With ERP systems like SYSPRO becoming the core of business, the issue of ensuring sufficient oversight and control of transactions and operations becomes critical. SYSPRO’s governance, risk management and compliance functionality provides organizations with the capability of monitoring and documenting information flows and business transactions to detect and prevent changes that would increase risk and compromise business operations.
Regardless of the corporate regulatory environment in which a business operates, SYSPRO can provide the necessary controls for the segregation of duties, integrity of operations and auditability to satisfy regulatory requirements.
Our security measures can be configured to be as simple or as finely tuned as your operating environment requires.
Business Security Software
SYSPRO’s security management features fall into four dimensions providing you with full visibility to transactional data for key codes such as warehouse, banks, salespersons, ledger etc.
SYSPRO incorporates a number of facilities aimed at preventing unauthorized access and ensuring authentication. Standard security features include password control and group and operator maintenance facilities. Administrators can also control access down to certain business processes, companies, modules, menus, and program functions and activities.
Company-wide set-up options enable SYSPRO to be tailored to suit your company’s control requirements. Controls include:
- Set-up options
- Power tailoring functionality
- Electronic signatures
- Process modelling
Allows observers to be aware of the state of a system so that action can be taken if any changes or irregularities occur. SYSPRO’s monitoring functions include dashboards, which provide a visual indication of what is happening, as well as systems which can be automated so that continuous controls monitoring can be implemented.
Together with risk and compliance management, the role of auditing is to analyze and assess business data, transactions and processes and provide insight and recommendations for changes, as well as notification of breaches of policies and procedures. Master data amendment journals and transactional audit trails provide records of data changes and the users responsible. The job logging facility provides an audit trail of user access and processing activity.