Main Title Header Here
|
|
- Jayson Stevens
- 6 years ago
- Views:
Transcription
1 Case Study: How The Coca-Cola Company Reduced Time and Effort Spent on User Access Reviews with an Automated Role Main Title Header Here and Security Clean-Up Process Subheader Description Kyleen Wissell The Coca-Cola Company
2 Value for The Coca-Cola System is driven by Consumer love for our brands Customer satisfaction Operating effectiveness and it is earned 1.7+ billion times a day with more than 3,500 products in over 200 countries April
3 In This Session We ll talk about what automation we leveraged in SAP GRC to build more efficient and effective risk management processes, and specifically how we analyzed the traditional manual efforts around reviewing and monitoring access assignments and determined certain predictive analytics and insights which could be derived for guiding our decisions To meet this objective, I will share certain foundational efforts we had to accomplish prior to improving the user access review processes
4 What We ll Cover Background: Our vision for improving access to information An overview of the security design leveraged to achieve guiding principles The process we designed for provisioning SAP entitlements What key decision we made which changed the actor responsible for participating in the approval process The guiding principles behind more effective user access reviews Which activity reviews were automated and how predictive analytics leveraged Role Narratives The key for maintaining improvements in access controls Wrap-up
5 Background: Our Vision for Improving Access to Information Vision: Improve security processes by developing an efficient, sustainable approach for assigning and monitoring access to information systems by utilizing a risk-based approach, aligned with business processes Simple Rationalize the number of access roles Scalable Standardize processes driving inefficiencies and higher costs Sustainable Increase capabilities for governing
6 Clearly Outlined Problem What (Activity Roles) Where (Organizational Boundaries) Who Legacy 107 Roles/1,898 Update Transactions 109 Countries Hypothetical User Optimized 9 Total Roles/35 Update Transactions Global L.A. N.A. Pacific Europe Eurasia So What? Show how your User has access to transactions not used in previous 12 months to perform activities perhaps not under their control or responsibility area: Perform Physical Inventory Adjustment Perform MRP Maintenance Perform Cash Application Reminder of why we are doing this (the business case): Balance risk vs. cost consideration Promote greater productivity and efficiency Allow flexibility for future organizational change Enable standardization of processes Define activities once and reuse globally
7 Our Vision Improve security processes by developing an efficient, sustainable approach for assigning and monitoring access to information systems by utilizing a risk-based approach, aligned with business processes Legacy Final State Optimized +25,000 SAP Users with +15,000 Roles results in +8,500 hours annually controlling & monitoring access +25,000 Users with ~ 1,600 Roles results in increased visibility into who has access to what Simple Lack of standardization and manual processes cause inefficiencies and higher costs Lower costs due to standardization and automation, increased confidence in how we are managing risk Scalable Inefficient use of resources and lack of clarity between IT and Business ownership Reduced compliance inefficiencies, clear role sort, increased capabilities for growth and more efficient onboarding Sustainable Key Solution: Be willing to add up the costs associated with inefficiencies
8 What Did We Do? Changed Mindsets Standardized SAP security design and provisioning, initially across the Finance and Human Resources environments Increased business accountability for security access, and increased support for governance oversight Supported business process transformation by providing visibility into who/where associates are performing business activities and cleaning up non-job related access Automated, risk-based access reviews to reduce compliance activities and the associated cost Expanded risk monitoring across additional SAP environments Provided a foundation for role-based security and the path for reducing SAP professional licenses Identified Business Need Help from business leads to own and manage security risks Increased security controls capabilities, shifting focus of resources towards managing risk and away from security maintenance and detective monitoring methods Accept living in multiple system worlds until remaining SAP environments are incorporated Utilized a risk-based approach aligned with business processes and performed diagnostics to identify where efforts weren t returning an invested value, e.g., manual compliance Classified - Internal efforts use
9 Outline of the Benefits Obtain the Value Global security design enables associates to see and do more by design, not by mistake Access expanded to the Group level and a reduction in access unrelated to the job Global security design enables associates to be leveraged across geographies Enabling alignment of resources with strategic priorities Increasing flexibility of resources so that activities are not tied to physical location Enhanced transparency of access information (who is doing what) leveraged to: Provide intelligence to create more centers of excellence Hone strategic capabilities Increased opportunities to scale, which provide asset and execution efficiencies that increase shareholder value in the Coca-Cola System and preparedness for our strategic vision Security access risks are managed more efficiently and effectively Costs for maintaining security are reduced Implemented standardized processes support company growth and organizational flexibility without increasing the complexity of security access
10 What We ll Cover Background: Our vision for improving access to information An overview of the security design leveraged to achieve guiding principles The process we designed for provisioning SAP entitlements What key decision we made which changed the actor responsible for participating in the approval process The guiding principles behind more effective user access reviews Which activity reviews were automated and how predictive analytics leveraged Role Narratives The key for maintaining improvements in access controls Wrap-up
11 Overview of the Role Design to Achieve Our Guiding Principles A user s access is made up of several small definable activities performed in SAP: Each activity is accessed via a single role, i.e., AP Invoice Processing Each activity is assigned to one of 4 distinct access levels which is risk-associated and data-classified, linked to the business process What they can do Common Display Organizational Boundary Update ACCESS DESIGN General Use Restricted Display Update Activity Update Activity Special Update Where they can do it Organizational Boundary Display LEVEL 1: General User Access WHAT NO RISK Activities common to all users, such as printing and inbox, are grouped together into a single role. This is given to every user. LEVEL 2: Display Access WHAT LOW RISK Activities which allow display and reporting only access are grouped by process area into a single role. These activities may be grouped at the process or sub-process level. One or more display roles can be given to a user and provide a display view that is common to all. LEVEL 3: Functional Access WHAT MEDIUM or HIGH RISK Activities which allow update access are grouped by sub-process area and divided into single roles for each part of a more granular activity performed. Profiles are used to provide the correct combination of roles required to complete each distinct activity. Info type and movement type restrictions are built into each role where appropriate. LEVEL 4: Locations WHERE MEDIUM RISK Access is given to a user at the Group level. One or more organizational boundary roles can be given to a user, to allow them to perform activities for multiple locations.
12 Final Rationalization Results Achieved 90% Reduction of Roles Human Resources 386 Roles What 71 Where 313 Specialty 0 Template 2 Internal Use 22 Confidential 67 Restricted 297 Highly Restricted 0 Finance 583 Roles What 371 Where 135 Specialty 70 Template 7 Internal Use 184 Confidential 253 Restricted 89 Highly Restricted Total Roles What 442 Where 448 Specialty 70 Template 9 Internal Use 206 Confidential 320 Restricted 386 Highly Restricted 57 Defining activities once and reusing globally reduces the number of required roles, unless transactions are configured to perform a different activity Role naming convention clearly identifies the purpose of the activity for transparency to the requester, approver, end user, and compliance partners Organizational boundary roles defined Classified at a higher - level Internal enable use the user to transact in multiple locations, which are groupings of company codes, plants, sales locations, etc.
13 What We ll Cover Background: Our vision for improving access to information An overview of the security design leveraged to achieve guiding principles The process we designed for provisioning SAP entitlements What key decision we made which changed the actor responsible for participating in the approval process The guiding principles behind more effective user access reviews Which activity reviews were automated and how predictive analytics leveraged Role Narratives The key for maintaining improvements in access controls Wrap-up
14 Actors in the Newly Designed Provisioning Process User completes an Access request form in Sharepoint Security team enters GRC request and routes to Business Steward Business Steward reviews request & runs risk analysis prior to decision Role Approver reviews business justification and makes approval decision Access is provisioned and measured against a 3-day SLA Post Deployment Workflow: KEY DECISION: The approval process shifted from Manager Approval to Business Steward-centric approval. These resources have a combination of security and internal controls backgrounds and sit at the Group level. They have knowledge of whether mitigating controls can be applied or whether the risk should be remediated, e.g., access removed. We have assessed what additional capabilities needed to be developed and began having regularly scheduled User Group calls with Business Stewards and Role Approvers, leveraged to deliver training, provide status updates and discuss or raise issues and concerns. Given that we are developing a road map for role-based security provisioning, we felt a greater focus and a sustainable investment in building capabilities for stewarding access management, subsequently reducing investment and focus for seeking manager approvals and involvement in user access reviews The key win is delivering a standard approach that is flexible and faster, but controlled and consistent.
15 RACI Chart Developed for Access Initiators, Business Stewards, Role Approvers & Security Operations Task # Task Description Capability Example Requestor Access Initiator Business Steward Role Approver 1 Identify need for change in access Ability to identify what system and what process. A/R - C C C 2 Enter request for access Knowledge of how to enter a GAM request on the GAM SharePoint or through local request process RACI ASSIGNMENTS Security Operations* A/R C C C C 3 Analyze Access Request Form for completeness and validity; Identify GAM roles needed Ability to identify if request is a valid request. C A/R C C C 4 Enter and submit GRC access request in AC Knowledge and ability to copy a user's profile within the GRC tool. - A/R - - C 5 Run initial SOD/SA task of GAM roles requested. Document any adjustments. Understanding of business process user supports. C C A/R C C 6 Submit GRC Request in AC Submit GRC Request in AC I A/R - - C 7 Process request, perform risk analysis and mitigation. Knowledge and ability to initiate risk analysis. C C A/R C C 8 Submit GRC-AC request to Role Owner Submit GRC-AC request to Role Owner I - A/R C C 9 Process request and perform risk analysis Ability to initiate risk analysis. C - C A/R C 10 Submit AC Request for Provisioning Submit AC Request for Provisioning I - C A/R C 11 Administer SNC encryption Determine if SNC is required A/R 12 Submit AC Request for Provisioning Submit AC Request for Provisioning A/R Responsible Does the task Accountable Makes the decision Consults Provides input Inform Kept in the loop * Security Operations = Help Desk & SAP Security
16 What We ll Cover Background: Our vision for improving access to information An overview of the security design leveraged to achieve guiding principles The process we designed for provisioning SAP entitlements What key decision we made which changed the actor responsible for participating in the approval process The guiding principles behind more effective user access reviews Which activity reviews were automated and how predictive analytics leveraged Role Narratives The key for maintaining improvements in access controls Wrap-up
17 Guiding Principles for Periodic Access Reviews Process terminations daily with an automated feed into GRC Lock inactive users daily after 90 days of inactivity Automatically remove a user s system ID after 180 days of inactivity This has put us on a path for reducing annual maintenance/licensing costs Automatically remove inactive roles from a user s profile after 120 days of inactivity Defined exceptions include infrequently used roles and use which doesn t generate analytics Radio frequency devices, year-end transactions and roles with only authorizations and objects (organizational boundary & specialty access) Trigger an access review when a user shows a job formally changes Trigger an access review for non-employee workers, users with access mitigated by compensating controls, highly restricted, or organizational boundary every 180 days Annually review role content and data classification Required the development of role narratives in GRC These automated activities have replaced certain manual quarterly access review processes, which weren t bringing the expected value. We found that analytics and triggers were the key to establishing the most effective review prompts.
18 What We ll Cover Background: Our vision for improving access to information An overview of the security design leveraged to achieve guiding principles The process we designed for provisioning SAP entitlements What key decision we made which changed the actor responsible for participating in the approval process The guiding principles behind more effective user access reviews Which activity reviews were automated and how predictive analytics leveraged Role Narratives The key for maintaining improvements in access controls Wrap-up
19 Predictive Analytics We designed several automated reviews within GRC however we developed two inactivity reviews using predictive analytics Assumption: Roles without inactivity after a period of time can indicate lack of need or indicate a minor shift in responsibility Determined 120 days is a pretty good indicator, with some exceptions identified for infrequently used roles, such as expense reporting, purchase order approvals, etc. Assumption: System IDs without inactivity after a period of time can indicate system access is no longer required Determined 180 days is a pretty good indicator, with some exceptions identified
20 120-Day Role Inactivity Review Benefits Maintain an accurate baseline of access assignments adjusted by regular clean up and removal of access no longer required or not being used Data input towards standardizing profile assignments Leverage data analytics to drive decisions Risks and Mitigation Risk: Remove access that is used more infrequently Mitigation: Develop a list of exceptions and an initial validation process Mitigation: Consider an adjustment to the inactivity trigger, e.g., 120 to 130 days Risk: Remove access that doesn t register activity Mitigation: Adjust the exception process
21 Approach to Implementation of the Automated Process for Removing Roles for Inactivity Get comfortable with what the report from SAP GRC was showing us prior to moving the automated process into production Review users/roles not used in 120 days, targeted to be removed, and make decisions (accept/reject results) Assess whether any incidents occurred as a result of the removal and adjust the exception process, when necessary Review users/roles which were excepted from the process in order to validate results Review available reporting within GRC to develop a communication of results Develop a timeline for moving to the automated process expected to run nightly in GRC, without manual intervention Encountered Defects During Testing The GRC user action interface did not collect 100% of transactional activity from each target environment, which SAP subsequently resolved
22 Observations from the Initial 120-Day Review Initial Inactivity Review Produced Lots of access recommended for removal from executives, senior leadership, and contractors Lots of access removed from employees who had been with the company for a long time (years of travelling from job to job) Some clean up of migration mistakes when users moved to the newly designed roles Approach to cloning access of users is apparent (absent a process for assigning standardized profiles) Lessons learned: Need to review what was excepted where there was never any use and additionally evaluate if it would have been removed anyway for 180-day
23 180-Day System Inactivity Review Benefits Maintain an accurate baseline of legitimate system users Data input towards standardizing profile assignments Reduce costs of maintenance licensing, especially by categorizing types of users, e.g., display versus transactional or power user Risks and Mitigation Risk: Remove system ID from legitimate user who is somehow not generating a last logon date Mitigation: Develop a list of exceptions Mitigation: Consider an adjustment to the inactivity trigger, e.g., more than 180 days
24 Approach to Implementation of the Automated Process for Removing System IDs for Inactivity Get comfortable with what the report from SAP GRC was showing us prior to moving the automated process into production Review users showing a last log-on date longer than 180 days, targeted to be removed, and make decisions (accept/reject results) Assess whether any incidents occurred as a result of the removal and adjust the exception process, when necessary We identified certain activities which were occurring through the Web/ portal or a hand-held device which didn t generate a last log-on date which drove us to change the exception logic to the program Review available reporting within GRC to develop a communication of results Develop a timeline for moving to the automated process expected to run nightly in GRC Encountered Defects During Testing None
25 Observations from the Initial 180-Day Review Initial Inactivity Review produced: Lots of system IDs targeting removal from executives, senior leadership, and contractors Many inactive users had an account only for travel expense purposes and often they have an assistant who is authorized to raise reports on their behalf System IDs for non-employee workers
26 What We ll Cover Background: Our vision for improving access to information An overview of the security design leveraged to achieve guiding principles The process we designed for provisioning SAP entitlements What key decision we made which changed the actor responsible for participating in the approval process The guiding principles behind more effective user access reviews Which activity reviews were automated and how predictive analytics leveraged Role Narratives The key for maintaining improvements in access controls Wrap-up
27 Role Narratives Aid Control Sustainability What was the mission? Actors in the access assignment process and business owners do not always understand the content and purpose of access roles. Our mission was to develop role narratives which explain the purpose of the access granted, including the level of approval required, the primary business users and risk posed, identification of known conflicts and provide the ability display the technical content, such as transaction codes, company codes and data classification. What was the objective? The objective is to support accurate assignments of privileges based upon user job requirements, reduce the number of provisioning requests rejected or miss assigned, aid role owners with the ability to reaffirm role content periodically, and business stewards and custodians who periodically review access assignments. Aid better risk management. What were the benefits? Reduced turn-around for access initiators to process a GRC access request, and resolving follow up to clarify or correct requests. Reduce error rate for correcting assignment mistakes and resubmission for role approver rejections. Standardize information for performing user access reviews and onboarding new role or business owners. 27
28 Role Narrative Example Workbook: This is an example of a completed Role Narrative with the columns highlighted in yellow. Business Role Name Technical Role Name Business Primary Users Position Description Purpose of the Access Risk Known Conflicts RTR: FI P&L and Balance Sheet Reporting P08:S:RTR:FI:PL_BAL_SHEET_REP Finance Finance users performing end of the period type activities or those with responsibilities for top line analysis Role allows a user to view a quantitative summary of a company's financial condition at a specific point in time, including assets, liabilities and net worth. The first part of a balance sheet shows all the productive assets the company owns, and the second part shows all the financing methods (such as liabilities and shareholders' equity) Medium Often mistaken with FI Common Display role needed to perform most of the basic RTR activities, such as account reconciliation. Dependent Roles Alternate Roles None P08:S:RTR:FI:FI_COMMON_DSP Subject Matter Expert(s) Miguel Gonzalez and Debbie Bryan-Hall T-Codes S_ALR_ G/L Account Balances Additional Information (Optional) Description - The G/L account balance list shows the following monthly figures: Balance carried forward at the beginning of the fiscal year; Total of the period or periods carried forward; Debit total of the reporting period; Credit total of the reporting period; Debit balances or credit balances at the close of the reporting period (optional); With the Balances in Foreign Currency option, the first five fields are available in the accounts as well as in local currency At the end of the list, the system displays the following information per local currency: Totals per company code; Closing total of all company codes Output and Sorting - The sorting method and summarizations can be determined using ALV. The parameter Group Version controls output in the batch header and the default sorting method. Program Called: RFSSLD00- More output control Program Called - RFSSLD00 - Less output 28
29 What We ll Cover Background: Our vision for improving access to information An overview of the security design leveraged to achieve guiding principles The process we designed for provisioning SAP entitlements What key decision we made which changed the actor responsible for participating in the approval process The guiding principles behind more effective user access reviews Which activity reviews were automated and how predictive analytics leveraged Role Narratives The key for maintaining improvements in access controls Wrap-up
30 Wrap-Up Reporting of Results to Management Developed reporting routines to communicate periodically How many roles were removed? How many roles removed which were never used? What was the risk addressed? Where? Initial cleanups produces the most results Next steps in also include Planning for progressing standardized profile assignments Discussions are also taking place to evaluate IF we had additional predictive analytics, how could we leverage similar activities What access doesn t generate usage, e.g., authorizations and objects which aren t grouped with transactions and Web and portal activity not generating log-on insight
31 7 Key Points to Take Home 1. Intuitive and improved user access reviews are best accomplished with simplified role design and business rules for rationalization of roles 2. Global, standardized GRC user provisioning workflow for access assignments coupled with accurate assignment is a best practice 3. Appropriate user access assessments and approvals with access changes to be reflected for inactivity to support managed risk 4. Automated activities have replaced prior manual quarterly access review processes, which weren t bringing the expected value. We found that analytics and data triggers were the key to establishing the most effective review prompts. 5. Narratives are also key building blocks for sustaining improvements made in access controls 6. Surprise improvement in management of user licensing costs by getting more granular with access assignments 7. The key win is delivering a standard approach that is flexible and faster, but controlled
32 Your Turn! Questions? How to contact me: Kyleen Wissell
2. Which of the following statements is true when configuring a group chart of accounts?
Time 120 minutes Chart of Accounts 1. A chart of accounts ( Multi ) a. can be allocated to multiple company code b. can be defined as the group chart of accounts c. only contains definitions for G/L accounts
More informationPOSSE System Review. January 30, Office of the City Auditor 1200, Scotia Place, Tower Jasper Avenue Edmonton, Alberta T5J 3R8
1200, Scotia Place, Tower 1 10060 Jasper Avenue Edmonton, Alberta T5J 3R8 edmonton.ca/auditor POSSE System Review January 30, 2017 The conducted this project in accordance with the International Standards
More informationGOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.
GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,
More informationOracle Applications Release Oracle SLA White Paper GreenChain Software Solutions Pvt Ltd
Oracle Applications Release12.1.1 Oracle SLA White Paper GreenChain Software Solutions Pvt Ltd www.greenchain.biz GreenChain Software Solutions Pvt Ltd Page 2 of 35 Contents Oracle SLA... 4 Transaction
More informationAn Oracle White Paper December Reducing the Pain of Account Reconciliations
An Oracle White Paper December 2012 Reducing the Pain of Account Reconciliations Introduction The finance department in most organizations is coming under increasing pressure to transform and streamline
More informationDelivering Governed Self-Service BI across the Enterprise
Delivering Governed Self-Service BI across the Enterprise 1 TABLE OF CONTENTS Introduction... 3 Key Self-Service BI Governance Capabilities... 4 Top 10 Success Factor Features... 4 Self-Service Governance
More informationManish Patel. Discover SAP. ERP Financials. Bonn Boston
Manish Patel Discover SAP ERP Financials Bonn Boston Contents at a Glance 1 Overview... 27 2 General Ledger... 39 3 Receivables and Payables... 73 4 Taxation... 107 5 Bank Accounting... 141 6 Capitalization
More informationDETAILED COURSE AGENDA
DETAILED COURSE AGENDA Dynamics 365 University: Boot Camp Detailed Agenda Course Level: 100 This instructor-led course provides a key step for Microsoft Dynamics 365 administrators and customizers who
More informationARC System Upgrade. What s New with 9.2. Presentations: January & February 2017
ARC System Upgrade What s New with 9.2 Presentations: January & February 2017 Welcome and Introductions Presenters: Kate Sheeran, Executive Director, Finance HR, Training & Change Management Paul Reedy,
More informationSAP Simple Finance The Future of Finance. Angélica Bedoya, Center of Excellence, SAP LAC Abril, 2015
SAP Simple Finance The Future of Finance Angélica Bedoya, Center of Excellence, SAP LAC Abril, 2015 Today s Volatile World Needs Strong CFOs How profitable is our new global business unit? The balance
More informationSOX compliance through Role Design & SAP GRC Access Control The Omega Pharma case
SOX compliance through Role Design & SAP GRC Access Control The Omega Pharma case Tim Goossens GRC Manager Produced by Wellesley Information Services, LLC, publisher of SAPinsider. 2016 Wellesley Information
More informationOracle Financials Accounting Hub
Oracle Financials Accounting Hub Oracle Financials Accounting Hub (FAH) efficiently creates detailed, auditable, reconcilable accounting for external or legacy source systems. FAH includes an accounting
More informationAMP UP PROFITS WITH FINANCIAL MANAGEMENT LEAP FORWARD WITH NEXT-LEVEL TECHNOLOGY
AMP UP PROFITS WITH FINANCIAL MANAGEMENT LEAP FORWARD WITH NEXT-LEVEL TECHNOLOGY 2 ONE TECHNOLOGY TO MEET ALL CHALLENGES Our industry-leading technology provides the flexibility and the insights to help
More informationAt the Heart of Connected Manufacturing
www.niit-tech.com At the Heart of Connected Manufacturing Transforming Manufacturing Operations to Drive Agility and Profitability The success of the new manufacturing network hinges on the agility of
More informationSage 200c Commercials Datasheet
Sage 200c Commercials Datasheet Sage 200c Commercials automates the delivery of your customer orders with effective stock management. By responding to product and pricing demands quickly and effectively
More informationFinancial Services Cloud Administrator Guide
Financial Services Cloud Administrator Guide Salesforce, Spring 18 @salesforcedocs Last updated: February 1, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationMAS 500. MAS 500 Version 7.0 Pre-Release Guide
MAS 500 MAS 500 Version 7.0 Pre-Release Guide February 2004 Table of Contents Overview...1 Availability...1 Global Usability Enhancements...1 Distribution Enhancements...2 Manufacturing Enhancements...5
More information1 Introduction. 2 CA Clarity PPM Functionality by User Type. CA Clarity PPM 12.1 Functionality by License User Type April 6, 2011
by License Type 1 Introduction Access to CA Clarity PPM functionality is defined by the type of named users. On Premise installations of Clarity have three types of named users: Managers, Members, and
More informationFI334 Umoja Month-End Closing Process. Umoja Period and Year End Closing Process Version 17
FI334 Umoja Month-End Closing Process Umoja Period and Year End Closing Process Version 17 Last Copyright Modified: United 16-August-13 Nations 1 Agenda Course Introduction Module 1: Pre-closing Check/Readiness
More informationResearch Administration Systems SLE
Research Administration Systems SLE Service Overview... 2 Service Features... 2 Service Warranty... 7 Support Model... 7 Support Hours and Initial Response Times... 8 Support Request Resolution Targets...
More informationThe Celanese 6 s Dispute and Deduction Management Case:
4/0/20 The Celanese 6 s Dispute and Deduction Management Case: Leveraging 6 s to Manage Disputes & Deductions and Improve Cash Flow Cross Function & Cross Business (FSS, Supply Chain, All Business Units)
More informationProduct Documentation SAP Business ByDesign February Business Configuration
Product Documentation PUBLIC Business Configuration Table Of Contents 1 Business Configuration.... 4 2 Business Background... 5 2.1 Configuring Your SAP Solution... 5 2.2 Watermark... 7 2.3 Scoping...
More informationImprove revenue Drive performance Optimise project team. Visit envisionapp.com
Improve revenue Drive performance Optimise project team Visit envisionapp.com 1 2 Envision has provided accurate real-time reporting that has enabled fast and effective decision-making that has led to
More informationUnified Employee Desktop. Best Practice Guide
Unified Employee Desktop Best Practice Guide Table of Contents Introduction... 3 1. Decide Where to Start... 4 2. Design Your Process... 4 3. Deploy Your Integration Strategy... 5 4. Use Contextual Knowledge
More informationYou can easily view comparative data and drill through for transaction details.
analyzing financial and operational information (such as number of sales reps, occupancy rates or cycle time), giving you a very powerful business management tool that leverages your financial data. You
More informationContinuous Controls Monitoring for Transactions: The Next Frontier for GRC Automation
Research Publication Date: 15 January 2009 ID Number: G00164382 Continuous Controls Monitoring for Transactions: The Next Frontier for GRC Automation French Caldwell, Paul E. Proctor Continuous controls
More informationMicrosoft Dynamics NAV enhancements
Microsoft Dynamics enhancements Times change. Technologies change. Business needs change. And organisations like yours need to change to keep up and stay competitive. Ocean Dynamics have enhanced Microsoft
More informationITSM Process/Change Management
ITSM Process/Change Management Process Documentation Revision Date: December 13, 2017 Version Number: 2.0 Document Ownership Document Owner Maury Collins Revision History ITSM Role, Department Service
More informationTABLE OF CONTENTS DOCUMENT HISTORY
TABLE OF CONTENTS DOCUMENT HISTORY 4 UPDATE 17D 4 Revision History 4 Overview 4 Optional Uptake of New Features (Opt In) 5 Update Tasks 5 Feature Summary 6 Supply Chain Collaboration 7 Streamline Collaboration
More informationAutomating Key Business Processes with NetSuite ERP & Salesforce CRM
Cloud Integration Best Practices Whitepaper Automating Key Business Processes with NetSuite ERP & Salesforce CRM Do your employees spend significant time reentering and maintaining customer and order information
More informationDFS-Sphere Human Resources Automation Efficient processes, Compliance and Audit Trails: Keys to Success
DFS-Sphere Human Resources Automation Efficient processes, Compliance and Audit Trails: Keys to Success Introduction Human resources is an ever-evolving business function. The number one pain HR professional
More informationSESSION 608 Tuesday, November 3, 2:45pm - 3:45pm Track: Service Support and Operations
SESSION 608 Tuesday, November 3, 2:45pm - 3:45pm Track: Service Support and Operations Measuring Operational Efficiency and Value Rae Ann Bruno President, Business Solutions Training Inc. rbruno@businesssolutionstraining.com
More informationClient Solution Architects LLC
Contractor: Client Solution Architects LLC General Purpose Commercial Information Technology Equipment, Software and Services (IT70) CLIENT SOLUTION ARCHITECTS LLC 52 Gettysburg Pike Mechanicsburg, PA
More informationMONTH END CLOSING INSTRUCTIONS FOR ACTUALS LEDGER
MONTH END CLOSING INSTRUCTIONS FOR ACTUALS LEDGER Revised by Financial Operations 05/20/2009 Month End Closing Instructions for ACTUALS Ledger CONTENTS: OVERVIEW 3 HELP 5 DETERMINING IF A BUSINESS UNIT
More informationEmbrace These 5 Behavior Modifications
KNOA Software Embrace These 5 Behavior Modifications To Make Your SAP FIORI Implementation a Success KNOW WHAT WORKS. Ensure a successful Fiori Migration and measure Fiori adoption with real end-user data.
More informationNTT DATA Service Description
NTT DATA Service Description NTT DATA Managed Services for Microsoft Azure Site Introduction NTT DATA is pleased to provide NTT DATA Managed Services for Microsoft Azure Site (the Service(s) ) in accordance
More informationCHANGE MANAGEMENT IN PROCUREMENT TRANSFORMATION. Bloomberg. Page 1
CHANGE MANAGEMENT IN PROCUREMENT TRANSFORMATION Bloomberg Page 1 Agenda and Objective Defining the challenges we faced Creating the business case Building the change management playbook Setting the strategy
More informationiscala 3.0 FSP3 Szabolcs Ecsedi Product Marketing Manager
iscala 3.0 FSP3 Szabolcs Ecsedi Product Marketing Manager Safe Harbor Statement FORWARD-LOOKING STATEMENTS: This Presentation may contain certain statements that may constitute forward-looking statements
More informationRelease 1.0 August SAP Business ByDesign Manufacturing Resource
Release 1.0 August 2010 SAP Business ByDesign Manufacturing Resource Center Overview Key Requirements Critical Success Factors for Manufacturers As a successful manufacturer, you need increased visibility
More informationSession 308 Monday, October 21, 3:00 PM - 4:00 PM Track: Industry Insights
Session 308 Monday, October 21, 3:00 PM - 4:00 PM Track: Industry Insights Knowledge Management at Progressive Insurance: A Case Study Barb Dombrowski IT Manager, Progressive Insurance barb_dombrowski@progressive.com
More informationKey Benefits. Overview. Field Service empowers companies to improve customer satisfaction, first time fix rates, and resource productivity.
Field Service empowers companies to improve customer satisfaction, first time fix rates, and resource productivity. Microsoft delivers advanced scheduling, resource optimization and mobile enablement capabilities
More informationWfMC BPM Excellence 2013 Finalist Copyright Bizagi. All rights reserved.
WfMC BPM Excellence 2013 Finalist Copyright 2002-2015 Bizagi. All rights reserved. WfMCBPM Excelence2013Finalist 2 1. Overview Initially, BBVA decided to set up a real-estate unit within the bank to manage
More informationSeptember 19, 2007 San Francisco Chapter
Optimizing Spreadsheet Controls A Proactive Approach to Sustaining Compliance September 19, 2007 Welcome! Today s Facilitators Dannette Roberts Industry Partner Manager Microsoft Corporation Terry Nystrom
More informationHow to Configure the Initial Settings in SAP Business One
SAP Business One How-To Guide PUBLIC How to Configure the Initial Settings in SAP Business One Applicable Release: SAP Business One 8.8 European Localizations English July 2009 Table of Contents Introduction...
More informationAptitude Accounting Hub
Aptitude Accounting Hub Achieve financial control, transparency and insight The Aptitude Accounting Hub empowers us to progressively transform finance while creating a detailed financial data foundation
More informationVULNERABILITY MANAGEMENT BUYER S GUIDE
VULNERABILITY MANAGEMENT BUYER S GUIDE VULNERABILITY MANAGEMENT BUYER S GUIDE 01 Introduction 2 02 Key Components 3 03 Other Considerations 10 About Rapid7 11 01 INTRODUCTION Exploiting weaknesses in browsers,
More informationMore industry awards followed along with a burgeoning global client-base.
ABOUT PTY LTD TECHNISOFT Technisoft Pty Ltd is a leader in INNOVATIVE SOFTWARE SOLUTIONS. Our core focus is to make the complex task of managing plant, infrastructure and field technicians easy. Our software
More informationVerint Engagement Management Solution Brief. Overview of the Applications and Benefits of
Verint Engagement Management Solution Brief Overview of the Applications and Benefits of Verint Engagement Management November 2015 Table of Contents Introduction... 2 Verint Engagement Management Advantages...
More informationE-PROCUREMENT OPERATIONS
E-PROCUREMENT OPERATIONS Post-launch capabilities to ensure your success Introduction: E-procurement operations capabilities that will enable your success Automating the processes your organization uses
More informationAprimo Marketing Productivity
Aprimo Marketing Productivity Why Marketing Productivity? Marketers today face many challenges: they must deliver more personalized experiences across more channels than ever before. While marketing budgets
More informationSage 200 Commercials Datasheet
Sage 200 Datasheet Sage 200 automates the delivery of your customer orders with effective stock management. By responding to product and pricing demands quickly and effectively you can maintain customer
More informationASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016
ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016 Charles J. Brennan Chief Information Officer Office of Innovation and Technology 1234 Market
More informationADVANCES IN DOCUMENT MANAGEMENT TECHNOLOGY FOR HUMAN RESOURCES WHITE PAPER
ADVANCES IN DOCUMENT MANAGEMENT TECHNOLOGY FOR HUMAN RESOURCES For Human Resources Executives and their teams, choosing the right document management software solution is a daunting task. Finding the right
More informationOracle ERP Cloud Period Close Procedures
Oracle ERP Cloud Period Close Procedures Release 13 O R A C L E W H I T E P A P E R A U G U S T 2 0 1 7 Table of Contents Introduction 8 Chapter 1 Period Close Dependencies 9 Chapter 2 Subledger Accounting
More informationCA Clarity Project & Portfolio Manager
CA Clarity Project & Portfolio Manager Business Objects Universes for CA Clarity PPM Reference Guide v12.1.0 This documentation and any related computer software help programs (hereinafter referred to
More informationWelcome to the topic on Opening Balances.
Welcome to the topic on Opening Balances. 1 In this topic, you will learn the various options for entering beginning balances for business partners, inventory, and G/L accounts. You will also learn how
More informationIntroduction to Enterprise Financial Suite. Joanne Dyer Information Systems Engineering
Introduction to Enterprise Financial Suite Joanne Dyer Information Systems Engineering Enterprise Financials Suite. Enterprise General Ledger - XA Release 9.1 Enterprise Accounts Payable - XA Release 9.2
More informationMANUFACTURING ERP SOFTWARE BUYERS GUIDE
JobBOSS. Shop management solutions. MANUFACTURING ERP SOFTWARE BUYERS GUIDE A guide to selecting the right shop management system. jobboss.com 2 MANUFACTURING ERP SOFTWARE BUYERS GUIDE CHOOSING THE RIGHT
More informationERP IMPLEMENTATION RISK
ERP IMPLEMENTATION RISK Kari Sklenka-Gordon, Director at RSM National ERP Risk Advisory Leader March 2017 2015 2016 RSM US LLP. All Rights Reserved. Speaker Kari Sklenka-Gordon National RSM ERP Risk Advisory
More informationSpeed Up and Strengthen Financial Processes
DocuWare for Accounting Solution Info Speed Up and Strengthen Financial Processes Modern business has placed new levels of pressure on finance departments. At a moment s notice, financial leaders and their
More informationITIL from brain dump_formatted
ITIL from brain dump_formatted Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 Экзамен A QUESTION 1 Which role is responsible for carrying out the activities of a process? A. Process
More informationStreamline your business processes with Sage X3
Streamline your business processes with Reduce cost, grow revenue and gain new customers with the business management platform from Frontline. Introducing is a business management solution designed for
More informationTREASURY. INTEGRITY SaaS
TREASURY INTEGRITY SaaS Integrity SaaS B Integrity SaaS: A simple, yet functionally powerful, fully cloud-based treasury management solution 3 Integrity SaaS Integrity SaaS Treasurers worldwide are looking
More informationWelcome to the course on the working process across branch companies.
Welcome to the course on the working process across branch companies. In this course we will review the major work processes across branch companies. We will start with the intercompany trade process.
More informationIn this article, we are covering following broad sections on financial consolidation process:
Financial Consolidation Processing Operational visibility and risk management are key considerations for any business with multiple operational units. The corporate financial controller needs an accurate
More informationFulfilling CDM Phase II with Identity Governance and Provisioning
SOLUTION BRIEF Fulfilling CDM Phase II with Identity Governance and Provisioning SailPoint has been selected as a trusted vendor by the Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring
More informationInformation Technology Services Project Management Office Operations Guide
Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...
More informationSANTANDER TREASURY LINK TRANSITION GUIDE
SANTANDER TREASURY LINK TRANSITION GUIDE Introduction Introducing Santander Treasury Link for Online Banking A new experience ahead We are pleased to introduce you to Santander Treasury Link and look forward
More informationPOS Portal Software Solutions
Software Solutions POS Portal's on-demand software solutions give you the information and tools you need to provide superior services throughout the entire merchant life cycle. With our hosted applications
More informationAN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT
WHITE PAPER AN EXECUTIVE S GUIDE TO BUDGETING FOR SECURITY INFORMATION & EVENT MANAGEMENT COST ANALYSIS OF TWO DELIVERY MODELS: SELF-MANAGED SIEM VS. MANAGED SIEM SERVICES AN EXECUTIVE S GUIDE TO BUDGETING
More informationQmlativ Education Management System. Professional Development Center (PDC) Course Catalog
Qmlativ Education Management System Professional Development Center (PDC) Course Catalog QMLATIV PDC CATALOG TABLE OF CONTENTS Student Management Mastery Courses Assessment Mastery Course Attendance Mastery
More informationContinuous Compliance in SAP Environments
July 2014, HAPPIEST MINDS TECHNOLOGIES Continuous Compliance in SAP Environments Author Shirish Thadla SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. Copyright Information This
More informationWorkday Financial Management
Workday Financial Management Today s businesses compete in markets that are increasingly global and rapidly changing. Finance organisations face mounting pressure to go beyond just managing accounting
More informationBusiness Process Operations. SAP Solution Manager 7.2 SP3
Business Process Operations SAP Solution Manager 7.2 SP3 Agenda Introduction Business Process Operations Business Process Monitoring Job Management Data Consistency Management Business Process Improvement
More informationSAP S/4 HANA Supply Chain Management Foundation for Business Innovation
SAP S/4 HANA Supply Chain Management Foundation for Business Innovation Business drivers for S/4 HANA Increased system throughput by eliminating data redundancies and reduced data footprint Real time analytics
More informationMost Improved Purchasing Operation Step Change 30th January Tim Carrier Head of Procurement
Most Improved Purchasing Operation Step Change 30th January 2013 Tim Carrier Head of Procurement About Capita From 1984 to the present day Building the business including a sales pipeline of over 4bn 2
More informationIBM BPM on zenterprise
IBM BPM on zenterprise The world has turned Andreas Gröschl, Mainframe Architect groeschl@de.ibm.com The Modern Enterprise is a Network of Complex Interactions Powered by Mainframe Assets 70% of corporate
More informationJD Edwards EnterpriseOne Financial Management Overview
JD Edwards EnterpriseOne Financial Overview Karen L. Brown Senior Principal Product Manager Program Agenda 1 JD Edwards EnterpriseOne Overview 2 3 EnterpriseOne Financial Overview
More informationProficy * Plant Applications. GE Intelligent Platforms. Plant Performance Analysis and Execution Software
GE Intelligent Platforms Proficy * Plant Applications Plant Performance Analysis and Execution Software As a production manager, the key to unlocking the full performance potential of your manufacturing
More informationContract Express. Contract Express is more than just a document automation system.
Contract Express A THOMSON REUTERS LEGAL SOLUTION Contract Express is more than just a document automation system. It is a business solution that allows you to deliver a faster, more efficient, more consistent
More informationImplementing ITIL Best Practices
REMEDY WHITE PAPER Implementing ITIL Best Practices Mapping ITIL to Remedy Applications WHITE PAPER Table of Contents Introduction.................................................................... 1
More informationOnAsset Intelligence Capabilities Brief
OnAsset Intelligence Capabilities Brief We deliver Turnkey Solutions: Real time asset location, utilization and condition awareness Control tower visualization of global operations Live alerts for asset
More informationProfitable Demand Fulfillment: Six Winning Approaches in the Consumer Goods Industry. An E2open ebook
Profitable Demand Fulfillment: Six Winning Approaches in the Consumer Goods Industry An E2open ebook Overview Consumer goods companies face many supply chain challenges and opportunities as they expand
More informationAccounts Payable Release 2015
Accounts Payable Release 2015 Disclaimer This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
More informationWorkday Financial Management
Workday Financial Management Today s businesses compete in markets that are increasingly global and rapidly changing. Finance organizations face mounting pressure to go beyond just managing accounting
More informationException Management Whitepaper: Making Manual Resolution Efficient
Exception Management Whitepaper: Making Manual Resolution Efficient Executive Summary In an ever changing, complex and competitive marketplace, Communications Service Providers (CSPs) are rolling out new
More informationIntuit QuickBooks Enterprise Solutions 11.0 Complete List of Reports
Intuit QuickBooks Enterprise Solutions 11.0 Complete List of Reports Intuit QuickBooks Enterprise Solutions is the most advanced QuickBooks product for businesses with more complex needs. It offers advanced
More informationWipro - SAP NetWeaver Practice
!""#!!!"!! "! $ % % &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&'! (% ()% &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&' ' (%
More informationTechnology Leadership in Leasing Implementing a New World in Leasing
Technology Leadership in Leasing Implementing a New World in Leasing Equipment Leasing Association 2002 Annual Convention October 14, 2002 10:30 am Noon Scott Thacker Senior Director Oracle Leasing Solutions
More informationCOMPENSATION PLANNING CYCLE
5 STEPS FOR ENSURING A SUCCESSFUL COMPENSATION PLANNING CYCLE Introduction Compensation planning is one of the most important processes in any organization, but it can also be the most challenging. Each
More informationGuidewire BillingCenter. Adapt and succeed
Guidewire BillingCenter Adapt and succeed Addressing the Challenges of Today s Insurers Property and casualty insurers told us that they wanted a billing system to provide easy access to the information
More informationFor Details Visit: Call Us: US: ,
For Details Visit: http://www.onlinetraininginsap.com Call Us: US: 001-713-900-7669, 001-630-974-1794 India: 091-779-985-5779 E-mail: info@onlinetraininginsap.com 2.2 Posting Period Define Posting Period
More informationFinancial Close Best Practices
The following section will introduce you to the paradigm shift in the way finance departments operate. You will learn about the major subprocesses within a close process and the related best-in-class principles/concepts
More informationKey Strategies for Best-in-Class Accounts Payable. IFO Spring Meeting Milwaukee, WI 29 April 2014
Key Strategies for Best-in-Class Accounts Payable IFO Spring Meeting Milwaukee, WI 29 April 2014 Welcome & Introductions Matt Hein, Strategic Account Executive Ed Modjeska, Director of Strategic Accounts
More informationHello and welcome to this overview session on SAP Business One release 9.1
Hello and welcome to this overview session on SAP Business One release 9.1 1 The main objective of this session is to provide you a solid overview of the new features developed for SAP Business One 9.1
More informationEpicor Users Group. Upgrading Epicor ERP. Neil R. McLachlan, Stephen Edginton. EUG UK & EMEA Conference 2016
Epicor Users Group Upgrading Epicor ERP Neil R. McLachlan, Stephen Edginton nrmclachlan@epicor.com What to Expect in the Session? Why should I upgrade? How an Upgrade can help your Business What should
More informationInfor CloudSuite Business
Business Achieve a next-generation business strategy in the cloud Whether you re providing services or moving inventory in your home-town, across the country or around the world with Infor CloudSuite Business,
More informationWho Does What, When, and How for a Divestiture?
Who Does What, When, and How for a Divestiture? Session ID: #10813 Prepared by: Ihtesham Uddin Sr. Director, Product Development eprentise, LLC @eprentise Learning Objectives Objective 1: Understand key
More informationSOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY. Overview of CA Management Cloud for Mobility
SOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY Overview of CA Management Cloud for Mobility CA Management Cloud for Mobility from CA Technologies enables companies to create and manage their mobile environments,
More informationIBM A EXAM QUESTIONS & ANSWERS
IBM A2010-651 EXAM QUESTIONS & ANSWERS Number: A2010-651 Passing Score: 800 Time Limit: 120 min File Version: 41.0 http://www.gratisexam.com/ Exam Code: A2010-651 Exam Name: Assess: Fundamentals of Applying
More information