NextLabs Entitlement Manager for SAP prevents unauthorized access to sensitive SAP data. The solution extends native role based authorization and enforces finer-grained, attribute-based controls. It identifies and protects data inside and outside of SAP leveraging SAP’s classifications and information about the user. Attribute-based policies enforce proper authorization at runtime utilizing all of the relevant information available – sourced from either SAP or external sources. The policies are managed centrally making changing policies much easier with the ability to enforce on a consistent basis. You do not need to make any changes to the application.
NextLabs Entitlement Manager for SAP ERP integrates with SAP ERP Core Component (ECC) to provide an out-of-the-box solution to data-level access control based on a flexible standards-based policy system. It extends SAP’s role based authorization to enhance access security by utilizing contextual factors or attributes to authorize access to SAP business objects such as Materials, Bill of Materials (BOMs), and documents. It can leverage SAP roles and other SAP and non-SAP attributes for dynamic authorization decisions at the time of request.
The Entitlement Manager for Business Warehouse enables users to secure classified data accessed through the reporting tool for additional data analytics. Fine grained access control is enforced using the same access governance rules that are used for ERP applications. This ensures the same security controls are utilized across all systems for consistency and enhanced protection.
|Seamless Integration||Entitlement Manager for SAP has out-of-the-box integration with SAP Material Master and Production Planning modules, providing fine-grained data-level access control for transactions such as MM01, CS01, CV01n, and many others.|
|Fine Grained Authorization||The solution leverages our dynamic authorization technology to make fine-grained decisions based on contextual factors at the time of request. Entitlement Manager enhances SAP authorization to provide attribute-based access control to SAP objects. The attribute-based controls complement the use of coarse-grained roles to provide more detailed information before making the authorization decision. The system requires far fewer policies to make a determination, alleviating the exponential increase in roles and role-based policies typically necessary to make access decisions.|
|Automated Data Classification||Classifies SAP data to ensure appropriate access. The system leverages existing and inherited classifications, and associations to automatically classify sensitive information, including bill of materials, BOMs, financial documents, and personnel information.|
|Segregation of Duties||The system monitors compliance for Segregation of Duties and proactively mitigates the risk. Fine-grained access control catches inconsistencies and unauthorized behavior before the transaction can be completed.|
|Centralized Management||Policies are centrally managed to increase control over policy generation and enforcement. All activity is monitored with a complete audit trail.|
|Regulatory Compliance||Organizations can improve compliance and lower the cost of achieving compliance. The ability to provide fine-grained decisions ensures that only the right people are getting access to sensitive information. This helps companies comply with regulations such as ITAR, HIPAA, SOX, NERC, FERC, PIPAA and many more.|
|Application Security||Entitlement Manager protects access to critical SAP data so unauthorized users or external parties cannot gain access. It provides an additional level of control over your critical SAP applications, and prevents wrongful disclosure of critical data.|
|Reduces Administration||Our centralized policy-based solution significantly reduces the number of policies needed to enforce data and application access resulting in fewer policies to manage and making it fast and efficient to create/modify and deploy policies. Complexity associated with administering and maintaining a large number of permissions and roles is greatly reduced – resulting in a significant reduction in administrative costs.|
|Comprehensive Reporting||All activities are tracked through the system providing a full view into who is accessing which data and what they are doing with it, making it easy to detect anomalies.|