Are You Doing Enough to Prevent Access Risk and Fraud?
This presentation provides an overview of The Following topics: insiderRESEARCH Survey Overview and Results, Case study: Lockheed Martin, SAP BusinessObjects Access Control, Q&A.View this Presentation
View ArticleHave you seen this webinar?
Are You Doing Enough to Prevent Access Risk and Fraud? (originally aired on Feb 1, 2012) Webinar Information insiderRESEARCH recently surveyed SAP ERP customers to determine how they manage their...
View ArticleProblem to manually add an object in function
good morning problem tomanuallyadd an objectin afunction,inboth theERPandGRC,ERM, as theaddedfunction afterdisappears.canyou help me?thank you
View ArticleA Detailed Guide to the Available Reporting Options with SAP Governance,...
Detailed guide to available reporting options with GRC 10.0 Solutions. Standard reports using ALV, Integration with BW using BI 4.0 Suite, and Custom reports.View this Presentation
View ArticleGRC Risk Management and Process Control 10.0 Content Starter Kits
This document shows how customers can leverage GRC Risk Management and GRC Process Control specific content provided in three starter kits – Risks Library, Controls Library, and KRI Library. This...
View ArticleConfigure Emergency Access (EAM) in GRC 10
Hello! Configuring EAM in GRC 10 isn’t a difficult task, but there’re some details you have to take into account. The document “AC 10.0 Pre-Implementation From Post-Installation to First Emergency...
View ArticleUsing RiskBusiness Content with GRC Risk Management and Process Control 10.0
This document shows how customers can use content from RiskBusiness – an international risk advisory firm that specializes in the design and delivery of integrated operational and enterprise risk...
View ArticleHow to Leverage SAP NetWeaver Identity Management and SAP Access Control...
This paper provides an overview of the integrated solution and a summary of implementation options for deploying a combined solution based on SAP Access Control and NetWeaver Identity Management. This...
View ArticleGRC PC 10 Support Pack 11
Support Pack 11 has been released for GRC 10. For Process Control the service pack includes the notes included in the attached spreadsheet. Virtually all of these notes are bug fixes. Please review...
View ArticleSAP Insider: Master the SEPA End-Date Regulation with SAP Payment Engine
While the Single Euro Payments Area (SEPA) initiative is intended to simplify banking across the European Union, the process of becoming compliant before SEPA fully takes effect in February 2014 is...
View ArticleGRC PC 10 Support Pack 12
Support Pack 12 has been released for GRC 10. For Process Control the service pack includes the notes included in the attached spreadsheet. Virtually all of these notes are bug fixes. Please review...
View ArticleGRC AC 10: RAR - no analysis results
Hello,i configured my system accoring the configuration guides.But when I start e.g. Access Risk Analysis for User Level/Role Level/Profile Level... no output data will be displayed!?i ran all the...
View ArticleFeatured Content for SAP HANA Fraud Management
SAP Fraud Management @HANASAP Fraud Management is a cross industry solution to analyze, detect, investigate, and prevent fraud and irregularities in ultra-high data environments. It targets both...
View ArticleConfigure Manager Look-Up in ARM for GRC 10
Configuring ARM in GRC10 isn’t a difficult task if you know which details you have to take into account. This document gives you an overview of which information is required. It doesn’t consider all...
View ArticleHow to create a MSMP BRF+ initiator rule using loop and table operation
In MSMP, Access Controls 10.0 and 10.1 provides extremely flexible and powerful tool to configure workflows. In this document we will see how to create BRF+ (NOT line item by line item) msmp initiator...
View ArticleGRC Risk Management and Process Control 10.0 Content Starter Kits
This document shows how customers can leverage GRC Risk Management and GRC Process Control specific content provided in three starter kits – Risks Library, Controls Library, and KRI Library. This...
View ArticleAC10.0/10.1: Create Rule Based on Risk Violation in Request, Using BRF+...
In Access Request, sometimes you would want to route your request based on the risk violations present in the request. There are some standard function module based detour/initiator rules which are...
View ArticleCustomizing Access Control Screens
A common need for many companies is tocustomize access request and approval ABAP Web Dynpro screens of 10.0 and 10.1based on the business requirements. Though the IMG customizing in SAP GRC access...
View ArticleConfiguration Steps to make any Connector available for External Applications
Below are the configuration steps to make any connector available for external applications e.g. NW IDM: Step1: Go To Tcode SPRO in the GRC box.Step 2: Click on ‘Create Connectors’ (Connector creation...
View ArticleDetails on Training and verification System
1.Business Scenario As part of business requirement, a user might have to go through some training while requiring access to operate certain critical transactions. To cater to this requirement, CUP has...
View Article