{"id":795,"date":"2015-01-26T12:12:06","date_gmt":"2015-01-26T12:12:06","guid":{"rendered":"http:\/\/192.168.126.99\/wordpress\/?page_id=795"},"modified":"2017-02-06T17:03:45","modified_gmt":"2017-02-06T17:03:45","slug":"sap-security","status":"publish","type":"page","link":"https:\/\/www.juliangrayconsulting.co.uk\/?page_id=795","title":{"rendered":"SAP Security"},"content":{"rendered":"<h2>SAP Security<\/h2>\n<span class=\"header-desc\">A complete SAP security solution<\/span>\n<p>We provide a complete SAP security service. If you are implementing a new SAP system, looking for support of an existing system or are considering improvements for an existing security scheme then talk to us to see if we can help.<\/p>\n<p>\nWe can provide support remotely or on your site. If you need occasional help to support your existing team, we can provide a service on an hourly or daily basis.\n <\/p>\n<div class=\"white-space\"><\/div>\n<h3>Previous Projects <\/h3>\n<span class=\"header-desc\">Contact us to see how we can help with your project<\/span>\n<p>\n\u2022   Security scheme design and implementations.<br \/>\n\u2022   User role provisioning.<br \/>\n\u2022   Security authorisations troubleshooting and remedial action.<br \/>\n\u2022   Auditing of security landscapes.<br \/>\n\u2022   Security reviews of bespoke ABAP code.<br \/>\n\u2022   Security role reengineering and regression testing<\/p>\n<h3>Security Audit<\/h3>\n<span class=\"header-desc\">Complete technical and access permission audits.<\/span>\n<p> We provide a complete and vigorous security audit service. We can check the technical aspects of your system and your user access provisions. We can assess your system against our standard risk rule book and identify new risks specific to your business. We can provide software that will give you work flowed and segregation of duty compliant access provisioning to allow you to conform to your SOX and audit requirements.\n <\/p>\n<h3>Security Scheme Design<\/h3>\n<span class=\"header-desc\">Full life Cycle Role Design<\/span>\n<p> We approach role design as an engineering process. A phased method is used that has been proven over many projects.<\/p>\n<p>High level Steps involve :<\/p>\n<p>\u2022   Enterprise Function Definition.<br \/>\n\u2022   Outline Design of the task \/ Function Matrix.<br \/>\n\u2022   Detailed Design<br \/>\n\u2022   Implementation &#8211; Single Derived and Composite Role creation.<br \/>\n\u2022   Test, Document and Review.\n  <\/p>\n<p><a href=\"https:\/\/www.juliangrayconsulting.co.uk\/wp-content\/uploads\/2017\/02\/RoleDesignLifeCycleSmall.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.juliangrayconsulting.co.uk\/wp-content\/uploads\/2017\/02\/RoleDesignLifeCycleSmall.png\" alt=\"\" width=\"267\" height=\"261\" class=\"alignnone size-full wp-image-1181\" srcset=\"https:\/\/www.juliangrayconsulting.co.uk\/wp-content\/uploads\/2017\/02\/RoleDesignLifeCycleSmall.png 267w, https:\/\/www.juliangrayconsulting.co.uk\/wp-content\/uploads\/2017\/02\/RoleDesignLifeCycleSmall-60x60.png 60w, https:\/\/www.juliangrayconsulting.co.uk\/wp-content\/uploads\/2017\/02\/RoleDesignLifeCycleSmall-50x50.png 50w\" sizes=\"(max-width: 267px) 100vw, 267px\" \/><\/a><\/p>\n<h3>Joining The Dots <\/h3>\n<span class=\"header-desc\">Connect your helpdesk and SAP System<\/span>\n<p> Improve your productivity by using your helpdesk workflow to drive your SAP security provisioning. We leverage our SAP and development experience to connect helpdesk and SAP systems. We deliver integrated and auditable provisioning systems that allow you to work faster, easier and free up your staff to add value to your business.  <\/p>\n<div class=\"white-space\"><\/div>\n<blockquote>\n<p> Talk to us for an informal, free, no obligation discussion to see how we can help you achieve your objectives.<\/p>\n<\/blockquote>\n<div class=\"white-space\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SAP Security We provide a complete SAP security service. If you are implementing a new SAP system, looking for support of an existing system or are considering improvements for an existing security scheme then talk to us to see if we can help. We can provide support remotely or on your site. If you need [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.juliangrayconsulting.co.uk\/index.php?rest_route=\/wp\/v2\/pages\/795"}],"collection":[{"href":"https:\/\/www.juliangrayconsulting.co.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.juliangrayconsulting.co.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.juliangrayconsulting.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.juliangrayconsulting.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=795"}],"version-history":[{"count":63,"href":"https:\/\/www.juliangrayconsulting.co.uk\/index.php?rest_route=\/wp\/v2\/pages\/795\/revisions"}],"predecessor-version":[{"id":1178,"href":"https:\/\/www.juliangrayconsulting.co.uk\/index.php?rest_route=\/wp\/v2\/pages\/795\/revisions\/1178"}],"wp:attachment":[{"href":"https:\/\/www.juliangrayconsulting.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}