White Paper: Cogent Consulting
Cogent Consulting have been implementing invoice automation solutions, exclusively for SAP customers, since they were founded in 2005. In that time, our business and offerings have evolved along with the technology, experience and intellectual capital resulting from the delivery of 150+ projects for SAP customers globally. We continue the journey with existing and new customers by listening to and incorporating their great ideas in the solutions that we offer, so this document is here to give you a detailed understanding of the key ingredients that go into a successful invoice automation partnership. When we say it’s a journey and a partnership; we mean it because the automation we achieve on Go Live is only the beginning. The invoice automation solution is an enabler but does not deliver high automation rates without being implemented in the right way for the customer and no matter how good the implementation is; you can always improve automation long after Go Live using the insights from analytics. We are not the kind of company that repeat mantras or put profound quotes on our website, but here are two that should resonate with anyone involved with process improvement: “If you always do what you’ve always done, you’ll always get what you’ve always got.” Henry Ford “To improve is to change; to be perfect is to change often.” Winston Churchill
White Paper: CSI Tools
Although SAP Authorization concept has been widely followed in many software development environments, some of the enterprises are still facing issues to understand it. They often think that the purpose of SAP authorization objects is to restrict certain organizational levels and they can protect SAP systems by removing and assigning transaction codes to users.The reality is however completely different. Read this informative whitepaper on “SAP Authorization Logic - Where Did it All Go Wrong?” and learn about: How can you successfully implement the SAP authorization strategy? What are the actions which are subjected to SAP authorization checks that are performed before the start of a program or table maintenance? How can ABAP authorization concept protect the SAP systems from unauthorized access? What problems arise due to explicit authorization model that SAP designed for ABAP? What are the risks involved in the SAP security and how to mitigate them? Download this whitepaper that provides insights in SAP authorization logic, the logic and illogic of transaction codes and SAP authorization objects, the access path and an evolving approach for your GRC solutions.