Services
Also see: Solutions
SAP Application Security

With the growing number of applications SAP has put on the market, companies are overwhelmed with what to secure let alone invest time and money to educate their internal staff to keep-up to date with latest technologies.

At KES our security professionals are trained to use the different techniques SAP has to offer to help secure your ECC, SEM, CRM, HCM, SCM, SRM, BW and other SAP Implementation projects.

  • User Group Concept
  • Authorization Group Concept
  • Authorization for Tables
  • Field Group Concept
  • Authorizations for Spool and Printers
  • Authorization for Reports
  • Structural Authorizations
  • Analysis Authorizations
  • Digital Signatures

Whether you are in a new implementation or are looking to redesign your security framework, KES experts will deliver a cost- effective, simple to administer yet solid authorization concept.

SAP BI Analysis Authorizations

Meet Beauty and the Beast – also known as Analysis Authorizations. Many SAP Security professionals still don’t understand this concept as SAP has thrown consultants off with this new strategy of securing authorizations in BW systems. Contact us and let KES take the Beast out of the equation and leave the Beauty in your reporting.

Organizations make the mistake in assuming “BW is only a display and reporting tool – there is no risk there!” BW systems are in fact a reporting tool, but consider the data being viewed and the audience viewing the data. BI reporting is mostly used by senior executives to analyze their profits, sales, inventories, salaries and bonus structures to name a few; pretty much everything sensitive in one way or another can be reported on. So how would you like to grant access to your BW systems with SAP_ALL & SAP_NEW now?

Turn on Analysis Authorizations and let KES help you strategize and deliver a solid authorization concept designed for your BW systems.

SAP HCM Security

HR data is usually very sensitive as it stores salary and bonus structures, as well as personal data such as home address and social security numbers. It is very important to have proper security authorizations set up in your HR systems, as this can violate a few laws such as PIPEDA which has been in place since 2004 all across Canada.

At KES, our professionals have extensive experience in securing the HR Master Data as well as Reporting, Applicant and Structural Authorizations. Designing and implementing HR security from blueprint phase should be the start of any security project. There is a reason why every project requires a security resource; it is to make sure the functional configuration is done with security in mind. Let us help you get there and save the cost of redoing your implementation due to audit or legal requirements.

SAP ECC Security

ECC also known as ERP Central Component is an ABAP-based system that provides an organization with much control over their key business processes. During implementations however, not all the correct controls are put in place and the wrong security authorizations are turned on. At KES, our professionals have extensive experience in securing all the modules within ECC as well as designing custom controls to help the streamlining of your internal processes. Whether you are in a new implementation or need to re-assess your security design, our consultants can be trusted with the task.

Further Reading:

Contact KES now and discover how our consultants reduce your risk exposure, increase your productivity and finally get you AUTHORITY-CHECK compliant.