CSI tools Facebook CSI tools Twitter CSI tools LinkedIn CSI tools Instagram
  • Home
  • Newsroom
    • Awards
    • Events
    • Press Releases
    • Publications
  • Software
    • Tools
      1. CSI Authorization Auditor 2016
      2. CSI Automated Request Engine 2016
      3. CSI Emergency Request 2016
      4. CSI Role Build & Manage 2016
      5. CSI Integrate & Collaborate 2016
      6. CSI Data Xtractor
        1. CSI Data Xtractor Pay & Go
    • Freeware
      1. CSI SQL XChange
    • Legacy Tools
      1. CSI Accelerator Suite
      2. CSI Authorization Auditor 9.x
    • Training
      1. Scheduled Open Class Trainings
  • Support
    • Login
  • Community
    • CSI tools Forum
    • Meta's Blog
    • Tech Updates
  • About
    • Contact
    • Jobs
    • Partners
      • Partners
      • Alliance Partners
      • Become a Partner
    • References
    • Testimonials
  • Login
Get compliant with CSI Authorization Auditor

Get compliant with CSI Authorization Auditor

Read More
Automate your audit cycle - save time and money

Automate your audit cycle - save time and money

Read More
Get insight into SAP license assignments to users, to save on SAP license costs

Get insight into SAP license assignments to users, to save on SAP license costs

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8

Security Software Tools for SAP Environments

CSI tools provides dynamic analytics solutions that deliver intelligence from and to decisions taken in access governance for SAP environments. 

CSI tools Governance, Risk and Compliance solution for SAP environments enables organizations to manage regulations and compliance and remove any risks in managing organization’s operations.

Solutions  About CSI tools

Security risks of Robotic Processing Automation (RPA) in SAP

Details
Dec 4, 2018 1:01 pm

Nowadays we see an increase in Robotic Processing Automation (RPA). RPA is based on executing automated scripts, by software bots. So, RPA can operate in place of a human being and therefore save time and costs.

RPA in SAP comes with risks for data leakage and fraud of the business critical and sensitive data, therefore governance and security is of great importance. This blog gives insight into these security risks and how to tackle them.

Privilege Access Management

Details
Nov 30, 2018 1:41 pm

SAP systems contains business critical and sensitive data that must be protected. Nowadays we have new challenges regarding the protection of this data. Environments are becoming more and more complex, access is possible via the cloud and the systems are distributed across geographical locations. 

Let's get personal

Request a demo on our applications here!


Click here to request a demo

  • 1
  • 2
  • 3


More references

Upcoming Trainings

  • Open-Class CSI Automated Request Engine Training - 2 Days
  • Open-Class CSI Authorization Auditor Training - 3 Days
  • Open-Class CSI Role Build & Manage Training - 3 Days

CSI tools

Support Direct (8:00 - 19:30 CET)
Tel. +32 16 308 008
support@csi-tools.com

Security Research Center Herent
Bieststraat 2
B-3020 Herent, Belgium
Tel: +32 16 308 000
Tel UK: +44 2035 003 987
Fax: +32 16 308 001 

info@csi-tools.com
sales@csi-tools.com

Last Updates

  • VNSG
  • CSI tools at IIA - Digital Audit Event
  • CAA South Central Ontario

Solutions

  • SoD and Risk analysis - CSI Authorization Auditor
  • Compliant Provisioning - CSI Automated Request Engine
  • Emergency Access Management - CSI Emergency Request
  • Compliant Role and Mass User Management - CSI Role Build & Manage
  • Extract SAP data - CSI Data Xtractor
  • CSI Integrate & Collaborate

©1997-2019 CSI tools, all rights reserved - General Terms & Conditions - License Agreement - Privacy Policy - Code of Ethical Conduct - Sitemap