Security and Privacy Assessments
Includes the evaluation of the organizational threats and vulnerabilities originating from both internal and external sources. SPV has the deep technical skills which it brings to play in the review of leading ERP systems, such as SAP, and all supporting technology layers of a modern IT environment. We completely check all possible configuration settings for potential backdoor openings. Management is then provided with specific recommendations as to how to further tighten security inline with best practices, audit and SOX guidelines.
We make sure all openings to your data are secured, especially the backdoors.
ERP Security Assessments
- Security for R/3, BW, BBP, APO, CRM, HR and New Dimension Products
- Redesign and redefine the R/3 security structure to comply with SOX
- HR Security (Structural Authorizations) ESS, MSS integration
- Portal customization and integration with component systems
- Utilities for simplified SAP security maintenance/administration within SAP
Evaluation and analysis of custom development to ensure a secure environment CUA configuration. Central User Administration simplifies user administration, allowing security administrators to maintain users in a single central client. The user masters are then distributed to other clients using ALE. It is highly recommended that CUA be implemented post-upgrade and once the systems have been stabilized
SAP Basis Security
Operating System Security
Includes OS/400, Windows 2000, Unix, Linux, ZOS
Data Base Security
Oracle, SQL Server, DB2
Perimeter
|