Process Compliance Audits
A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines. Independent accounting, security or IT consultants evaluate the strength and thoroughness of compliance preparations.
Auditors review security polices, user access controls and risk management procedures over the course of a compliance audit.
What, precisely, is examined in a compliance audit will vary depending upon whether an organization is a public or private company, what kind of data it handles and if it transmits or stores sensitive financial data. For instance, SOX requirements mean that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure.
IT administrators prepare for compliance audits using event log managers and robust change management software to allow tracking and documentation authentication and controls in IT systems.
CELONIS Software for SAP Process Mining
SAP Process Mining by Celonis is a powerful software for retrieving, visualizing and analyzing real as-is business processes from transactional data stored by the SAP ERP systems. It provides users with the possibility to create and share comprehensive process analyses giving them full transparency about the business processes at hand.
In order to provide process analyses, SAP Process Mining by Celonis makes use of raw data taken from the SAP ERP systems. For efficient use, the solution requires data to exist in a specified target structure. Thus, raw data from the SAP ERP systems will be transformed into that structure on a regular basis.
The result will then be stored as either views or tables. As analytical backbone for the management and storage of the raw data as well as the transformed Process Mining data and as enabler for its real-time analytics, SAP Process Mining by Celonis uses the SAP HANA technology.
SAP Process Mining by Celonis was designed as an analysis platform for the supervision of several business processes and by several users at the same time. It is a browser-based web application with a client-server architecture that is easily accessible throughout an enterprise for many users at the same time. User access can be restricted either on analysis-,or data-model-level. Users can also be assigned different roles with different rights for making configurations or creating analyses