Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security & Auditing Solutions for Infor-Lawson Software 1.

Similar presentations


Presentation on theme: "Security & Auditing Solutions for Infor-Lawson Software 1."— Presentation transcript:

1 Security & Auditing Solutions for Infor-Lawson Software 1

2 2 Agenda About Us Benefits Products Services Security Dashboard Security & Auditing Solutions for Infor-Lawson S3

3 3 About Us Security & Auditing Solutions for Infor-Lawson S3 Founded in 1983, Kinsey has provided software sales, implementation, support and development for 32 years. Lawson reseller and implementation partner since 1997. Lawson certified systems integrator partner. Lawson complementary software partner. Lawson’s “Go to” implementation partner for public sector. Provide complementary Lawson software products. Implemented solutions for over 120 Lawson accounts. Committed to your success.

4 Benefits Security Solutions for Infor-Lawson S3

5 Client Benefits 5 Improved Capabilities Our Security Reporting and Auditing applications provide in- depth reporting analysis of Lawson Security data. Expanded Offerings User monitoring, transaction auditing, segregation of duties reporting and security modeling provide critical insight to your Lawson system. Time Saver Custom Security definition and audit reports save you hours of validating user security. Saves Money Our clients have reduced labor intensive security reviews from a few weeks to a few days. Audit Compliant Our tools assist with developing and maintaining an audit compliant security model as well as investigating questionable transaction activity. Cost Effective Our tools are very affordable when compared to competing products. Security & Auditing Solutions for Infor-Lawson S3

6 Our Products Security Solutions for Infor-Lawson S3

7 Security Dashboard 7 Security Reporting Provides detailed analysis on your security model including all assignments for Users, Roles, Security Classes, Tokens, Rules and Attributes. Security Modeling & Utilities Create ‘what-if’ scenarios within your security model without changing any security settings and report back on what users are affected. Security Auditing Our security audit report enables you to monitor all changes to your security model including the before and after values of any specific setting. Security & Auditing Solutions for Infor-Lawson S3

8 Security Dashboard 8 Segregation of Duties Validates that the correct checks and balances have been implemented within the security model to avoid potential fraudulent activity. Activity Monitor Provide insight and control over your Lawson S3 applications by monitoring user activity. Use this information to validate your Lawson security settings, monitor user activity, measure peak usage times or monitor software usage patterns. Security & Auditing Solutions for Infor-Lawson S3 Security Migration Process (SMP) Our security migration process is a fast and simple yet extremely thorough method if defining and implementing Lawson Security.

9 Security Dashboard 9 Security & Auditing Solutions for Infor-Lawson S3 o Security Reporting o Security Analyzer o Security Auditing o Object Modeling o Role Modeling o Object Comparison o Security Visualizer o Security Utilities Features

10 Security Reporting 10 Users Displays all User-Object security assignments. Roles Displays all Role-Object security assignments Security Classes Displays all Security Class (Task)- Object security assignments. Objects Displays all assignments for Structures, Groups, Tables, Attributes, and Fields, Historical Automatically creates historical copies of LS for reporting and comparison purposes Save, Export, Email Save, Print, Export or Email your custom reports at anytime. Security & Auditing Solutions for Infor-Lawson S3

11 Security Reporting 11 Security & Auditing Solutions for Infor-Lawson S3 o 13 User queries o 8 Role queries o 10 Task queries o Statistics & Metadata o Listener Activity o Orphaned Objects o Links to Lawson HR o View any profile o Multiple Environments Report Features

12 Security Reporting 12 Security & Auditing Solutions for Infor-Lawson S3 o Object Filters o Column Sort o Column Grouping o Drill around o Save any query o Print to PDF or printer o Export to MS Excel o Email scheduled reports Report Options Security data is pulled nightly or on demand from your LDAP server and stored in a collection of SQL tables for easy access.

13 Security Reporting - Historical 13 Security & Auditing Solutions for Infor-Lawson S3 Our historical reports will compare your current security settings to a historical point in time referencing what has been changed. You can also generate security reports from the historical tables. o Object Filters o Column Sort o Column Grouping o Drill around o Print to PDF or Printer o Export to MS Excel o Compare to Historical Report Options

14 Security Reporting - Analyzer 14 Security Solutions for Infor-Lawson S3 o User Form Rules o User Table Rules o User Field Rules o User Program Rules o Form Conditions o Field Conditions o Filter by User o Created in MS Excel o Unlimited Saved Reports Report Features The Security Analyzer allows you to create custom reports for just the users you need to see. Then easily review the least restrictive access assigned to each form, table, program or field by user.

15 Security Modeling & Utilities 15 Objects Reveal how changing an objects assignment or rule on any given security class will effect the associated users. Roles See how adding or removing a role from a user will effect the users security privileges. Task Discover how adding or removing a security class from a role will effect the users associated with that role. Utilities Compare, map, copy and upload security assignments directly to LDAP. Our set of modeling tools give you the flexibility you need to foresee the cause and effect of making a change to your security model prior to implementing any updates. Once you’re comfortable with the results our utilities can help you expedite the process. Security Solutions for Infor-Lawson S3

16 Security Modeling – Role Modeling 16 Security Solutions for Infor-Lawson S3 o Add a Role to a User o Remove a Role from a User o Add a SecClass to a Role o Remove a SecClass from a Role Features Model the affect of changing any User-Role or Role-Security Class assignment.

17 Security Modeling – Role Modeling 17 Security Solutions for Infor-Lawson S3 Projected changes to User permissions are highlighted in blue.

18 Security Modeling - Visualizer 18 Security Solutions for Infor-Lawson S3 o Map from any object o Drill to Security Reports o Drag and Drop Assignments o Object Filtering Features Use the Visualizer to quickly see how Users, Roles and Security Classes are connected.

19 Security Utilities – Object Comparison 19 Security Solutions for Infor-Lawson S3 o Role Redundancy o Role Absorption o Sec Class Redundancy o Sec Class Absorption o Filter by Object Name o Drill to Security Reports Analyze The Object Comparison utility provides a quick visual of potentially redundant Roles or Security Classes.

20 Security Auditing 20 Object Changes Audit any change to any object in the security model and view the before and after values. Historical Audits Generate reports based on object names, user names or date ranges to find just the data you need. Custom Queries Create and save custom queries using the advance search and filtering options. Notifications Print, export or email scheduled notifications for any saved report. Security Solutions for Infor-Lawson S3

21 Segregation of Duties Security Solutions for Infor-Lawson S3 Once you have defined a report simply add it to our schedule so you can be notified when a security change causes an SoD violation. Automatic Email Notifications Our Lawson application consultants have defined over 2,200 rules that are used to validate that your security conforms to the 240 SoD delivered policies. You have full flexibility over adding or changing any of the rules. Over 2,200 Predefined Rules With our delivered policies covering Asset Management, Cash Management, Closing Procedures, Inventory Control, Order Processing, Payables Management, Receivables Management, and Payroll you will receive immediate benefits from the SoD reports. You can also define your own policies using the SoD admin screen, 240 Delivered Policies The Segregation of Duties application is designed to ensure that you have the proper checks and balances built in your security model to prevent fraudulent activity. With the added flexibility of our ad-hoc reporting you can create, save, and email critical reports as needed.

22 Segregation of Duties 22 8 Predefined Categories Policy Importance Ratings Create Unlimited New Categories Create Unlimited New Policies Created Unlimited New Rules Modify any Existing Policies Define Rules by Form, Role, Security Class or Field SoD Policies Security & Auditing Solutions for Infor-Lawson S3

23 Segregation of Duties 23 By User by Policy By Policy by User By Role Group by Policy Differences Report Microsoft Excel Export Unlimited Saved Reports Scheduled Email Notifications SoD Violation Reports Security & Auditing Solutions for Infor-Lawson S3

24 Activity Monitor 24 Activity Monitor is designed to provide insight and control over your Lawson S3 applications. Extensive metadata analytics allow you to closely monitor how your applications are being used and where you may be exposed to a security risk. You can use this information to validate your Lawson security settings, monitor user activity, measure peak usage times or monitor software usage patterns. With the added capability of providing the transaction record keys, Activity Monitor is an invaluable auditing tool when questions arise surrounding changes made to your Lawson system. Complete Transparency Security & Auditing Solutions for Infor-Lawson S3

25 Activity Monitor – Reporting 25 Security & Auditing Solutions for Infor-Lawson S3 o By User o By Form o By Function Code o By Date o By Record Key o Drill to Security Reports Analyze All Activity Monitor data can be displayed using our LS reporting application. This allows you to create unlimited custom reports and associate actual usage to a users security settings.

26 Security Migration A better way of transitioning to Lawson Security

27 Security Migration Options 27 Multiple vendors provide predefined Excel based Roles and Security Class for LS. Customizing these to fit your environment can be a challenge. Manually building LS can be extremely time consuming and painful. This is generally the least desirable route. Lawson’s Security utility copies your existing LAUA security to LS by creating 1 Role and 1 Class for every LAUA Sec Class Kinsey’s solution builds an audit compliant object oriented Role and Security Class model based on user requirements. Security & Auditing Solutions for Infor-Lawson S3

28 Security Migration What we do. 28 Monitor Track all user activity to validate actual form requirements. Prepare Tune existing LAUA model based on Activity and Segregation of Duties results. Build Automatically create Role and Security Class objects based on common LAUA user access then add data level security. Test Preform positive and negative testing to ensure proper access.

29 Security Migration How we do it. 29 IC Admin Sec Class ASec Class B Sec Class C Sec Class D 1 Role A Role B Role C Role D LAUA LS AP SetupAP UpdateAP ProcessingAP ReportsAC ProcessingAC UpdateAC ReportsGL Reports By finding common form access across all Security Classes we can infer how forms should be grouped to create LS Security Classes. The application will then build unique classes for each Lawson system code. Once the Security Classes are created the application will automatically create the Roles and make the appropriate User assignments.

30 Security Migration Services 30 Analyze We will assist you with analyzing your user activity and Segregation of Duties Reports Tune By tuning LAUA to align with your actual security needs we can use this information to build LS Train We provide training throughout the project so you will be able to maintain the new security model going forward. Customize Our certified consultants will assist you with writing data level security logic to protect you against unauthorized access. Test and Deploy A critical step in the process, our project plan will guide you though both positive and negative testing prior to deployment. Support From installation through post go- live our team of consultants will assist in every phase of the project. Security & Auditing Solutions for Infor-Lawson S3

31 Transaction Auditing Expanding Lawson’s Auditing Capabilities

32 Transaction Auditing 32 FeatureKinseyInfor-Lawson Predefined Audits Ability to Audit all 6500+ Forms Ad-hoc Reporting Historical Reporting Saved Favorite Reports Report Scheduling Automatic email distribution Drill to Security Drill to User Activity Monitor Audit Inquiries Security & Auditing Solutions for Infor-Lawson S3 30 55

33 Transaction Auditing - Reporting 33 Security & Auditing Solutions for Infor-Lawson S3 o Every Add o Every Change o Every Delete o Every Inquiry o Any Form o By Who o On What Day o Before/After Values Analyze All Transaction data can be displayed in our TA reporting application. Create unlimited custom reports and send automatic email notifications. o By User o By Form o By Function Code o By Date o By Key Report

34 Benefits to working with us We like to think that we are an easy group to work with. Our management team and consulting staff are available when you need us. And with consultants spread throughout the US we are able to cover all time zones for our clients and partners. We’re Friendly There’s no need for you or your clients to worry about continued support of our applications. For over 33 years we have maintained multiple application and security consultants to handle every situation that occurs. As a privately held company we are here for long run. Stability Kinsey brings over 33 years of ERP implementation and development experience to our clients. Every Kinsey consultant has over 20 years of experience in this space and with over 130 Lawson Clients we cover everything from installation, implementation, support and project management. Experience

35 Services We can help. 35 Kinsey consultants have been implementing net new Lawson implementations for over 18 years. Our consultants are Lawson certified in every application suite. Our staff of certified consultants and project managers can guide your clients through the complete upgrade process. Upgrades ERP Consulting Security Consulting Our team of security consultants have helped over 60 Lawson clients migrate from LAUA to LS over the past 4 years.

36 Meet the Team Who are behind the scenes

37 Meet the Team 37 Brad Kinsey CEO & Co-Founder Brad Kinsey is responsible for the sales and administrative functions of the company, including legal, accounting and human resources. Dan Kinsey President & Co-Founder Dan Kinsey is responsible for product development, implementation and support of all Kinsey applications. Guy Henson VP Business Development Guy Henson is responsible for the business development and sales activities for Kinsey.

38 Thanks for attending! We hope you found it helpful! Kinsey & Kinsey, Inc. 26 North Park Boulevard Glen Ellyn, IL. 60137 630-858-4866 g.henson@kinsey.com call 757-621-8236 www.kinsey.com


Download ppt "Security & Auditing Solutions for Infor-Lawson Software 1."

Similar presentations


Ads by Google