Governance, Risk, Compliance (GRC), and Cybersecurity
602 Blog Posts
125 Contributors
-
Let’s understand with a use case: A global enterprise that uses SAP for its operations employed an executive who sensitive customer and financial information as part of his job. He was later promoted to a different position and was given new... Read More »0Comments0Likes -
SAP Concur commits to maintaining the confidentiality, integrity, and availability of customer data and the development of solutions through the adoption of the SAP global security policy and internationally recognised standards. This blog covers... Read More »1Comment2Likes -
IBM Security QRadar suite is a Security Information and Event Management (SIEM) solution that generates prioritised, high-fidelity alerts in real time by correlating analytics, threat intelligence, and network and user behaviour anomalies to assist... Read More »0Comments1Like -
In this blog, we will explain how to use IBM Security Verify with SAP BTP and how to configure password-less multi-factor authentication (MFA), requiring users to provide two forms of identification, bolstering protection against unauthorised... Read More »0Comments0Likes -
Introduction In this blog, we will learn how to prevent SAP GUI Programs from starting. When unauthorized users attempt to start a program, they will be shown a message that program is blocked by UI data protection masking. From the perspective of... Read More »5Comments1Like -
Introduction In this blog, we will learn how to prevent SAP GUI transactions from starting. When unauthorized users attempt to start a transaction, they will be shown a message that transaction is blocked by UI data protection masking. From the... Read More »4Comments3Likes -
Do you know what happened in 2016? So many great things! Netflix added offline downloads, a leading environmental group reclassified giant pandas as a “vulnerable” species rather than “endangered” one… and we released the very first GRC... Read More »0Comments0Likes -
Firefighter login into GRC system or plugin system and using GRAC_EAM or /GRCPI/GRIA_EAM transaction respectively. After SP21 Log Off button is explicitly provided to end the FF session. This helps in recording the exact time of FFID log off. Also,... Read More »0Comments0Likes -
Introduction In this blog, we will learn how to mask IBAN field information based on Company Code field information of SAF-T PL Bank Statement Item Analytical Query. Analytical Queries are used for reporting and analysis. IBAN field information of... Read More »0Comments0Likes -
Introduction In this blog, we will learn how to mask Chart of Account field information based on G/L Account field information of Aging Analysis Smart Business app Analytical Query. Analytical Queries are used for reporting and analysis. Chart... Read More »0Comments1Like