SlideShare una empresa de Scribd logo
1 de 23
CSI Accelerator ®
    Reporting Features


       Johan Hermans
       CEO
       johan.hermans@csi-tools.com
Observe. Think. Act.

CSI tools developed dynamic analytics tools that deliver
intelligence from and to decisions taken in identity and
access governance for SAP® environments.

CSI tools’ cockpit and engine

   provide insight into your real vulnerabilities,

   streamline SAP® roles and then

   deliver practical solutions to improve your risk/security




                                                                   © CSI tools. All Rights Reserved.
   posture, like automated role building and reverse
   engineering.




                                                               2
Globally Referenced
by hundreds of customers

CSI tools’ references are essentially “Fortune 1000” accounts and
medium accounts in various sectors like Aerospace & Defense,
Automotive, Bank & Insurance, Chemical, Consultancy and Audit,
Energy, Oil & Utilities, ICT and Telecom, Manufacturing Industry,
Pharmaceutical and Health, Public Organizations, Retail, Transport, etc.




                                                                               © CSI tools. All Rights Reserved.
                                                                           3
Maturity Level Impacts Optimal Starting Point

                                  CB: Codification Builder
                                  to document Business Requirements
        CO        CB
                                  AO: Authorization Organizer
                                  to make, derive and assign (job)roles

SoD                          AO   SIMulate: to assess access
                                  management decisions on users and
                                  roles

                                  QA: Quality Assurance / Audit
  AR                   SIM
                                  AR: Access Rights Reporting




                                                                              © CSI tools. All Rights Reserved.
             QA
                                  SoD: Segregation of Duties
                                  CO: Controls Organizer
                                  to manage risks, controls, …



                                                                          4
Main Benefits of CSI Accelerator®

Features:
  Integrated solution to manage or control you SAP users,
  SAP roles, SoD conflicts, Risks and control measures
  The only tool that keeps track of the documentation during
  building, changing, monitoring and curing
  Strong reporting console and dashboards
     total flexibility, since every grid of CSI Accelerator can be
     directly exported to external sources.

Purpose:
  Rationalize your business requirements, documentation,




                                                                         © CSI tools. All Rights Reserved.
  templates, role building, role accuracy, provisioning,
  consistency of access rights over systems, context
  information for Security Intelligence, SoD, used functionality
  versus assigned access rights, risks, compensating controls,
  control measures, …

                                                                     5
Analysis Cockpit with Drill Down
to monitor your own KPI, KPR, projects, objectives, …




                                                            © CSI tools. All Rights Reserved.
                                                        6
Master – Derived Analysis
Detect and Manage Role Deviation

Deviations from template roles need to be detected easily




                                                                © CSI tools. All Rights Reserved.
                                                            7
Role Content is Deviating from Documentation
Systems can have millions of authorization lines




                                                       © CSI tools. All Rights Reserved.
                                                   8
How Much of a Role is Being Used
Intelligence reports to rationalize the role content and use




                                                              © CSI tools. All Rights Reserved.
                                                          9
Reports Transactions Usage
what users can do versus what users did




                                           © CSI tools. All Rights Reserved.
                                          10
SoD Reports
with causing information to solve the conflicts




                                                   © CSI tools. All Rights Reserved.
                                                  11
The Holistic View
Overview of compensating controls by drag & drop




                                                    © CSI tools. All Rights Reserved.
                                                   12
Reporting Console

     Select a              Short description about the
     report.                        report.                         This will explain which details are shown
                                                                          when selecting detail levels.




                                  Select the details you want on the report.

                                                                                         This section defines
                                                                                              the global
                                Select which items you want on the                       parameters of the
                                              report.                                           report.




                                                                                                                 © CSI tools. All Rights Reserved.
This section will further restrict the items selected on the report based on the relations of the main
                                                 item.
                                                                                                                13
Dashboard


For all data dashboards exist or
can be created in less then 5
minutes
Dashboard designer to fine-tune




                                    © CSI tools. All Rights Reserved.
                                   14
Dashboard Designer




15




     © CSI tools. All Rights Reserved.
Auditing / Monitoring with CSI Accelerator®

Efficient (ROI)
   Can be done remotely avoiding all types of collateral costs
   such as hotel expenses

   Can be done online with instant access to intelligence reports
Effective (Best Practice / Security Improvement)
   Mergers: IT risks are known within the week
   QA check on your SAP monitoring system
   Simulation on rule changes
   How much does the system deviate




                                                                    © CSI tools. All Rights Reserved.
Tuned for business readiness
   Dynamic and pointed on demand on any SAP system
   Mergers: process & IT risks are known in the week
   Report on Desired state versus Actual state
                                                                 16
Thank you
Additional slides – The automated creation part

                               Johan Hermans
                               CEO
                               johan.hermans@csi-tools.com
CSI Accelerator Role Building

Efficient
   Build 10.000 roles in one day
   Automated – replace manual work

Effective Security Improvements
   Roles are streamlined (cross-system)
   Grouping of business units is automatically done
   Context is known (for Security Intelligence)
   Continuous monitoring of wrong values in roles

Business enabler




                                                              © CSI tools. All Rights Reserved.
   Simplify your job roles
   Fast integration in case of mergers or de-mergers
   Copy requirements for new SAP systems (CRM, SRM, …)
   Fast access inplementation of SAP in new countries
   Fast authorization implementation of new modules in SAP

                                                             18
Codification
Documenting the Business Requirements




                                                           © CSI tools. All Rights Reserved.
                                                          19
                            © CSI - all rights reserved
C
Automated Translation of                                 Codification



Documentation into Roles




                                                                        © CSI tools. All Rights Reserved.
                                                                   20
                           © CSI - all rights reserved
CSI Accelerator – Check configuration
Customizing of SAP checked automatically




                                            © CSI tools. All Rights Reserved.
                                           21
CSI Accelerator – SAP License Manager

Allows to simulate the SAP license impact from the
authorizations assigned and authorizations used




                                                      © CSI tools. All Rights Reserved.
                                                     22
CSI Accelerator ®
Identity and Access Governance for SAP® Environments


                                     Johan Hermans
                                     CEO
                                     johan.hermans@csi-tools.com

Más contenido relacionado

Similar a Cs itools06 csia_reporting_features_v10

Making the Move to SaaS: 10 Key Technical Considerations
Making the Move to SaaS: 10 Key Technical Considerations Making the Move to SaaS: 10 Key Technical Considerations
Making the Move to SaaS: 10 Key Technical Considerations OpSource
 
Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureNewvewm
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI tools
 
Sample Mobile Apps PRD
Sample Mobile Apps PRDSample Mobile Apps PRD
Sample Mobile Apps PRDUjjwal Trivedi
 
Microsoft .NET Portfolio
Microsoft .NET PortfolioMicrosoft .NET Portfolio
Microsoft .NET PortfolioEnterra
 
E P Pidilite 1 K E Y M I S
E P  Pidilite 1 K E Y  M I SE P  Pidilite 1 K E Y  M I S
E P Pidilite 1 K E Y M I SSanjay Mehta
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...NRB
 
1KEY 2.0.2 Datasheet
1KEY 2.0.2 Datasheet1KEY 2.0.2 Datasheet
1KEY 2.0.2 DatasheetDhiren Gala
 
1 K E Y Data Sheet
1 K E Y  Data  Sheet1 K E Y  Data  Sheet
1 K E Y Data SheetSanjay Mehta
 
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...NetworkCollaborators
 
SANscreen Customer Preso 18 Jun09
SANscreen Customer Preso 18 Jun09SANscreen Customer Preso 18 Jun09
SANscreen Customer Preso 18 Jun09rosaranger
 
Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013Leigh Williamson
 
Intro to citicus_one_r3
Intro to citicus_one_r3Intro to citicus_one_r3
Intro to citicus_one_r3citicus
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem Jade Global
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 

Similar a Cs itools06 csia_reporting_features_v10 (20)

CMDB as a Corporate Asset
CMDB as a Corporate AssetCMDB as a Corporate Asset
CMDB as a Corporate Asset
 
Making the Move to SaaS: 10 Key Technical Considerations
Making the Move to SaaS: 10 Key Technical Considerations Making the Move to SaaS: 10 Key Technical Considerations
Making the Move to SaaS: 10 Key Technical Considerations
 
Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud Infrastructure
 
CSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 BrochureCSI Authorization Auditor 2014 Brochure
CSI Authorization Auditor 2014 Brochure
 
Sample Mobile Apps PRD
Sample Mobile Apps PRDSample Mobile Apps PRD
Sample Mobile Apps PRD
 
Draft prd
Draft prdDraft prd
Draft prd
 
Microsoft .NET Portfolio
Microsoft .NET PortfolioMicrosoft .NET Portfolio
Microsoft .NET Portfolio
 
E P Pidilite 1 K E Y M I S
E P  Pidilite 1 K E Y  M I SE P  Pidilite 1 K E Y  M I S
E P Pidilite 1 K E Y M I S
 
Implementing Governance as Code
Implementing Governance as CodeImplementing Governance as Code
Implementing Governance as Code
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
NRB MAINFRAME DAY 05 - Paul Pilotto - How to extract business rules from Lega...
 
1KEY 2.0.2 Datasheet
1KEY 2.0.2 Datasheet1KEY 2.0.2 Datasheet
1KEY 2.0.2 Datasheet
 
1 K E Y Data Sheet
1 K E Y  Data  Sheet1 K E Y  Data  Sheet
1 K E Y Data Sheet
 
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
Cisco Connect 2018 Malaysia - It transformation-an imperative for driving bus...
 
SANscreen Customer Preso 18 Jun09
SANscreen Customer Preso 18 Jun09SANscreen Customer Preso 18 Jun09
SANscreen Customer Preso 18 Jun09
 
Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013Mobile Testing Presentation at IBM Pulse 2013
Mobile Testing Presentation at IBM Pulse 2013
 
Intro to citicus_one_r3
Intro to citicus_one_r3Intro to citicus_one_r3
Intro to citicus_one_r3
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Cs itools06 csia_reporting_features_v10

  • 1. CSI Accelerator ® Reporting Features Johan Hermans CEO johan.hermans@csi-tools.com
  • 2. Observe. Think. Act. CSI tools developed dynamic analytics tools that deliver intelligence from and to decisions taken in identity and access governance for SAP® environments. CSI tools’ cockpit and engine provide insight into your real vulnerabilities, streamline SAP® roles and then deliver practical solutions to improve your risk/security © CSI tools. All Rights Reserved. posture, like automated role building and reverse engineering. 2
  • 3. Globally Referenced by hundreds of customers CSI tools’ references are essentially “Fortune 1000” accounts and medium accounts in various sectors like Aerospace & Defense, Automotive, Bank & Insurance, Chemical, Consultancy and Audit, Energy, Oil & Utilities, ICT and Telecom, Manufacturing Industry, Pharmaceutical and Health, Public Organizations, Retail, Transport, etc. © CSI tools. All Rights Reserved. 3
  • 4. Maturity Level Impacts Optimal Starting Point CB: Codification Builder to document Business Requirements CO CB AO: Authorization Organizer to make, derive and assign (job)roles SoD AO SIMulate: to assess access management decisions on users and roles QA: Quality Assurance / Audit AR SIM AR: Access Rights Reporting © CSI tools. All Rights Reserved. QA SoD: Segregation of Duties CO: Controls Organizer to manage risks, controls, … 4
  • 5. Main Benefits of CSI Accelerator® Features: Integrated solution to manage or control you SAP users, SAP roles, SoD conflicts, Risks and control measures The only tool that keeps track of the documentation during building, changing, monitoring and curing Strong reporting console and dashboards total flexibility, since every grid of CSI Accelerator can be directly exported to external sources. Purpose: Rationalize your business requirements, documentation, © CSI tools. All Rights Reserved. templates, role building, role accuracy, provisioning, consistency of access rights over systems, context information for Security Intelligence, SoD, used functionality versus assigned access rights, risks, compensating controls, control measures, … 5
  • 6. Analysis Cockpit with Drill Down to monitor your own KPI, KPR, projects, objectives, … © CSI tools. All Rights Reserved. 6
  • 7. Master – Derived Analysis Detect and Manage Role Deviation Deviations from template roles need to be detected easily © CSI tools. All Rights Reserved. 7
  • 8. Role Content is Deviating from Documentation Systems can have millions of authorization lines © CSI tools. All Rights Reserved. 8
  • 9. How Much of a Role is Being Used Intelligence reports to rationalize the role content and use © CSI tools. All Rights Reserved. 9
  • 10. Reports Transactions Usage what users can do versus what users did © CSI tools. All Rights Reserved. 10
  • 11. SoD Reports with causing information to solve the conflicts © CSI tools. All Rights Reserved. 11
  • 12. The Holistic View Overview of compensating controls by drag & drop © CSI tools. All Rights Reserved. 12
  • 13. Reporting Console Select a Short description about the report. report. This will explain which details are shown when selecting detail levels. Select the details you want on the report. This section defines the global Select which items you want on the parameters of the report. report. © CSI tools. All Rights Reserved. This section will further restrict the items selected on the report based on the relations of the main item. 13
  • 14. Dashboard For all data dashboards exist or can be created in less then 5 minutes Dashboard designer to fine-tune © CSI tools. All Rights Reserved. 14
  • 15. Dashboard Designer 15 © CSI tools. All Rights Reserved.
  • 16. Auditing / Monitoring with CSI Accelerator® Efficient (ROI) Can be done remotely avoiding all types of collateral costs such as hotel expenses Can be done online with instant access to intelligence reports Effective (Best Practice / Security Improvement) Mergers: IT risks are known within the week QA check on your SAP monitoring system Simulation on rule changes How much does the system deviate © CSI tools. All Rights Reserved. Tuned for business readiness Dynamic and pointed on demand on any SAP system Mergers: process & IT risks are known in the week Report on Desired state versus Actual state 16
  • 17. Thank you Additional slides – The automated creation part Johan Hermans CEO johan.hermans@csi-tools.com
  • 18. CSI Accelerator Role Building Efficient Build 10.000 roles in one day Automated – replace manual work Effective Security Improvements Roles are streamlined (cross-system) Grouping of business units is automatically done Context is known (for Security Intelligence) Continuous monitoring of wrong values in roles Business enabler © CSI tools. All Rights Reserved. Simplify your job roles Fast integration in case of mergers or de-mergers Copy requirements for new SAP systems (CRM, SRM, …) Fast access inplementation of SAP in new countries Fast authorization implementation of new modules in SAP 18
  • 19. Codification Documenting the Business Requirements © CSI tools. All Rights Reserved. 19 © CSI - all rights reserved
  • 20. C Automated Translation of Codification Documentation into Roles © CSI tools. All Rights Reserved. 20 © CSI - all rights reserved
  • 21. CSI Accelerator – Check configuration Customizing of SAP checked automatically © CSI tools. All Rights Reserved. 21
  • 22. CSI Accelerator – SAP License Manager Allows to simulate the SAP license impact from the authorizations assigned and authorizations used © CSI tools. All Rights Reserved. 22
  • 23. CSI Accelerator ® Identity and Access Governance for SAP® Environments Johan Hermans CEO johan.hermans@csi-tools.com