The queries made by auditors always give us a headache, either because of the difficulty in finding the right answer or because it forces us to dedicate time that we do not have. That is, a headache always! After reviewing the system with their own software tools, they give us their reports to which we […]
It is common for our users to have assigned roles that they do not use (1). Our solution, CentinelBox, addresses this issue in the following way: 1. Identification: We use the report of unused roles by user accounts. It is simple and allows defining a time horizon parametrically, reviewing the last 24 months, 48 months, […]
Improving the quality of SAP System security is not a matter of time. Improvements and remediation of roles between 10% and 25% of the time using standard methods! The need to enhance security always faces a significant obstacle: time and available personnel for the task. With CentinelBox, you can perform tasks in much shorter timeframes […]
In our previous release, we introduced our solution for enhancing security without being hindered by the ever-present problem of needing to implement changes urgently with limited resources. Now, let’s delve into CentinelBox’s functionality for making mass changes to roles. Challenges that arise: ➡️ During the migration from SAP ECC to S/4 Hana: -> Obsolete transactions […]
The need to make security improvements always faces an often insurmountable obstacle: time and available personnel. These tasks are slow and extensive, starting with determining the details of the improvements and then implementing them. We face several challenges: ➡ There are user accounts with many roles and assigned transactions, yet only a fraction of them […]
We know that the annual visit from external auditors can be a real challenge for any organization. Wanna turn it into a smooth and successful experience? If you’ve got CentinelBox, you’ve got the solution right at your fingertips. Our innovative risk management system provides you with the necessary tools to tackle the challenges of audits […]
The difficulty faced by executives – and many CISOs – is understanding the logic and high level of data disaggregation required by SAP security privilege definitions and how to trust that there will be no leaks of classified information or fraud in system usage. There are no simple answers. Moreover, considering that annual reviews by […]