SlideShare a Scribd company logo
1 of 25
Check Aud ®  for  SAP ®  Systems IBS Portfolio CheckAud ®   Objective Target groups Functions Analysis tree SoD Matrix References Ask us about our  Demo version !
[object Object],[object Object],[object Object],[object Object],[object Object],Check Aud ®  for  SAP ®  Systems IBS Portfolio CheckAud ®     Objective Target groups Functions Analysis tree SoD Matrix References
Authorization Chaos? Check Aud ®  Cleans it Up Revision  – Does the  SAP® System confrom to the requirements in regulation compliance? Administration  – Audit before your auditor arrives! Departments  – The data, or process owner supervises their own data, achieving transparency at a glance! Data protection –  Is personal data sufficiently protected?  Auditor  – The year-end closing. IBS Portfolio CheckAud ®   Objective    Target groups Functions Analysis tree SoD Matrix References
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Check Aud ®  for  SAP ®  Systems IBS Portfolio CheckAud ®   Objective Target groups    Functions Analysis tree SoD Matrix References
Functions in Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IBS Portfolio CheckAud ®   Objective Target groups    Functions Analysis tree SoD Matrix References
The Analysis Tree ,[object Object],[object Object],[object Object],[object Object],IBS Portfolio CheckAud ®   Objective Target groups Functions    Analysis tree SoD Matrix References
The Segregation of Duties Matrix IBS Portfolio CheckAud ®   Objective Target groups Functions Analysis tree    SoD Matrix References Number of risks Double click for details…
Critical Authorizations ,[object Object],[object Object],[object Object],[object Object],Functions   Authorizations Critical processes SoD Matrix BIW Audit User Analysis Simulation Automation References
Critical Authorizations For each user who is discovered to have authorization, the following details will be displayed: Functions   Authorizations Critical processes SoD Matrix BIW Audit User analysis Simulation Automation References ,[object Object],[object Object],[object Object],[object Object]
Critical Authorizations ,[object Object],[object Object],[object Object],[object Object],We would be glad to provide you with a demo version or to present the system to you live! Functions   Authorizations Critical processes SoD Matrix BIW Audit User analysis Simulation Automation References
Critical Business Operations Who can maintain vendors, create invoices / credit memos and start the payment run?  With one click, you will see the authorized users and the source of their rights. A traffic symbol indicates wheter the audit result has been deemed critical.  Functions Critical Authorizations    Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References
Segregation of Duties Has there been a violation of the segregation of duties? Functions Critical Authorizations Critical Processes    SoD Matrix BIW Audit User Analysis Simulation Automation References Attribute of a risk -risk -risk group -risk description -compensating controls -description of the control -responsible persons
BIW-specific Authorizations ,[object Object],[object Object],[object Object],[object Object],[object Object],Functions Critical Authorizations Critical Processes SoD Matrix    BIW Audit User Analysis Simulation Automation References
Rights per User Which transactions can Ms. Teiler execute? Functions Critical Authorization Critical Processes SoD Matrix BIW Audit    User Analysis Simulation Automation References
Simulation of Modifications Will the changes made to authorizations lead to a desired result? Following the simulated deletion of a role, Ms. Teiler has only 5 of her original 44 authorizations. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis    Simulation Automation References
Fully-automated Report 1 A scheduler completes the analyses regularly and on its own. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation    Automation References Check Aud ®  Scan Ins Aud 1 Check Aud ®  CheckScan SAP - Scheduler 1 SAP 1 Time & Rotation Output Format  Reports SAP System & Logon Report n Report 2 Analysis Trees
Follow Up Audit – Delta  CheckAud ®  RoadMap 2010    Follow Up Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References Which changes have been made since the most recent audit?
Matrix Export ,[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits    Matrix Export Export Assistant Data Protection  2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References
Export Assistant ,[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export    Export Assistant Dataprotection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References
[object Object],[object Object],[object Object],[object Object],Advancements in Data Protection CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant    Data Security   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References
Assistant for CheckScanSAP  ,[object Object],[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection  2011 et seq .    Scan Assistant JAVA Authorizations LDAP Authorizations Database Security References
UME / LDAP Evaluations ,[object Object],[object Object],[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant    JAVA Authorizations LDAP Authorizations Database Security References
Database Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations    Database Security References
CheckAud ®  RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection   2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security    References Some of our well-known customers.
Contact ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSmart ERP Solutions, Inc.
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceTLI GrowthSession
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
Defining Segregation of Duties
Defining Segregation of DutiesDefining Segregation of Duties
Defining Segregation of DutiesWill Kelly
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation hkodali
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0Latha Kamal
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks ProceduresInprise Group
 
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsAutomating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsSmart ERP Solutions, Inc.
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programFlexera
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grchkodali
 
Crafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC StrategyCrafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC StrategyCognizant
 
Building continuous auditing capabilities
Building continuous auditing capabilitiesBuilding continuous auditing capabilities
Building continuous auditing capabilitiesWafaa N. AbuSadah
 

What's hot (20)

Seg dutieschecklist
Seg dutieschecklistSeg dutieschecklist
Seg dutieschecklist
 
Ey segregation of_duties
Ey segregation of_dutiesEy segregation of_duties
Ey segregation of_duties
 
Security & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoftSecurity & Segregation of Duties for PeopleSoft
Security & Segregation of Duties for PeopleSoft
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Defining Segregation of Duties
Defining Segregation of DutiesDefining Segregation of Duties
Defining Segregation of Duties
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
GRC_2016_US_Brochure
GRC_2016_US_BrochureGRC_2016_US_Brochure
GRC_2016_US_Brochure
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks Procedures
 
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus SolutionsAutomating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions
 
SAP grc
SAP grc SAP grc
SAP grc
 
Webinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management programWebinar: How to get started on a Software Asset Management program
Webinar: How to get started on a Software Asset Management program
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
Crafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC StrategyCrafting an End-to-End Pharma GRC Strategy
Crafting an End-to-End Pharma GRC Strategy
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
 
Building continuous auditing capabilities
Building continuous auditing capabilitiesBuilding continuous auditing capabilities
Building continuous auditing capabilities
 

Similar to Casa engl

Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIINextLabs, Inc.
 
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...googleservice3
 
SAP BI Security Features
SAP BI Security FeaturesSAP BI Security Features
SAP BI Security Featuresdw_anil
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security featuresShazia_Sultana
 
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...NextLabs, Inc.
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI tools
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Summary Technical Presentation (General)
Summary Technical Presentation (General)Summary Technical Presentation (General)
Summary Technical Presentation (General)DonGlass
 
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptxS4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptxITAdmin28
 
Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)Leonard Fingerman
 
Managing Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 EnvironmentManaging Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 Environmentsundaybizsys
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC FrameworkHarish Sharma
 
BI Reporting Application Comparison
BI Reporting Application ComparisonBI Reporting Application Comparison
BI Reporting Application ComparisonScott Mitchell
 
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"Bohdan Maherus
 
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...Akshay Shah
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewAmit Gatenyo
 

Similar to Casa engl (20)

Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
SmartProfiler for Active Directory Office 365 and Azure Virtual Desktop Asses...
 
SAP BI Security Features
SAP BI Security FeaturesSAP BI Security Features
SAP BI Security Features
 
An expert guide to new sap bi security features
An expert guide to new sap bi security featuresAn expert guide to new sap bi security features
An expert guide to new sap bi security features
 
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 Brochure
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Summary Technical Presentation (General)
Summary Technical Presentation (General)Summary Technical Presentation (General)
Summary Technical Presentation (General)
 
Auditing Data Access in SQL Server
Auditing Data Access in SQL ServerAuditing Data Access in SQL Server
Auditing Data Access in SQL Server
 
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptxS4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
S4H_790 IAM - Authorization Concept Guidelines for S4HANA Cloud.pptx
 
Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)Test Automation Best Practices (with SOA test approach)
Test Automation Best Practices (with SOA test approach)
 
Managing Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 EnvironmentManaging Suppliers in ISO 9001 Environment
Managing Suppliers in ISO 9001 Environment
 
SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC Framework
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
BI Reporting Application Comparison
BI Reporting Application ComparisonBI Reporting Application Comparison
BI Reporting Application Comparison
 
E&E CV
E&E CVE&E CV
E&E CV
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
 
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
Power BI On AIR - Melissa Coates: "What You Need to Know to Administer Power BI"
 
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
Agilewiz PaaS, SaaS, Web 2.5, Platform Technology, BPO Platform Technology,Di...
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Casa engl

  • 1. Check Aud ® for SAP ® Systems IBS Portfolio CheckAud ® Objective Target groups Functions Analysis tree SoD Matrix References Ask us about our Demo version !
  • 2.
  • 3. Authorization Chaos? Check Aud ® Cleans it Up Revision – Does the SAP® System confrom to the requirements in regulation compliance? Administration – Audit before your auditor arrives! Departments – The data, or process owner supervises their own data, achieving transparency at a glance! Data protection – Is personal data sufficiently protected? Auditor – The year-end closing. IBS Portfolio CheckAud ® Objective  Target groups Functions Analysis tree SoD Matrix References
  • 4.
  • 5.
  • 6.
  • 7. The Segregation of Duties Matrix IBS Portfolio CheckAud ® Objective Target groups Functions Analysis tree  SoD Matrix References Number of risks Double click for details…
  • 8.
  • 9.
  • 10.
  • 11. Critical Business Operations Who can maintain vendors, create invoices / credit memos and start the payment run?  With one click, you will see the authorized users and the source of their rights. A traffic symbol indicates wheter the audit result has been deemed critical. Functions Critical Authorizations  Critical Processes SoD Matrix BIW Audit User Analysis Simulation Automation References
  • 12. Segregation of Duties Has there been a violation of the segregation of duties? Functions Critical Authorizations Critical Processes  SoD Matrix BIW Audit User Analysis Simulation Automation References Attribute of a risk -risk -risk group -risk description -compensating controls -description of the control -responsible persons
  • 13.
  • 14. Rights per User Which transactions can Ms. Teiler execute? Functions Critical Authorization Critical Processes SoD Matrix BIW Audit  User Analysis Simulation Automation References
  • 15. Simulation of Modifications Will the changes made to authorizations lead to a desired result? Following the simulated deletion of a role, Ms. Teiler has only 5 of her original 44 authorizations. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis  Simulation Automation References
  • 16. Fully-automated Report 1 A scheduler completes the analyses regularly and on its own. Functions Critical Authorizations Critical Processes SoD Matrix BIW Audit User Analysis Simulation  Automation References Check Aud ® Scan Ins Aud 1 Check Aud ® CheckScan SAP - Scheduler 1 SAP 1 Time & Rotation Output Format Reports SAP System & Logon Report n Report 2 Analysis Trees
  • 17. Follow Up Audit – Delta CheckAud ® RoadMap 2010  Follow Up Matrix Export Export Assistant Data Protection 2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security References Which changes have been made since the most recent audit?
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. CheckAud ® RoadMap 2010 Follow Up Audits Matrix Export Export Assistant Data Protection 2011 et seq . CheckScan Assistant JAVA Authorizations LDAP Authorizations Database Security  References Some of our well-known customers.
  • 25.