of duties alone won’t prevent fraud - unless ENFORCED by security “checkpoints” where a user MUST prove their identity to SAP®.   Increased granularity of checkpoints is one way of increasing security.   Increased sophistication of authentication methods at the checkpoints is the 2nd way of increasing security.
2 Ways To Increase Data Security: Maximum Security Granularity of data checkpoints Sophistication of authentication 	mechanism
How To Increase SAP® Data Security: Biometric Recognition Dual  Approval Field Value Button Field Info type Transaction Log-on Passwords Smart Cards     High checkpoint granularity + Sophisticated authentication = Maximum Security
Bulletproof SAP® Data Security: Dual  Approval Bulletproof SAP® Installations + Field Value Button Field Infotype Most SAP® Installations Transaction Log-on Passwords Smart Cards Fingerprints
Pick Your Level of Checkpoint Granularity Level  I   SAP Logon Level  II  Transactions Level  III  Any Field Level  IV   Exceeding Values Level  V   Dual Confirmation Choose your own method of authentication.  All levels can be controlled using passwords, smart cards or fingerprint scans!
Example –  Masking Field Data: Result: Multiple Checkpoints by User Log-on to a Profile (e.g.  Admin) Transactions (e.g.  HR / PO / Finance)  Infotypes(e.g. 008/167 etc.)  Buttons (e.g. Print / Export / Execute) Display (e.g. Balance Sheet) Execute (e.g. prevent execution of anything…) Tables within SE16/SE16N Programs within SE38 Values (e.g. wire transfer over a certain amount) Screens (e.g. export control / ITAR ) Dual Authentication  Mask Fields (e.g. make data invisible)
What can a checkpoint control? Purchasing: Do you want better control of who authorized expenditures? Set a maximum on P.O. value? Finance:Do you want to place financial limits on a user’s credentials? How about dual approval on high dollar transactions?Restrict viewing of Income Statement or Balance Sheet? Operations: Need to protect the secrecy of a bill of materials or other intellectual property? Protect customer master? Human Resources: Do you want to control access to private HR data? Robust audit trail of a user’s SAP®activities? Executives: Are you looking for a plausible SOX alibi for your activities viewing/changing financial data? Marketing: Protect sensitive research data? What is your secure issue?
Sample Success Stories -  Government agency achieves compliance with HIPAA by protecting private employee / HR info. Pharmaceutical user controls purchasing approvals by automating workflow with external browser access for senior executives International bank prevents fraud with dual authentication and strong financial controls, masking data from unauthorized viewing School Board prevents payroll and personal expense fraud which had gone undetected for years Nuclear plant protects all purchase orders and workflow for several thousand users
Find out how you can achieve        Bulletproof SAP® Data Security!  For a demo or pilot installation, call:1-877-bioLock realtime North America, Inc. WORLD TRADE CENTER 1101 Channelside Drive, Tampa, FL 33602 T: 813-283-0070   F: 813-283-0071   www.biolock.us Guillermo Alvarez Echauri Mexico & LA Director guillermo@realtimemexico.com

More Related Content

Viewers also liked

Genetic Modulation Of Aii Amacrine Cell & Type
Genetic Modulation Of Aii Amacrine Cell & TypeGenetic Modulation Of Aii Amacrine Cell & Type
Genetic Modulation Of Aii Amacrine Cell & Typestephaniealeong
 
Faq onlinestudents handouts_reed
Faq onlinestudents handouts_reedFaq onlinestudents handouts_reed
Faq onlinestudents handouts_reedReedARC
 
The power of obervation
The power of obervationThe power of obervation
The power of obervationDavid Schlacht
 
The value of a loaf of bread
The value of a loaf of breadThe value of a loaf of bread
The value of a loaf of breadDavid Schlacht
 
Carl sagan is awesome
Carl sagan is awesomeCarl sagan is awesome
Carl sagan is awesomekatherine0123
 
Hoffman drainage tunnel (concrete)
Hoffman drainage tunnel (concrete)Hoffman drainage tunnel (concrete)
Hoffman drainage tunnel (concrete)sjbaluch
 
Powerpoint Presentation- Jess Mendez Area 51
Powerpoint Presentation- Jess Mendez Area 51Powerpoint Presentation- Jess Mendez Area 51
Powerpoint Presentation- Jess Mendez Area 51Jessica Mendez
 
Heart attack ppt
Heart attack pptHeart attack ppt
Heart attack ppttega010
 
خطوات التسجيل على Delicious
خطوات التسجيل على Deliciousخطوات التسجيل على Delicious
خطوات التسجيل على DeliciousMohamed Elshazly
 
ما هو البور بوربوينت
ما هو البور بوربوينتما هو البور بوربوينت
ما هو البور بوربوينتMohamed Elshazly
 
Your own recommendation engine with neo4j and reco4php - DPC16
Your own recommendation engine with neo4j and reco4php - DPC16Your own recommendation engine with neo4j and reco4php - DPC16
Your own recommendation engine with neo4j and reco4php - DPC16Christophe Willemsen
 

Viewers also liked (14)

Genetic Modulation Of Aii Amacrine Cell & Type
Genetic Modulation Of Aii Amacrine Cell & TypeGenetic Modulation Of Aii Amacrine Cell & Type
Genetic Modulation Of Aii Amacrine Cell & Type
 
Faq onlinestudents handouts_reed
Faq onlinestudents handouts_reedFaq onlinestudents handouts_reed
Faq onlinestudents handouts_reed
 
Presentation1
Presentation1Presentation1
Presentation1
 
The power of obervation
The power of obervationThe power of obervation
The power of obervation
 
The value of a loaf of bread
The value of a loaf of breadThe value of a loaf of bread
The value of a loaf of bread
 
Torsión tibial
Torsión tibialTorsión tibial
Torsión tibial
 
Carl sagan is awesome
Carl sagan is awesomeCarl sagan is awesome
Carl sagan is awesome
 
Hoffman drainage tunnel (concrete)
Hoffman drainage tunnel (concrete)Hoffman drainage tunnel (concrete)
Hoffman drainage tunnel (concrete)
 
Powerpoint Presentation- Jess Mendez Area 51
Powerpoint Presentation- Jess Mendez Area 51Powerpoint Presentation- Jess Mendez Area 51
Powerpoint Presentation- Jess Mendez Area 51
 
Heart attack ppt
Heart attack pptHeart attack ppt
Heart attack ppt
 
خطوات التسجيل على Delicious
خطوات التسجيل على Deliciousخطوات التسجيل على Delicious
خطوات التسجيل على Delicious
 
ما هو البور بوربوينت
ما هو البور بوربوينتما هو البور بوربوينت
ما هو البور بوربوينت
 
Your own recommendation engine with neo4j and reco4php - DPC16
Your own recommendation engine with neo4j and reco4php - DPC16Your own recommendation engine with neo4j and reco4php - DPC16
Your own recommendation engine with neo4j and reco4php - DPC16
 
Trabajoelevado
TrabajoelevadoTrabajoelevado
Trabajoelevado
 

Similar to 2011 Intro Bio Lock

Bio Lock Exec 110329
Bio Lock Exec 110329Bio Lock Exec 110329
Bio Lock Exec 110329Martin Lum
 
biolock Presentation
biolock Presentationbiolock Presentation
biolock Presentationtneudenb
 
Protect SAP data with fingerprint recognition software
Protect SAP data  with fingerprint recognition softwareProtect SAP data  with fingerprint recognition software
Protect SAP data with fingerprint recognition softwareMartin Lum
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For AmlKartik Mehta
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur guptaAankur Gupta
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
A case study of amazon
A case study of amazonA case study of amazon
A case study of amazonrobinbarney
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookDeloitte Canada
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech applicationnimbleappgenie
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY Indiagauravmiishra701
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY Indiaaparnatikekar4
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY Indiasathish kriishnan
 

Similar to 2011 Intro Bio Lock (20)

Bio Lock Exec 110329
Bio Lock Exec 110329Bio Lock Exec 110329
Bio Lock Exec 110329
 
biolock Presentation
biolock Presentationbiolock Presentation
biolock Presentation
 
Protect SAP data with fingerprint recognition software
Protect SAP data  with fingerprint recognition softwareProtect SAP data  with fingerprint recognition software
Protect SAP data with fingerprint recognition software
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Remote desk one pager
Remote desk one pagerRemote desk one pager
Remote desk one pager
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
A case study of amazon
A case study of amazonA case study of amazon
A case study of amazon
 
Analytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface lookAnalytics Trends 2015: A below-the-surface look
Analytics Trends 2015: A below-the-surface look
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 
Evolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
 

2011 Intro Bio Lock

  • 1. The only SAP®-certified identity management software Helping SAP®users achieve Bulletproof Data Security! © 2011 realtimeNorth America Inc., Tampa, FL. All Rights Reserved.
  • 2. Why worry about SAP® data security? Your greatest threats may be from insiders! According to the ACFE’s 2010Report to the Nations on Occupational Fraud and Abuse, based on global data, organizations lose about 5% of annual revenue to fraud. Association of Certified Fraud Examiners www.acfe.com Schemes can go undetected for years and frequently involve first-time offenders. Are you protected?
  • 3. Is your security on the “Honor System”? Procedures, protocols, segregation of duties alone won’t prevent fraud - unless ENFORCED by security “checkpoints” where a user MUST prove their identity to SAP®. Increased granularity of checkpoints is one way of increasing security. Increased sophistication of authentication methods at the checkpoints is the 2nd way of increasing security.
  • 4. 2 Ways To Increase Data Security: Maximum Security Granularity of data checkpoints Sophistication of authentication mechanism
  • 5. How To Increase SAP® Data Security: Biometric Recognition Dual Approval Field Value Button Field Info type Transaction Log-on Passwords Smart Cards High checkpoint granularity + Sophisticated authentication = Maximum Security
  • 6. Bulletproof SAP® Data Security: Dual Approval Bulletproof SAP® Installations + Field Value Button Field Infotype Most SAP® Installations Transaction Log-on Passwords Smart Cards Fingerprints
  • 7. Pick Your Level of Checkpoint Granularity Level I SAP Logon Level II Transactions Level III Any Field Level IV Exceeding Values Level V Dual Confirmation Choose your own method of authentication. All levels can be controlled using passwords, smart cards or fingerprint scans!
  • 8. Example – Masking Field Data: Result: Multiple Checkpoints by User Log-on to a Profile (e.g. Admin) Transactions (e.g. HR / PO / Finance) Infotypes(e.g. 008/167 etc.) Buttons (e.g. Print / Export / Execute) Display (e.g. Balance Sheet) Execute (e.g. prevent execution of anything…) Tables within SE16/SE16N Programs within SE38 Values (e.g. wire transfer over a certain amount) Screens (e.g. export control / ITAR ) Dual Authentication Mask Fields (e.g. make data invisible)
  • 9. What can a checkpoint control? Purchasing: Do you want better control of who authorized expenditures? Set a maximum on P.O. value? Finance:Do you want to place financial limits on a user’s credentials? How about dual approval on high dollar transactions?Restrict viewing of Income Statement or Balance Sheet? Operations: Need to protect the secrecy of a bill of materials or other intellectual property? Protect customer master? Human Resources: Do you want to control access to private HR data? Robust audit trail of a user’s SAP®activities? Executives: Are you looking for a plausible SOX alibi for your activities viewing/changing financial data? Marketing: Protect sensitive research data? What is your secure issue?
  • 10. Sample Success Stories - Government agency achieves compliance with HIPAA by protecting private employee / HR info. Pharmaceutical user controls purchasing approvals by automating workflow with external browser access for senior executives International bank prevents fraud with dual authentication and strong financial controls, masking data from unauthorized viewing School Board prevents payroll and personal expense fraud which had gone undetected for years Nuclear plant protects all purchase orders and workflow for several thousand users
  • 11. Find out how you can achieve Bulletproof SAP® Data Security! For a demo or pilot installation, call:1-877-bioLock realtime North America, Inc. WORLD TRADE CENTER 1101 Channelside Drive, Tampa, FL 33602 T: 813-283-0070 F: 813-283-0071 www.biolock.us Guillermo Alvarez Echauri Mexico & LA Director guillermo@realtimemexico.com