vividConsulting.info

About Us

Founded in 2010, vividConsulting.INFO is a leader in Security, Controls and Governance, Risk and Compliance (GRC) consulting for SAP software. Our culture is one of knowledge sharing, quality management and customer satisfaction.

With extensive industry specific experience, our specialist consultants have a unique insight into risk management best practice. We combine this with deep technical ability and practical business experience to ensure that each of our clients achieves the delicate balance between security and business enablement.

What We Offer

1

At vividConsulting.INFO, we are well placed to assist you in developing your organization's vision and capability in this area. We have extensive experience working with our clients to address the challenges of today’s increasing security threats.

  • Defining internal best practice
  • Defining your security and GRC roadmap
  • Defining your roll-out methodology
  • Improving business engagement
  • Project management and advisory
  • Managing outsource providers
2

vividConsulting.INFO has a strong foundation in the design, build and deployment of SAP security solutions. Our experience covers all of the various authorization concepts available across the SAP solution set. This includes securing less well known solutions such as structural authorisations or non-ABAP applications such as MDM or BPC.

In addition to core SAP security solutions we also have significant experience in the implementation of all of the major segregation of duties and continuous control or transaction monitoring applications.

3

Our security professionals have expertise in the redesign, delivery and review of security, controls and GRC related processes. We will evaluate your existing policies and procedures against best practice and recommend robust, pragmatic solutions that align with:

  • Business requirements
  • Control objectives
  • Overarching security policies and practices across your organization

Key process areas that we focus on are:

  • User administration
  • Privileged access management
  • Application security design and development
  • Change management
  • Segregation of Duties remediation, including the maintenance of SoD rules
  • Security as a set of critical activities within the SDLC
  • Transition to support, including cutover
  • Business Continuity Planning (BCP) and Disaster Recovery (DR)
  • Monitoring and reporting