Wednesday, June 12, 2019

Managing SAP BI Security – Sensitive Data Governance

Managing security within your SAP BI deployment is hard enough, but you also have to be concerned with your deployment's periphery, and its relation to external data sources.

The APOS Intelligent Data Access Controller (IDAC) extends the BI administrator's control of data processes beyond the BI system to the data sources themselves. IDAC gives you the ability to monitor and manage queries from your BI system to all of your enterprise data sources.

New and evolving regulatory requirements create additional complexity for BI platform managers and administrators. To meet these requirements and overcome complexity, you need to take a proactive approach to data access, audit and accountability within your SAP BusinessObjects deployment. You need to know who is doing what, where, and when.

IDAC is an intelligent, data source agnostic solution that can vastly improve the ability of BI platform managers, administrators and technicians to exert control over data and data access across multiple applications, operating systems, and data sources and types. This solution helps you manage and audit data access and activity across technologies, while improving system performance, information security, data privacy, and regulatory accountability.

Flagging Sensitive Data
When you are reviewing the security of your BI system, sensitive data deserves special consideration, especially in industries such as financial services and healthcare, where the security and privacy of data is highly regulated. BI platform managers and administrators need to be able to track user access and report on it to the appropriate regulatory and internal governance authorities when necessary. Unauthorized access constitutes a data breach, regardless of intention, and regardless of whether it is external or internal.

One of the key features of the IDAC solution is the ability to track specific fields. For example, in a healthcare environment, you can set up alerts to be triggered by a query against a Patient ID. This is particularly useful, because under HIPAA a patient has the right to know who has accessed their health records. A query to the IDAC database can give you this information immediately. You can also use the data from the IDAC database to analyze user behavior over time.

Friday, June 7, 2019

Managing SAP BI Security - Data Distribution Governance

BI publishing answers a very complex question that many organizations are currently facing. The question is this: how can an enterprise cope with an exponential growth in data, data types, and data sources, meet expanding regulatory requirements, cater to increased stakeholder communications needs, and manage security, privacy and other risks ‑ all while reducing costs and increasing shareholder value?

Part of the objective of implementing distribution technology is to maximize ROI, competitive advantage and stakeholder value, while minimizing risk.

The information-intensive nature of modern organizations, along with the complexity of the regulatory landscape, make the collection, generation and distribution of enterprise information critical. The right information has to get to the right recipients at the right time and in the right format.

APOS Publisher
The APOS Publisher solution helps enterprises using SAP BusinessObjects in complex publishing scenarios to execute tightly controlled document production, publishing and distribution workflows. Using Publisher's advanced bursting, automation, workflow monitoring, interactive process control, assured delivery, and enhanced distribution, encryption, and integration capabilities, enterprises can reduce risks, increase the ROI on their BI system, and build stakeholder value.

APOS Publisher for Cloud
APOS Publisher for Cloud takes lessons learned from BI publishing and applies them to SAP Analytics Cloud. It automates processes for bursting personalized SAP Analytics Cloud stories to end users. Dynamic, security driven processes with strict filters provide SAP Analytics broadcasting capabillities and help administrators ensure users receive only the data to which they are entitled.