The following risks are often present but go undetected by security administrators and auditors because they are typically “unusual” cases. This doesn’t mean they aren’t present; they aren’t immediately apparent. Let’s look at some of these! 1. User accounts with critical profiles (SAP ALL and similar) that are inactive or locked but still used in […]
The queries made by auditors always give us a headache, either because of the difficulty in finding the right answer or because it forces us to dedicate time that we do not have. That is, a headache always! After reviewing the system with their own software tools, they give us their reports to which we […]
It is common for our users to have assigned roles that they do not use (1). Our solution, CentinelBox, addresses this issue in the following way: 1. Identification: We use the report of unused roles by user accounts. It is simple and allows defining a time horizon parametrically, reviewing the last 24 months, 48 months, […]
Can you imagine having a scanner that allows you to detect vulnerabilities and risks in the privileges assigned to user accounts? Imagine how you could strengthen the security of your SAP system proactively and efficiently: The new CentinelBox service will allow you to proactively take action to resolve them and achieve favourable and beneficial results: […]
Improving the quality of SAP System security is not a matter of time. Improvements and remediation of roles between 10% and 25% of the time using standard methods! The need to enhance security always faces a significant obstacle: time and available personnel for the task. With CentinelBox, you can perform tasks in much shorter timeframes […]
In our previous release, we introduced our solution for enhancing security without being hindered by the ever-present problem of needing to implement changes urgently with limited resources. Now, let’s delve into CentinelBox’s functionality for making mass changes to roles. Challenges that arise: ➡️ During the migration from SAP ECC to S/4 Hana: -> Obsolete transactions […]
The need to make security improvements always faces an often insurmountable obstacle: time and available personnel. These tasks are slow and extensive, starting with determining the details of the improvements and then implementing them. We face several challenges: ➡ There are user accounts with many roles and assigned transactions, yet only a fraction of them […]
We know that the annual visit from external auditors can be a real challenge for any organization. Wanna turn it into a smooth and successful experience? If you’ve got CentinelBox, you’ve got the solution right at your fingertips. Our innovative risk management system provides you with the necessary tools to tackle the challenges of audits […]
Risks in SAP: Are all risks identified, and are we working to resolve them? Are there risks that we are unaware of or that are hidden? In strictest rigor, it is likely that we will never have all risks fully controlled. However, it is imperative to know them all and establish a work plan for […]
What should I control? What are the critical variables in SAP security that I should monitor? For executives and CISOs, a red alert is a first level to act upon. As we presented in the previous email, CentinelBox provides reports with color identification in cases where action is required… without the need for a deep […]