Early in 2012, SAP commissioned an independent study to understand how companies are preventing access risk and fraud. A vast majority of the 183 research respondents confirmed that managing access risks were "very" or "extremely" important to senior leadership in their organizations. Yet the same group found it challenging to establish and maintain a program for managing access risk.
Access risk management describes the set of processes and controls that are put in place to manage the risk of users having too much access to business systems, including segregation of duties (SoD) and critical access, super user access, the compliant provisioning of users, periodic user and role certifications, and the design and maintenance of compliant roles.
There are two main causes to this problem:
- Manual processes - the company has not automated manually intensive and error prone processes
- Lack of best practices - the company has no formal program with best practices and processes for access control management, governance and reporting
The implications of giving unrestricted access to applications, systems and information to employees and other stakeholders as well as security breaches can impact a company's reputation and bottom line. The accelerated adoption of mobile devices in enterprises introduces new risks and complexities that need to be factored in to an effective and efficient way to manage access control and minimize risk.
During this webinar you'll learn from Greg Clarke, Partner with SB Partners LLP, some of the challenges that companies are overcoming by implementing enterprise wide access risk control programs best practices. He'll also provide some insights on why existing access control "solutions" aren't working.
Next, Erin Hughes will share how implementation of best practices and automation of your access controls program, will more effectively secure your enterprise and reduce your risk exposure . You will also see how to monitor and secure your enterprise from unauthorized access while increasing productivity using SAP Access Control and the SAP Access Approver mobile app.
Comments