SOFY Acces Control | KPMG | NL
Share with your friends

SOFY Access Control

SOFY Access Control

Managing user rights in ERP systems

Managing user rights in ERP systems

Sometimes users are allotted conflicting rights with ERP systems, often without the organization knowing. This can lead to operational and financial risks. Because ERP systems support a company’s financial and operational activities, large numbers of users in different departments and entities have access. This makes it complex to maintain an overview of defined roles and allotted user rights. Using KPMG’s SOFY Access Control Monitoring, your organization can quickly and easily identify users and (potential) authorization conflicts.

Using Access Control Monitoring, departments such as finance, internal control and IT can manage and optimize the configuration of user rights within the ERP system. This enables your organization to get a clear picture, down to the level of individual employees, of which rights have been assigned and whether any undesirable merging of duties has been configured. In addition SOFY Access Control Monitoring offers the option to perform root cause analyses in order to optimize the design. The solution also offers simulation tools to identify new risks before these are actually implemented.

Roles, authorizations and actions performed are monitored in real-time and presented on a convenient dashboard, enabling you to manage risks that flow from assigning authorizations within an ERP system.

KPMG has many years of experience with ERP security. This experience forms the bedrock of Access Control Monitoring. The solution was developed in order to enable organizations to independently identify risks and access to confidential information within ERP systems. The solution is implemented using out-of-the-box KPMG rule sets which can be used as needed.

How will your organization benefit from SOFY Access Control?

  • Insight into conflicting roles and authorizations through interactive dashboards 
  • Option to examine authorization structures in detail and to perform root cause analyses in case of conflict
  • Simulation of access requests in order to identify potential undesirable merging of positions
  • Possibility of securing access to critical and confidential information

Connect with us


Request for proposal