
Features
- Segregation of Duties and Critical Access : Perform Access Risk analysis on any system.
- Cross System Segregation of Duties : Identify and assess risks resulting from access across multiple systems.
- Simulation : Improve your provisioning process by simulating role or authorization assignments before implementation.
- User and Role information system : Easily explore your authorization concept or review user access with just a click.
- Power BI Reporting: Ready-to-use .pbix file providing actionable insights based on risk analysis results.
Add-ons
- Remediation Report : Leverage action usage data to identify opportunities for remediation, evaluate the impact of removing authorization from roles or users. (Coming soon)
- (SAP) Role Designer : Utilize default authorization configurations, describe your requirements (transactions, fiori apps) to our AI, and automatically generate the necessary role designs. (Coming soon)
- (SAP) Did-Do Analysis : Determine whether access risks were actually realized within the system by analyzing user activity and identifying impacted line items. (Coming soon)
- Management reporting : Deliver comprehensive insights and business-oriented explanations to support informed decision-making for your management team. (Coming soon)
Add-ons are not included in the base product are are sold separately
System Data
MTC Risk Analyser has been designed for use with both SAP and non-SAP systems:
Ruleset
Since each environment is unique, MTC Risk Analyser does not include a built-in ruleset. Customers must develop their own ruleset or seek support from Meylan Technologies & Consulting Sàrl to tailor a ruleset.
Installation & Connection
No installation needed, MTC Risk Analyser is a portable software that runs without requiring installation or configuration. Currently, only RFC connections to SAP systems are supported. Data from non-SAP systems must be provided using a standardized flat file format as abovementionned. To integrate additional systems, you can request the services from our software engineers and architects to develop custom connectors.
RFC Connection
We deliver custom-built function modules designed to ensure secure and optimized data extraction and protect against unauthorized use.