Greenlight
  • SOLUTIONS
    • Financial Performance and Risk Analytics
    • Financial Impact of Risk
    • Security Risk Analytics
      • GDPR
      • Application Security Monitoring
    • Cyber Governance
    • Regulation Management
    • Continuous Monitoring
    • Insider Threat
    • Enterprise integration for SAP GRC
      • Greenlight for Ariba
    • Firefighting Solutions
      • Greenlight ResQ for Ariba
      • Greenlight ResQ for SuccessFactors
    • SAP Solutions by Greenlight
      • Access Violation Management for S/4HANA
      • SAP Access Violation Management
      • SAP Regulation Management
      • SAP Regulation Management, cyber governance edition
    • On-demand Demos
    • Request a Demo
  • ROLES
    • Finance Executives
    • Business Decision-Makers
    • CISO / CIO
    • Compliance Professionals
    • SAP Customers
  • RESOURCES
    • News
    • Brochures
    • Webinars (Upcoming)
    • Webinars (Archived)
    • Events (Upcoming)
    • White Papers
  • PARTNERS
  • ABOUT
    • Greenlight Technologies Overview
    • Greenlight’s Leadership Team
    • Awards & Accolades
    • Greenlight Technologies’ Careers
  • BLOG
  • CONTACT
Select Page

From Scalped Super Bowl Tickets to Fake Invoices at Microsoft

by Greenlight Technologies | Oct 19, 2018 | Access Violation Management, Insider Threat

One employee can do a lot of damage. Just look at the headlines the other day from Microsoft. A grand jury indicted Microsoft’s former director of Sports Marketing and Alliances, Jeff Tran, for allegedly trying to create fake invoices for up to $1.4 million and...

The Top P2P Segregation of Duties Violations

by Greenlight Technologies | Aug 29, 2018 | Access Violation Management, Enterprise Solutions, Finance Performance and Risk Analytics, Risk Management

by Craig Abramson, Greenlight Technologies According to the Association of Certified Fraud Examiners’ Report to the Nations on Occupation Fraud and Abuse, “the most prominent organizational weakness that contributed to the frauds in our study was a lack of internal...

Why Jabil Selected SAP Access Violation Management by Greenlight

by Greenlight Technologies | Aug 8, 2017 | Access Violation Management

Hear from Jabil, a Fortune 200 global manufacturing services company, how they quantified and identified true Segregation of Duties. View this video to understand first hand about their selection process, implementation, lessons learned, and key successes they have...

Ensure Audit Readiness with Comprehensive & Effective Controls

by Greenlight Technologies | Jul 19, 2017 | Access Violation Management, Impact of Financial Risk

Instead of implementing and relying on manual processes to meet governance standards and objectives, you can arm your Audit, Compliance and Business teams with Greenlight to automate the process and eliminate the possibility of control failures.  More importantly, you...

Financial Impact of Risk: Don’t Become That Bad Headline!

by Greenlight Technologies | May 4, 2017 | Access Violation Management

The buzz: “Choose what lies in the shadows to be a matter for discovery and adventure, rather than fear” (Jonathan Lockwood Hule). “The auditors noted” and “We discovered” are phrases feared by CFOs. Why? Failed audits detailed in your annual report can...

Webinar: Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success

by Greenlight Technologies | Mar 15, 2017 | Access Violation Management

Webinar: Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success Is your company planning to move to SAP S/4HANA? Managing known user risks both before the move and ensuring you are compliant after the move are critical to the success of...

On-demand Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

by Greenlight Technologies | Mar 3, 2017 | Access Violation Management

On-demand Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move to...

Heading to GRC2017? Don’t miss these sessions!

by Greenlight Technologies | Feb 20, 2017 | Access Violation Management

Heading to GRC2017? Don’t miss these sessions! Our close collaboration with SAPinsider this year has made it possible to extend a special registration discount off the on-site registration price: Register now and save $300 by clicking here. Don’t forget to...

Understand the Financial Exposure of Access Risks

by Greenlight Technologies | Feb 14, 2017 | Access Violation Management

Understand the Financial Exposure of Access Risks Managing the access that business users have to enterprise applications is a balancing act. Granting too much access leaves organizations exposed to higher risk, but granting too little prevents people from doing their...

SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation

by Greenlight Technologies | Feb 2, 2017 | Access Violation Management

SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation As organizations are transforming their business with SAP S/4HANA, they’re reinventing business processes and eliminating redundancies to focus more on...

Uncover the Financial Exposure of Access Risks

by Greenlight Technologies | Jan 31, 2017 | Access Violation Management

Uncover the Financial Exposure of Access Risks It’s a balancing act managing everyone’s access to your enterprise applications. Too much access leaves your company exposed to higher risk. Too little access keeps your people from doing their jobs efficiently. And...

Upcoming Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

by Greenlight Technologies | Jan 26, 2017 | Access Violation Management

Upcoming Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move to...

Financial Controls Need to be Ready for the Speed and Power of SAP S/4HANA

by Greenlight Technologies | Jan 9, 2017 | Access Violation Management

Financial Controls Need to be Ready for the Speed and Power of SAP S/4HANA A certain level of access risk is unavoidable – to eradicate it all would limit business productivity. But in many cases, the controls that companies put into place to mitigate risk are...

Moving to S/4HANA? Why You Need to Automate Controls to Truly Transform Finance

by Greenlight Technologies | Jan 3, 2017 | Access Violation Management

Moving to S/4HANA? Why You Need to Automate Controls to Truly Transform Finance S/4HANA is transforming finance by introducing reinvented processes and real-time insight for higher performance and better decision making. But what many organizations fail to realize is...

View On-demand: How to Uncover Materialized Access Risks Before Your Move to S/4HANA

by Greenlight Technologies | Dec 19, 2016 | Access Violation Management

View On-demand: How to Uncover Materialized Access Risks Before Your Move to S/4HANA S/4HANA is transforming finance by introducing reinvented processes and real-time insight for higher performance and better decision making. But are your financial controls ready for...
« Older Entries

Designed by Elegant Themes | Powered by WordPress

We would like to use cookies to better understand your use of this website. This enables us to improve your future experience on our website. Detailed information about the use of cookies on this website and how you can manage or withdraw your consent at any time can be found in our Privacy Statement.Ok