Services
Also see: Solutions
Governance

How many times have you heard: “I didn’t realize I was approving a purchase order I’m not supposed to” or how about: “I had access to the transaction, so I ran it to find out what it does!” and you can imagine what happened next.

In our books, Governance, Risk and Compliance is much more than just a software that is setup by a team of consultants and left behind to be run by in-experienced junior IT analysts.

  • It is empowering the business to take important decisions on different aspects of access control.
  • It is about making the business understand the real ownership of their data and finally.
  • It is about helping the business achieve acceptable levels in Segregation of Duty (SoD) conflicts.

Many organizations tend to refuse the above notions and leave their IT departments in charge of securing their data. They fail to realize it is the business that creates the business processes when mitigating and controlling risks and it is the task of IT folks to uphold these processes using industry best-practices or automated tools such as SAP’s GRC.

Best-Practices

These are your industry business practices thrown in with some work ethics and voila! What you have is a proven business process that is supposed to work over and over again. Sometimes it is not wise to use the best-practices available as this might not necessarily work for your organization.

Our motto: “Create your own Best-Practice!”

Get in touch with us and let us help you establish custom best-practices to make your teams more productive whilst reducing risk exposure in dealings with SAP access control, roles, profiles and authorizations.

Segregation of Duties (SoD)

It is not uncommon for organizations to have segregation of duty issues within their job roles. It is however common organizations do not have these issues identified and flagged if they are acceptable or not. With KES, we help you implement effective SOD matrix to feed in any tool your organization might be using.

Further Reading:
Audit

Our team provides full review of your SAP security environment. At first, access controls can be analyzed by our experts to prevent conflicts within business and IT roles. KES also offers audit on best practices, such as but not limited to naming conventions and role architecture.

Further Reading:
Project Management

Our project management team is trained to lead successfully a project throughout its whole process. Partnering with KES to manage your security project involves detailed project preparation, strong sizing and blueprinting, realization including change management and testing, final preparation, go-live and support. Our team is also trained for the use of different leadership approaches, whether it’s the agile project management, the waterfall method or the lean project management.

In recent years, we have successfully helped many companies with complex and large-scale projects by exercising strict control over the usual project parameters (time, content, costs). KES combines strong technical skills with a true grasp of the field as well as a unique business awareness that enables them to advise you properly, especially as the relevance and feasibility of projects related to your business objectives. With our intervention we leverage the skills and judgment of our experts and the professionals in your organization.