ENTERPRISE SECURITY
Security configuration and assessment
Improve security in Dynamics by reducing audit risk. We can help set up and configure your roles, identify segregation of duties, reduce risk and generate meaningful reports.
Segregation Of Duties
Find conflicts
Find and report SoD conflicts in your ERP system. By creating a set of conflicts in your system, we can easily set rules to automatically review the user access and roles in your system for conflicts and generate them in a report.
New Conflicts
Regular user access review is important even thought you have mitigated your risk after cleaning up critical conflicts. We can help you report on new conflicts by running a scheduled job and generate the report so you can take mitigating action.
SOX Compliance
We can help take the risk out for your organization by setting up rules to continuously track your ERP system for SoD conflicts. These rules can be scheduled for regular review and reported on for your auditors to review. This is a main concern for organizations of their financial systems.
Access Review
Review and sign off access
We can configure your ERP system to review for user access to pull data so you can sign off on users by role, company and data risk. This helps you make sure that your users have the right access for their role.
Critical access review
There are certain areas of the software that are key to restrict. You don't want everyone to have access to your ERP financial data. Our access controls can be configured to identify who can post, view or edit any sensitive data.
User Provisioning
Create roles, duties and privileges
Are you creating new roles or leveraging roles out of the box? Depending on the task you may need to do one or the other. Depending on how complex your organization is, we can help you create roles, duties and privileges for your users that provide the right access.
Remove administrator access
Lots of companies go live with many of their users set up as an administrator with access to key data. We can help you identify your users who are administrative access and correctly associate them with their right role.