Check ID in SAP

Protect any Function in SAP with 2FA / MFA

  • Home
  • About Us
  • Solutions Areas
    • Finance
    • Human Resources
    • Customer Service
    • Supply Chain
    • Data Security
  • Case Studies
    • Supply Chain
    • Banking Fraud
    • Procure-to-Pay
    • Payroll Fraud
    • Retail / POS
    • Employee Self-Service
    • Workflow Approvals
    • Perimeter Security
    • HIPAA Compliance
    • Public Sector Fraud
  • Multimedia
  • Contact
  • Partners

Data Security

Knowledgeable users of SAP ERP can access extremely powerful system functions beyond what they should need for their daily work, simply by learning about SU01 (user functions), SE16 (system data browser), DDIC (generic administrator logon) and so forth. It is important to realize that these are powerful system management queries that can result in extensive damage or data loss. Knowledge of these functions, combined with a “borrowed” password, may be all that stands between your organization and a serious data breach.

For example, if a disgruntled employee intends on leaving, they can export the entire list of customers or vendors, no matter if the list is 1,000 or 1,000,000 records. A DDIC logon completely conceals the user executing it, unless a second factor of biometric identification is added to the process. If a malicious employee uses such an anonymous log-on to upload malware into the system, or move it from DEV to PROD, only a biometric credentialing component will be able to identify the user correctly, assign the appropriate credentials for the requested action, and even deny the user’s action.

If a former employee, contractor, auditor, intern, or temporary worker can still access the system because they have knowledge of a valid password, they would effectively be what is known as a “ghost worker”. In the absence of biometric credentialing that would help prevent such unauthorized access, the security breaches shown above are not preventable.

Threats in Data Security include:

  • Browser functions such as SE16, SU01
  • Generic logon such as DDIC, firefighter
  • Transport Manager
  • Perimeter Access Control

Related Case Studies

  • Public Sector Fraud
  • Payroll Fraud
  • Perimeter Security

“Deployment of the biolock™ Suite has moved Consol to a level of SAP transaction process security way beyond that offered by traditional User Name/Password based methods. With a robust audit trail we can now provide and prove full compliance to generally accepted good governance practices, compliance and policies.
CONSOL GLASS

realtime

realtime helps its enterprise and public sector clients achieve dramatic security improvements via biometrics in SAP ERP systems and the HANA platform without affecting existing security processes. Enforce GRC, prevent Segregation of Duties violations, achieve regulatory compliance.

Solutions

Finance
Human Resources
Customer Service
Supply Chain
Data Security

Case Studies

Supply Chain
Banking Fraud
Procure-to-Pay
Payroll Fraud
Retail / POS
Employee Self-Service
Workflow Approvals
Perimeter Security
HIPAA Compliance
Public Sector Fraud

Follow us on Social Media

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Medium
  • Twitter
  • YouTube

Copyright © 2025 · Legacy Theme on Genesis Framework · WordPress · Log in