This presentation provides a brief overview of eCAAT Ent with use cases. eCAAT Ent is an add-in software to MS Excel which can be used for Data analytics/BI software used by CAs and CXOs for Assurance, Compliance and Fraud Investigations.
1. Intro of Key Features of eCAAT
Ent Version
Data Analytics in Excel in a few Clicks!
https://www.wincaat.com
2.
3. Global Leading Solution Provider in Data Analytics
for Empowering Professionals to realise potential
by Applying Thought to Technology.
Revolutionize Assurance, Compliance and
Consulting Services by Providing
Powerful Tools & Techniques
for Performing Data Analytics, BI and AI.
4. With Innovative Software Solutions,
We Empower CAs & CXOs to Harness:
Power of
Technology to
Provide Value
Addition through
IT-Enabled Service
offerings.
Subject Matter
Expertise and
Domain Knowledge
to Provide Existing
and Innovative
Services.
Professional
Potential to Provide
Value Addition as
Knowledge Workers
and be more
Effective and
Productive.
5. Higher use of Technology.
Greater Value Addition and
Serve your Clients in Shorter Time with
Deploying Systems and Solutions for Scaling up Services for
Empowering you to:
8. Add-in to MS
Excel Software
Easy to use and
Simple to Learn
Look & Feel of
MS Excel but
with power of
Database
Powerful Data
Analytics/BI/FI
with > 350
Functions
Perform Complex
Analysis in a Few
clicks with Auto
Documentation
Why use eCAAT Ent?
Data Analytics Simplified!
9. eCAAT Ent: Add-in to MS Excel
Data Analytics Simplified
Designed from Assurance/Controls & Compliance perspective
Identify irregularities, exceptions, outliers and verify conformances/compliances in digital
data.
Enables users to perform various types of audit tests on Excel data in a few clicks!
Easy-use-to-use interface with a comprehensive collection of DA/BI functions.
Blends simplicity of MS Excel with the power of data from Database!
Inbuilt data analytics approach and steps in the panels, menus and functions of software to
curate, profile, analyse, explore, investigate data based on specified criteria.
Makes Data Analytics Simple, Effective, Affordable with short learning curve. Most reliable &
relevant DA Software for Auditors, CXOs and Fraud Investigators.
21. What is CAATTs/Data Analytics?
Application
of:
• Knowledge
• Skills
• Tools and
• Techniques
• By performing relevant tests as per
scope & objectives of assignment
23. What can you do with Data Analytics/BI Software?
Establish Facts & Issues
Explore Hunches & Ideas
Draw Inferences & Insights
Validate & Confirm Hindsight
Report Findings & Recommendations
24. What is eCAAT Ent?
• Developed by Auditors for Auditors to
Audit any Digital Data.
• Expert team-effort of > 25 man-years.
• Add-in to MS Excel as a new tab
• Use in any Assurance, Compliance,
Analytics or BI Assignment.
• Right blend of Simplicity.
• Ease of Use with Few Clicks.
• Ready for use with Min. Training.
25. What can you do
with eCAAT Ent?
25
PERFORM
Data Analysis
for
Compliance,
Assurance,
BI or Fraud
Investigation
26. Who can use eCAAT?
• Auditors: Financial, Compliance or IT, CXOs, Fraud/Forensics
investigator….
Those who are working as:
• Infer Insights from Information from any electronic format or
software!
Those who have to use Data
Analytics to:
• Enhance skills, grow in their career and be more effective.
Those who would like to:
• Use IT Tools and skills for accessing, analysing and auditing
electronic information.
Those who have to:
• Supplement their Knowledge and Skills to provide value addition
Those who have to:
• Investigate and report on frauds in electronic information of
automated environment.
Those who have to:
29. Why use eCAAT?
Comprehensive tool
to audit 100% of
the data.
Empower your
audit staff at
affordable cost.
Do more in less
time by enhancing
your productivity.
Easy to learn and
simple to use.
Perform analysis to
draw inference and
insight.
Power to process
complex files
quickly with a few
clicks.
Designed for new,
inexperienced and
expert CAATs users.
Integrated as a tab
in MS Excel but
with innate power
of database.
Grow professionally
empowered by
Technology.
31. Seven Key Benefits of using eCAAT
1. Enhance your
Skills and Tools
2. Increase
productivity of
your Time
3. Provide better
Assurance & Add
value
4. Grow your
Professional Team
& Esteem.
5. Accelerate your
Income earning
capability.
6. Develop
empowering
Reach & Impact.
7. Gain recognition
as a thought
Leader.
32. Data Analytics:
MS Excel Vs. eCAAT
•Time-saver:
•Enhanced use of
MS Excel
•BI & MIS
•On the fly
•Data Analytics
•In a few clicks
Multi-dimensional:
Set of Tools
34. 3 USEFUL SETS OF PROFESSIONALS
Mindset SkillSet Toolset
35. When to use CAATs/Data Analytics/BI?
Mathematics is exact but
Statistics is approximate
Data is dumb but
information is intelligent
Data Analysis is about
leveraging human
intelligence
Inference requires more
application of intelligence
Drawing inference from
data analytics is based on
applying human
intelligence to technology
to get required results.
Immense computing
power helps blend the
power of computers with
intelligence to interpret
what data is.
38. Systematic Approach to Using CAATs
Set Objectives
Set Test
Objectives
Obtain Relevant
Data
Identify Tools &
Techniques
Perform Tests on
the Data
Evaluate Evidence
to infer Insights
Review Findings as
per Business
Context
Report Findings
and
Recommendations
39. Seven Steps for Performing Data Analytics
1. Identify Objectives & Deliverable
2. Identify Data & Platform
3. Understand Process & System
4. Document Controls & Tests
5. Apply Tools & Techniques
6. Draw Inferences & Insights
7. Prepare Outputs & Reports
40. Data Analytics in 4 Steps
1. Business
Process
Controls
2. Information
Criteria for
Evaluation
3. Tools and
Techniques to
Use (SW)
4. Analyse &
Report for Value
Addition
42. Panels Brief Description of Panels in SoftCAAT Ent
File
Home
Provides options to create an auditee, audit, file and password.
Provides options to import different types of files as selected for performing functions of
software.
Curate Curate refers to transforming data in a standard structure to be usable for data analysis
as required. Curation of data ensures that data is formatted and purified for use in data
analytics.
Profile Data profiling refers to the act of analysing the data contents to get an overall perspective
of data. This helps in validating data at a macro level and assessing whether the data is
correct and complete.
Analysis Analysis refers to examining the data in detail to discover essential features by breaking
data into specific components by grouping, identifying and reviewing specific features.
Explore Explore refers to examining the data in detail to discover essential features by breaking
data into specific components by grouping, identifying and reviewing specific features.
Investigate Investigate refers to observing or inquiring the data in detail. This involves systematic
examination of data by making a detailed inquiry or search to discover facts and insights
to be able to come to a conclusion.
Document Documentation refers to recording critical steps of data analytics. The functions in this
panel help document the steps used during data analytics.
Relate Provides options to join, append or compare data in two tables based on specific criteria.
Utilities
Tools
Provides unique functions which complement and enhance the use of SQL and are great
time-savers.
Tools refers to specific functions which aid in simplifying routine tasks performed in SQL.
44. Profile Data
• Statistics
• Search
• Group or Re-arrange
• Stratify
• Summarise
• Classify
• Age/Periodicity
• Totals/Count/Average
• Cumulative Total
• Top/Bottom ‘X’ Records
• Highlight on Specific Criteria
Analyse the data to
get an overall
perspective of data.
Validate data at a
macro level to
assess whether the
data is correct and
complete.
Specific functions:
45. Analyse Data
• Identify:
• Gaps
• Duplicates
• Unique
• Outliers
• Format
• Changes between 2 sets of data
• Sampling
• Filtering
• Split data
• Fuzzy Match
Examine the data in
detail to discover
essential features by
breaking data into
specific components
by Grouping,
Identifying and
Reviewing.
Specific functions:
46. Investigate Data
• Pareto
• ABC/ABCD
• Quadrant
• Cluster/Percentile
• MIS –Multiple criteria
• Trendline
• Query – List to Find
• Consolidate/Collate
• Relative Size Factor
• Statistics: Benford Law, Trend Analysis
• Compare/Join files on specific criteria
• Compute & Compare
• Templates: Existence check,..
Observe or query the
data in detail through:
1. Systematic examination
2. Make a detailed inquiry
or search
3. Discover facts & insights
to arrive at a conclusion.
Specific functions:
47. Document analysis
• Index
• Worksheets
• Workbooks
• File List
• Log:
• Workbook History
• Audit log,
• Enterprise Info
• System Info
• License Info
• Rerun
• Refresh
Automatically
Document
Functions
performed using
eCAAT.
Specific functions:
48. Utilities
• Rows and Columns
• Tagging data
• Split, re-arrange, extract, delete,
• Manipulate columns as required ..
• Workbooks
• Protecting specific information.
• Snapshot,
• Freeze/Unfreeze all
• Identify circular references,..
• Worksheets
• Organise/manipulate as required
• Protect/Unprotect, etc.
Complement and
enhance the use
of MS Excel and
are great time-
savers.
Specific functions:
49. Tools
• Navigate by Selection/Workbook
• Hide/Unhide
• Unhide All Rows & Columns
• By Column(s)
• By Sheet(s)
• By Panel
• By Module
• Print setup options
• Auto Open
• Select Sheet
• Save Workbooks
• Undo
• Search and Run
Simplifying routine
tasks which
complement the
functions of MS
Excel by accessing
larger volume of
data in a faster
way
Specific functions:
56. Generic
Use Case of
eCAAT Ent:
What can
you do
with it?
• Add-in to MS Excel Software which is designed from Assurance,
Controls and Compliance perspective to Identify Irregularities,
Exceptions, Outliers, Verify Conformances and Compliances and
generate BI/MIS reports from the Digital Data.
• Easy to use and Simple to Learn which enables users to perform
various types of audit tests on Excel data in a few clicks!
• Look & Feel of MS Excel but with power of Database which blends
simplicity of MS Excel with the power of data from Database!
• Easy-use-to-use interface with a comprehensive collection of >380
Powerful Functions useful for Data Analytics, Business Intelligence
and Fraud Investigation.
• Inbuilt data analytics approach and steps in the panels, menus and
functions of software to curate, profile, analyse, explore, investigate
data based on specified criteria.
• Makes Data Analytics Simple, Effective, Affordable with short
learning curve. Most reliable & relevant DA Software for Auditors,
CXOs and Fraud Investigators.
• Perform Complex Analysis in a Few clicks with Auto Documentation.
57. Generic Use
Case of
eCAAT Ent:
Walk-through
of Functions
• eCAAT Ent is an
Add in Excel which
empowers users to
perform Data
Analytics and
Analyse data from
Excel in a few
clicks.
• The user must get
the required data in
MS Excel and then
select and perform
any of the selected
functions.
• These functions
enable to user to
Perform Powerful
Analytics without
knowing any
macros.
• User has a quick
walk-through of the
Tabs which
include:
• Curate
• Profile
• Analyse
• Investigate
• Document
• Utilities
• Tools
58. Generic Use
case of
eCAAT Ent:
User has
walk-through
of the various
powerful
functions
available in
Menus of:
• Remove
• Delete
• Transform
• Convert
• Format
• Transpose
• Data
• Details
• Search
• Identify
• Changes
• Sampling
• Fuzzy Match
• Sort & Filter
• Split Sheet
• Analysis
• Trendline
• Query
• Statistics
• Relate
• Templates
• File
• Index
• Log
• Rows / Columns
• Workbooks
• Worksheets
• Navigate
• Hide / Unhide
• Print Setup
59. Generic Use
Case of
eCAAT Ent:
Understand
Relevant
Functions
• The user selects the relevant functions in the Curate
Menu to transform data in a standard structure to be
usable for data analysis as required. The various
functions of curate enable user to format and purify
the data so that it is easy to perform analysis of data
as required.
• The user selects the relevant functions in Profile
Menu to analyse the data to get an overall
perspective of data. This enables the user to validate
data at a macro level and in assessing whether the
data is correct and complete.
• The user selects the relevant functions in Analyse
Menu to examine the data in detail to discover
essential features by breaking data into specific
components by grouping, identifying and reviewing
specific features.
• The user selects the relevant functions in the
Investigate Menu which empower the user to observe
or inquire the data in detail with systematic
examination by making a detailed inquiry or search
to discover facts and insights and to infer insights.
60. Generic
Use Case of
eCAAT Ent:
Using
Relevant
Functions
• The user selects the relevant functions
in the Relate Menu which provides
options to join, append or compare data
in two tables based on specific criteria.
• The user selects the relevant functions
in the Document Menu to record critical
steps of data analytics.
• The user selects the relevant functions
in Utilities Menu to perform tag related
functions and duplicate/insert rows
and functions to organise columns by
splitting, combining or re-arranging and
insert nos.
61. Generic Use case of eCAAT Ent: Key Benefits
The user gets practical exposure of
how eCAAT Ent Software provides
independent access to auditee
data and makes Data Analytics
Simple, Effective and use the
powerful features with minimal
training.
The user imports the data from
different formats and then
perform various types of audit
tests as required.
The user discovers that it is not
necessary to depend on IT
personnel to get reports instead
he/she requests for data in
required format to be exported to
Excel using which the user
performs analysis as required.
Using eCAAT Ent, the user
specifically Identifies Irregularities,
Exceptions, Outliers and does
further analysis as required and
reports the relevant findings and
recommendations with the
evidence, to management.
The auto documentation feature
records date and time stamp for all
the functions performed so that it
can be used as record of work
done and to re-perform as and
when required.
The user finds that eCAAT Ent
Software can be used for various
types of assignments such as
Assurance, Verifying Controls and
Validating Conformances with
Statutory Regulations as required.
You can see the Complete List of Functions with Brief Description at:
https://wincaat.com/Features_eCAATEnt/Functions.aspx
63. Control Objectives: Accounts Payable
• i. Whether the company maintains proper records of all transactions of
accounts payable and the details are reconciled with internal and external
confirmation as required on a timely basis.
Maintenance of
Records
• ii. Whether the enterprise has comprehensive policies and procedures
covering accounts payable such as purchase policy, receipt of goods,
selection of authorised vendors, discounts, procurement, regulatory
compliances, etc. and these are effectively implemented.
Policies &
Procedures
• iv. Whether all the internal policies/regulatory compliances pertaining to
the transactions of accounts payables such as accounting, valuation,
deduction of taxes, accounting for charges, quality controls, payment on
on time are strictly adhered to and monitored.
Internal
Policy/Regulatory
Compliances
64. Illustrative Control Objectives Financial Assertions
• Purchase orders are placed only for approved acquisitions • Existence
• Purchase orders are accurately entered. • Valuation
• All purchase orders issued are input and processed. • Completeness
• Amounts posted to accounts payable represent goods or services received. • Existence
• Accounts payable amounts are accurately calculated and recorded. • Valuation
• All amounts for goods or services received are input and processed to AP. • Completeness
• Amounts for goods or services received are recorded in the appropriate period. • Valuation
• Accounts payable are adjusted only for valid reasons. • Completeness, Existence
• Credit notes and other adjustments are accurately calculated and recorded. • Valuation
• All valid credit notes and other adjustments related to AP are input and processed. • Completeness, Existence
• Credit notes and other adjustments are recorded in the appropriate period. • Valuation
• Disbursements are made only for goods and services received. • Existence
• Disbursements are distributed to the appropriate suppliers. • Existence
• Disbursements are accurately calculated and recorded. • Valuation
• All disbursements are recorded. • Completeness
• Disbursements are recorded in the period in which they are issued. • Valuation
• Only valid changes are made to the supplier master file. • Completeness, Existence
• All valid changes to the supplier master file are input and processed. • Completeness Existence
• Changes to the supplier master file are accurate. • Valuation
• Changes to the supplier master file are processed in a timely manner. • Completeness, Existence
• Supplier master file data remain up to date. • Completeness, Existence
65. Sample Areas for Review in Accounts Payable
Duplicate Payments
Duplicate Invoices
Duplicate Invoices Using Vendor’s
Numeric Invoice Values
Vendor Payments Made Over A
Weekend
Invoice Greater Than A Threshold
Purchase Order Date After The Invoice
Date
Vendor Paid By Both Purchase Order &
Sundry Expense
Invoices Greater Than Approved
Purchase Orders
Manually Released Invoice (No 3 Way
Match)
Outlier Invoices
66. Area: Duplicate Payments
• High volumes of payments from all areas of the business are
processed through the Finance function every day or payment
cycle. It is vital to closely and continuously monitor these
payments to detect potential fraud or errors.
Context
• A vendor is paid twice or more, often through administrative
errors or fictitious vendor invoices being submitted for payment
with details similar to an original valid invoice. This may result in
overpayment to vendors or irrecoverable financial losses.
Risk
• Identifies potential duplicate payments made to the same
vendor for the same amount within a configurable time period
(e.g. 14 days, 30 days).
Procedure
• Extracts payments within a user-specified period of days and
identifies potential duplicate payments to the same vendor
(using system vendor ID) with the same value (using document),
while excluding reversed transactions.
Analytic Logic
67. Area: Duplicate Invoices
• Often the same invoice is captured multiple times despite preventive
system validation and controls being in place. Administrative errors or
application control circumvention results in additional and/or changed
characters to the invoice number, causing duplicate invoice capturing
that would otherwise be undetectable.
Context
• The same vendor invoice is presented twice for payment or
fictitious/invalid vendor invoices are paid. This may result in either
overpayment or incorrect payment to vendors and often irrecoverable
financial losses from fraudulent and/or invalid invoices being paid.
Risk
• Identifies duplicate paid invoices for the same amount after stripping
out any special characters in the invoice numbers.
Procedure
• Extracts all paid invoices after removing/stripping out special characters
(e.g. ~!@#$%) from the invoice number field (which is normally a free
text field in the ERP system)
Analytic Logic
68. Area: Duplicate Invoices
• The same invoice is captured multiple times despite preventive system
validation and controls being in place. Administrative errors or
application control circumvention may result in additional and/or
changed characters to invoice number, causing duplicate invoice
capturing that would otherwise be undetectable.
Context
• The same vendor invoice is presented twice for payment or
fictitious/invalid vendor invoices are paid. This may result in either
overpayment or incorrect payment to vendors and often irrecoverable
financial losses from fraudulent and/or invalid invoices being paid.
Risk
• Identifies duplicate paid invoices for the same amount after stripping out
any special characters in the invoice numbers.
Procedure
• Extracts all paid invoices after removing/stripping out special characters
(e.g. ~!@#$%) from the invoice number field (which is normally a free
text field in the ERP system)
Analytic Logic
69. Area: Duplicate Invoices Using
Vendor’s Numeric Invoice Values
• Vendor payments, being a standard and regular organizational process,
are expected to be executed during normal business hours. Payments
over weekends may indicate fraudulent or suspicious activity and should
be reviewed for such.
Context
• Potentially invalid or fraudulent vendor transactions which may result in
overpayment to vendors or often irrecoverable financial losses.
Risk
• Identifies where the payment release date falls on a weekend. Release
dates are utilized as this is the point of authorization and are expected to
take place during normal business hours; occurrence on a weekend could
indicate unusual or unauthorized transactions.
Procedure
• Analyses all payment release dates in the system and indicates if this
date falls on a Saturday or Sunday whereby it will be listed as an
exception.
Analytic Logic
70. Area: Vendor Payments Made Over A Weekend
• Vendor payments, being a standard and regular organizational process,
are expected to be executed during normal business hours. Payments
over weekends may indicate fraudulent or suspicious activity and should
be reviewed for such.
Context
• Potentially invalid or fraudulent vendor transactions which may result in
overpayment to vendors or often irrecoverable financial losses.
Risk
• Identifies where the payment release date falls on a weekend. Release
dates are utilized as this is the point of authorization and are expected to
take place during normal business hours; occurrence on a weekend could
indicate unusual or unauthorized transactions.
Procedure
• Analyses all payment release dates in the system and indicates if this
date falls on a Saturday or Sunday whereby it will be listed as an
exception.
Analytic Logic
71. Area: Invoice Greater Than A Threshold
• All vendor invoices should be approved in terms of the correct level of
authority for the organization. Differing levels of authority are required
for purchases or invoices above certain levels; more senior people in the
organization approve higher value & materially significant transactions..
Context
• Inappropriately reviewed and authorized transactions which could be
caused by a lack of, or outdated, level of authority.
Risk
• Produces a listing of invoices paid above a configurable minimum and
maximum threshold (financial value) to determine authorization process
for testing. These transactions should be tested for accuracy, validity and
approval.
Procedure
• Extracts invoices greater than the client-configured thresholds to create a
listing for level of authority testing by audit, for example, all invoices
greater than Rs. 10,000 and up to Rs. 20,000.
Analytic Logic
72. Area: Purchase Order Date After The Invoice Date
• Best practice procurement procedures dictate that purchase order
approvals should precede an invoice. Any purchase orders approved after
an invoice should be reviewed and examined to understand the reasons
and if there was a control breakdown.
Context
• Ineffective procurement due to finance and procurement procedures not
being followed which may result in the payment of invalid or unapproved
purchases.
Risk
• Identifies where the invoice date precedes the purchase order approval
date.
Procedure
• Extracts invoices and related purchase orders where the invoice date is
before the purchase order approval date.
Analytic Logic
73. Area: Vendor Paid By Both Purchase Order &
Sundry Expense
• Vendor payments are expected to be as a result of a transaction in either
the procurement system (via purchase order) or a sundry expense. A
vendor should be processed through either process but not both. Sundry
expenses require less processing and attract less controls.
Context
• Unauthorised invoices outside the scope defined in the purchase order
could be paid because less stringent procurement controls exist for
sundry expenses. This may result in unauthorized, invalid, excessive or
potentially fraudulent payments.
Risk
• Identifies vendor invoices which are paid by both a PO and by a sundry
expense. These vendors should be reviewed to understand why they are
being paid as both a procurement & sundry expense when it is expected
all transactions should be in line with a PO for a repetitive vendor.
Procedure
• Summarizes vendors' invoices to extract the latest transactions where
vendor invoices were processed through both a sundry expense and a
purchase order.
Analytic Logic
74. Area: Invoices Greater Than Approved Purchase Orders
• A vendor invoice should not typically exceed the value approved in the
purchase order as the underlying procurement process has vetted the
vendor at a predetermined price.
Context
• Invoices exceeding purchase orders could be caused by unauthorised
changes to the initially agreed upon services or goods. This may result in
unauthorised spending, overspending or potentially fraudulent spending.
Risk
• Extracts all invoices exceeding the value of the related approved
purchase order from a configurable threshold/specified value and above.
.
Procedure
• Extracts and compares the value on the invoice to the total value of the
approved purchase order and identifies instances where invoice value
exceed the purchase order by the configurable threshold value, for
example invoices greater than a PO beyond specified amount.
Analytic Logic
75. Area: Manually Released Invoice (No 3 Way Match)
• A three-way-match is performed between a purchase order, goods
received note and invoice to ensure details are correct before making
payment to the vendor. A payment should not be automatically made
unless this match is performed and reconciliation achieved.
Context
• Fictitious, invalid or incorrect payments are caused by a user manually
releasing a payment to a vendor and not relying on the automatic
payment from a successful three-way-match.
Risk
• Identifies manually released invoices (paid and unpaid) where a three-
way-match, between the invoice, purchase order and goods received
note did not occur. .
Procedure
• Extracts all invoices and highlights transactions without correct three-
way-match which have been manually released for payment (either
before or after payment).
Analytic Logic
76. Area: Outlier Invoices
• An outlier is an observation point that is distant from other observations.
Transactions outside the norm with vendors are generally not expected,
but could go unnoticed if high volumes of transactions are processed.
Context
• Fictitious, invalid or incorrect payments made to vendors.
Risk
• Identifies outlier invoices by using standard deviations to determine
amounts that deviate significantly from the expected amounts posted to
a vendor. .
Procedure
• Extracts all invoice amounts greater than a configurable number of
standard deviations from the median amount for that vendor.
Analytic Logic
77. Specific Use Case: Accounts Payable
Sample CAAT Queries Performed
1. Calculate cash requirements by bank, period,
product, vendor, etc.
2. Calculate days in Accounts Payable and
average days for invoices to be paid
3. Check vendor address against mail address
lists
4. Compare supplier names, addresses and other
information to those of employees
5. Compare supplier price lists to EDI invoice
charges to ensure billings are in accordance
with agreements
6. Compare the master file at two dates to
identify new suppliers
7. Correlate vouchers or invoices posted versus
purchase order amounts
8. Create activity summaries for suppliers with
duplicate products
9. Create activity summaries for suppliers with
duplicate products
10. Extract invoices posted with duplicate
purchase order numbers
11. Find invoices without purchase orders
12. Identify debit balances
13. Identify invoices with missing order
numbers
14. Identify vendor unit price variances by
product over time
15. Isolate vendor unit price variances by
product
16. Match subsequent period payments against
period & balances to identify unmatched
payments
17. Reconcile check register to disbursements
by vendor invoice
18. Select and report details of various types of
accounts and compare with turnover
19. Summarize invoices by supplier to prove
individual balances
20. Test for duplicate payments/invoices77
78. eCAAT can be the Google maps for your Analytics Journey!
Data is the new Oil, but Analytics is the Engine which powers it
eCAAT Empowers you with Engine of Data Analytics!
79. Add-in to MS
Excel Software
Easy to use and
Simple to Learn
Look & Feel of
MS Excel but
with power of
Database
Powerful Data
Analytics/BI/FI
with > 350
Functions
Perform Complex
Analysis in a Few
clicks with Auto
Documentation
Why use eCAAT Ent?
Data Analytics Simplified!
80. Thank you!
Email: sales@wincaat.com
Watch videos of demo of specific functions of eCAAT
Intro to eCAAT: (https://www.wincaat.com/Products/eCAATEnt.aspx)
Webinar Recordings of eCAAT
(https://www.wincaat.com/Training/Webinars.aspx#eCAATWebinars)