SAP Brief Extensions SAP Access Violation Management by Greenlight Objectives Manage and Control Access Risk and Assess Its Financial Impact
Make access control decisions based on business impact Make access control decisions based on business impact Managing the access that business users have to enterprise applications is a balancing act. Granting too much leaves organizations exposed to higher risk, but granting too little prevents people from doing their jobs and slows business momentum. Organizations need insight into the financial impacts of access risk to make better, more proactive decisions about access control. The SAP Access Violation Management application by Greenlight can help. Today, organizations are going beyond traditional methods of manual business controls and ad hoc analyses by using integrated technology to automate risk identification and its impacts on the business. Exceptionbased monitoring controls and centralized functionality for tracking resolution of those exceptions reduce manual control efforts and eliminate false positives. By enabling enterprise-wide access governance and articulating the bottom-line impacts of access risk on your organization, you can drive business changes when traditional manual controls are insufficient to mitigate the actual financial exposure of access risks. 2 / 8
Summarize the bottom-line impact of access risk A certain level of access risk is unavoidable to eradicate it all would limit business productivity. But in many cases, the controls that companies put into place to mitigate risk are manually driven and time consuming. With the SAP Access Violation Management application by Greenlight, you can see the financial impact of access risk for business processes and transactions and enable a risk management strategy that suits your organization. SAP Access Violation Management lets you detail and summarize the dollar value of access violations for a true picture of your exposure to access risk. The application summarizes the financial value of actual access violations, instead of relying on incomplete data from sample testing, and clearly articulates the risk that user access has on the organization. Intuitive management dashboards and historical reports help business users prioritize and remediate violations. Powerful analytics can forecast risk impacts based on historical data and uncover violator trends and at-risk processes. Powerful analytics can forecast risk impacts and uncover violator trends and at-risk applications or business processes. 3 / 8
Summarize the bottom-line impact of access risk Summarize the bottom-line impact of access risk With SAP Access Violation Management, you can clearly articulate the financial exposure that unresolved access risks have on the business. The application automates the monitoring and correlation of business transactions to identify instances where actual segregation of duties (SoD) violations occurred, and it summarizes the financial dollar value by business process, risk, or user. The application includes a comprehensive library of configurable, automated controls based on best-practice experience that facilitate rapid deployment. Historical reports and management dashboards enable prioritization of remediation efforts and enable business users to take action. By associating a dollar value with unresolved access risk violations, you can drive organizational change to further minimize the risks of internal fraud and loss of revenue due to employee error. Articulate the financial exposure that access risk has on the business. 4 / 8
Summarize the bottom-line impact of access risk In most organizations, a certain level of SoD violations must be accepted for the business to function efficiently, and mitigating controls are implemented to address the remaining risk. Those controls, however, are typically manual in nature and locating actual exceptions is like searching for a needle in a haystack. SAP Access Violation Management enables exception-based monitoring of transactions to identify actual violations, notifying business owners only when exceptions occur. For example, a business user may need to maintain and issue payments to vendors. A mitigating control can be put in place to review a sample of vendors that have been created or changed compared to payments issued, to reduce the risk of internal fraud or employee error. With SAP Access Violation Management, you can automate the monitoring and correlation of transactions to identify instances where one business user maintained and paid the same vendor. This provides more comprehensive coverage than the incomplete approach of sample testing. Once exceptions are identified, the solution tracks investigation and resolution of each incident until issues are resolved in a graphical, intuitive user interface designed for business users. By doing so, the application reduces manual control efforts and false positives. 5 / 8
Summarize the bottom-line impact of access risk SAP Access Violation Management enables you to apply consistent and comprehensive access governance across enterprise applications. The application extends the capabilities of the SAP Access Control application across business applications and IT systems, eliminating administrative silos and enabling a more complete picture of business user access across the organization. SAP Access Violation Management enables real-time risk analysis and provisioning, user access reviews, role management, and superuser access management to on-premise, hosted, and cloud-based enterprise applications. The application includes a library of prebuilt integration functionality for a variety of SAP and non-sap applications for quick installation. Working together, SAP Access Control and SAP Access Violation Management enable a centralized approach to real-time risk analysis and centralized user and role administration. Centralize access governance activities across enterprise applications. 6 / 8
See how your business benefits See how your business benefits With SAP Access Violation Management, you can see the financial exposure of un resolved access risk to enable an effective risk management strategy and drive business process change. The application automates identifi cation and review of actual access violations, summarizes the financial dollar value of actual access violations, and enables centralized access governance across enterprise applications. SAP Access Violation Management provides you with a more complete picture of exposure and costs and clearly articulates how unresolved access risks affect your bottom line. When implemented with SAP Access Control, a comprehensive set of detective and preventive automated controls enable you to streamline access governance activities and reduce enterprise-wide access. Understand how unresolved access risk affects your bottom line. 7 / 8
www.sap.com Objectives Summary The SAP Access Violation Management application by Greenlight enables you to assess the financial exposure that business processes and transactions have on an organization. With exception-based access and centralized and standardized processes, you can automate violation identification and review, streamline access-risk processes, and cut governance costs. Objectives Enable centralized and standardized processes across business applications and IT systems Automate identification and review of actual access violations Summarize the financial impact of actual violations Summarization of the financial dollar value of access violations Alerts for business owners only when exceptions occur Comprehensive library of automated segregation-of-duties controls Intuitive interface designed for business users Extension of the functionality of the SAP Access Control application Gain a clear understanding of cost of access violations and impact on the organization Reduce manual control efforts and eliminate false positives Centrally track investigation and resolution of access violations Give business users ownership of remediation activities Learn more To find out more, call your SAP representative today or visit us online at www.sap.com/access-violation-management. 8 / 8 Studio SAP 31251enUS (14/05)