A business application solution enables companies to seamlessly integrate globally distributed financial reporting and operating processes. Because of the complex nature of ERP installations, many manual internal control mechanisms have been rendered obsolete. This has provided organizations with the challenge of designing new automated control mechanisms to address the business risks that continue to exist. In addition, configuration of the security of ERP packages to ensure that adequate segregation of duties is achieved can be complex and is often not adequately addressed as part of an implementation project.
To achieve maximum benefit from an ERP implementation, we believe integrity issues must be addressed during business process redesign. Our experience has shown that this is the most effective means of facilitating fundamental change in an organization's control structures, including the control environment, policies and procedures, and information systems. It forces consideration of process integrity as it relates to risk, objectives, and strategies. The process and systems integrity approach assures that controls and security are addressed up-front rather than just prior to, or retrofitted after, going live. Our professionals utilize in-depth knowledge of the packages we work with, as well as unique tools and methodologies to provide focused, cost-effective solutions. An emphasis on knowledge transfer provides clients with the training and skills needed to maintain controls and security going forward.
In order to assist clients in achieving adequate risk management within an ERP environment, our practitioners are able to provide:
• Assessment of an ERP environment focusing on business process and security controls and providing practical recommendations as to how to remedy deficiencies identified in these areas.
• Design and implementation of business process and security controls as part of an ERP implementation.
• Reengineering of business process and security controls after an implementation has occurred.
• Analyzing application security requirements
• Configuring application security (development and production)
• Designing security administration procedures.
Application Technology Integrity
• Designing and implementing security and control measures within the application's technical environment.
Business Process Integrity
• Analyzing business process risk and integrity requirements for control and optimization purposes
• Designing package-enabled and manual integrity techniques
• Developing control procedure manuals and conducting control training.
Interface and Conversion Integrity
• Designing and implementing automated and manual controls for one-time (conversions) and ongoing interfaces.