Connect existing GRC 10.1 Access Controls solution to an existing SAP HANALIVE DB via HANA Studio environment
Configuration will allow user provisioning to SAP HANA DB via HANA Studio
Configuration will allow assignment of SAP Analytic Privileges to users in SAP HANA DB via HANA Studio
GRC 10.1 AC and SAP HANA Studio must already be deployed at the correct patch levels
GRC HANA plugin must already be deployed at the correct patch level*
*RapidGRC can assist with this step if required. However, this element must be completed in advance of our RapidTrack HANA Edition service.
Deployed in 2-5 Days
GRC 10.1 Integration with HANALIVE Database
GRC 10.1 configuration to integrate with a SAP HANALIVE Database
*This is a configuration element only and does not include any plugin deployment prerequisites.
ADDITIONAL BENEFITS & SERVICES
Whatever your training needs, RapidGRC will tailor make a series of training sessions to support your requirement. Our expert consultants will come to the location of your choice and deliver the training in familiar surroundings to ensure an optimum learning environment.
The training can be designed to target a specific area of interest or ongoing projects or even just refreshers for existing enhancement functionality. We offer a high level overview of GRC features and tools for those clients who are considering adding new SAP tools to their in house application suite.
Flexible Support Options
Flexible Support Credits
Ad-Hoc Support Consulting
Our #RETROFIT solutions are totally unique in our industry and the team are pleased to be able to offer this to our customers.
When one of the team at RapidGRC identify improvements to standard GRC functionality, identify common areas for improvement, or when we collectively design a solution to improve SAP GRC elements, we will #RetroFit the solution for free* to the clients who feel this will be beneficial.
Root Cause Analysis & Remediation Planning
Investigate access risk root cause: e.g. excessive access
Provide Access Risk root cause analysis report and recommendations
Further analyse the possible remediation and mitigation actions: fix role design defects; adjust user-role assignment, improve business processes or deploy mitigation controls
Develop remediation & mitigation plan detailing tasks and actions required to be carried out to address pressing access risks
Execute on Remediation Plan
Provide fixes to existing role design defects; recommend user-role assignment amendments, or deploy mitigation controls