Success Stories
Comprehensive White Papers
Join our Mailing List
Please enter your e-mail address to receive product updates and news:
News & Events

11 November 2010
SPV America to provide Security Weaver workshops
Register for workshops in Munich Germany and San Francisco CA.

10 November 2010
SPV America CEO Presented at Systems 2009
Vanessa Balogh presented on the following topics:

GRC a holistic approach with today's tools and technologies

Moving beyond Information Security to Process Oriented Risk Management

7 November 2010
SOX Institute releases First Book in Sarbanes-Oxley Body of Knowledge (Sox BokTM) Series
SOX Institute today announced the publication of the first book in its Sarbanes-Oxley Body of Knowledge (SOXBoK) series, “The Sarbanes-Oxley Act: An Introduction”. SOX Institute recognizes 23 professionals including SPV America in the creation of the SOX BoK. More info.

Security and Privacy Assessments

Includes the evaluation of the organizational threats and vulnerabilities originating from both internal and external sources. SPV has the deep technical skills which it brings to play in the review of leading ERP systems, such as SAP, and all supporting technology layers of a modern IT environment. We completely check all possible configuration settings for potential backdoor openings. Management is then provided with specific recommendations as to how to further tighten security inline with best practices, audit and SOX guidelines.

We make sure all openings to your data are secured, especially the backdoors.

ERP Security Assessments

  • Security for R/3, BW, BBP, APO, CRM, HR and New Dimension Products
  • Redesign and redefine the R/3 security structure to comply with SOX
  • HR Security (Structural Authorizations) ESS, MSS integration
  • Portal customization and integration with component systems
  • Utilities for simplified SAP security maintenance/administration within SAP

Evaluation and analysis of custom development to ensure a secure environment CUA configuration. Central User Administration simplifies user administration, allowing security administrators to maintain users in a single central client. The user masters are then distributed to other clients using ALE. It is highly recommended that CUA be implemented post-upgrade and once the systems have been stabilized

SAP Basis Security

Operating System Security
Includes OS/400, Windows 2000, Unix, Linux, ZOS

Data Base Security
Oracle, SQL Server, DB2


Related Services

  Audit & assurance services

  Role Re-Design and Implementation

  Basis Security

  Sarbanes-Oxley compliance

  Network and Perimeter Security
Related Information

  Simplifying SAP Audits
Related Challenges