If you want to succeed in the digital game, your core business data must be right and available everywhere it’s needed, fast.  Learn how DDT Hub can help you automate your data management and faster processes to transform your SAP Landscape and solve your business challenge

USA HQ

1000 Brickell Ave, Ste 715, Miami, FL33131

+1.561.440.8060

EUROPE HQ

71-75 Shelton Street, London, WC2H 9JQ,

+44 -204-577-0664

Contacts

info@ddthub.com

support@ddthub.com

Count of Granted & Denied Transaction Activity
View user-level trends of granted/denied transaction activity of privileged users by user name
Segregation of Duties Controls Monitoring
Track actual SoD violations with user, data, and transaction correlation to eliminate false positives. View the user ID, name, violating transactions, T-code descriptions and more.
Locations of User Access
View the geographical aggregation of user access locations segmented by privileged and non-privileged user access.
Reinforce SoD Policy Violations
ABAC in SoD enables the implementation of preventative measures. You may avoid SoD breaches while permitting competing roles and improving role-based laws.

Detect Security Threats in Real-Time

Compliance Risk Monitoring proactively alerts you to security threats like hacking, phishing, misuse of privileged accounts and many more. Quickly receive the information required to fully enable forensic investigations:
  • Identify data access & usage trends that reflect suspicious activity
  • Enrich data access information with attributes like IP address, user role, geographic location, device, etc. to understand full context
  • Capture authentication trends like failed login attempts and be alerted to potential brute force attacks

Uncover Hidden Business Risks

Compliance Risk Monitoring helps you detect and respond to fraud, theft and errors by employees and 3rd parties (vendors, consultants, etc.) Maintain a complete view of sensitive business transactions and what (specific) users are doing:
  • Monitor and alert to changes in Master Data
  • Capture granular transaction details like discounting, PO amount increases, recurring purchases, etc.
  • Capture details on users creating new vendors, purchase orders, requisitions, etc.

// Monitor Employee Productivity

 

Compliance Risk Monitoring helps you maintain oversight as users process and execute business transactions. Use these insights to ensure efficient staffing and identify potential bottlenecks in critical HR, payroll and finance activities:

  • Get detailed information on transaction volume, cycle time, array of data accessed, etc.
  • Alert if members of the same department are looking at each other’s information
  • Capture contextual details on privileged sessions

Compliance Risk Monitoring installs into your ERP web server and does not require any additional customisations. There are zero noticeable effects on application performance. Log data is stored on-premise.

Monitor User Activity During Remote Access

Monitor access by geolocation to ensure that remote access attempts are not coming from suspicious locations. Closely monitor access to specific transactions and data fields for additional oversight.

Monitor Access to Highly Sensitive Data

Isolate access to particularly sensitive data fields like executive salary information, employee compensation, and social security numbers. Know exactly who is accessing this information and how frequently.

Monitor for Data Exfiltration on Unauthorised Devices

Monitor instances of query running and download attempts. Ensure that sensitive queries are not being downloaded onto unauthorized devices, from suspicious locations, or outside business hours.

Monitor Team Efficiency and Uncover Bottlenecks

Capture transaction details measuring a user’s efficiency and productivity. Drill into how many transactions were executed, along with who’s information was accessed and why.

Monitor High Privilege Access

Isolate access data by users with high privilege. Continuously monitor high privilege activity to ensure integrity and alignment with current business policies.

Perform Forensic Investigations With Context

Drill into granular incident details. Gain actionable insights into what was accessed and by whom. Enable a rapid and thorough response.

// Uncovering What Matters When It Matters

Uncovering What Matters.. When It Matters

Compliance Risk Monitoring goes beyond what is captured by existing SAP audit logs. Combining granular insights with enriched processing, Compliance Risk Monitoring delivers the information you want, when you want it – without the noise or manual effort.

Audit and Compliance

Streamline manual audit processes with fine-grained reporting that eliminates false-positives, minimizes human error, and overcomes operational bottlenecks.

Line of Business Stakeholders

Uncover business policy violations and critical activities that allow business leaders to reduce risk and make informed policy decisions.

BASIS and System Administration

Leverage automated reports to allow BASIS to focus on uptime and maintenance rather than data gathering.

Information Security

Breakdown the silos between SAP and IT Security teams with security insights that both sides can easily understand.