Securing SAP financials

1 November 2013 Access Control & Identity Management, Information Security, Infrastructure

While security has always been a key concern for organisations, the growth in governance, risk and compliance (GRC) legislation means that it is more important today than ever before. For this reason, companies are seeking more secure ways in which to allow employees access to critical corporate applications.

“This has led to a growing demand for multifactor authentication,” says Nick Perkins, divisional director for identity management at Bytes Systems Integration. “In other words, companies want to move beyond the standard username and password manner of authentication, and are increasingly looking to biometrics to solve this issue. We have taken cognisance of these needs, which is why Bytes, in partnership with Realtime, can offer enterprises Biolock, which is the only biometric identity and access management software certified by SAP.

“SAP is one of the most business-critical systems in an organisation, and interactions performed within it can have far-reaching consequences for an enterprise. By implementing Biolock, management is able to know, indisputably, who is logging in. And since they can set unlimited re-authentication checkpoints, management is able to control what areas can be accessed and exactly what can be done by whom inside the SAP system.”

For example, adds Perkins, on the finance side, management may choose to set limits on purchase orders and transactions, while individual executives can have their visibility of data within the system limited according to their individual roles.

“Moreover, with Biolock, nobody can copy another’s identity, since it is based in fingerprints, while former employees, consultants or hackers are easily blocked. The software has also been developed with ease of use in mind, which is why it can integrate with over 80 models of fingerprint scanning devices.”

Perkins points out that Biolock has been specifically developed to deliver a complete access and authentication solution to organisations that utilise SAP, which is why it is easy to implement and integrates seamlessly into the SAP system.

In fact, the benefits of Biolock are many and varied. Not only can it be used to create true accountability for individual users’ actions, it can be utilised to enforce any segregation of duties, or checks and balances deemed necessary by the organisation’s business management or regulatory requirements. It also generates a robust audit trail of user activities, including failed access attempts, and provides employers with legal ammunition to pursue rogue employees.

“Biolock software complements, reinforces and sits on top of existing SAP security and GRC, ensuring that security is no longer a recommended set of protocols, but a strictly enforced procedure,” says Perkins.

For more information, contact Nick Perkins, Bytes Systems Integration, +27 (0)11 205 7000, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.