Introducing an ERP Access Management tool for Roles & Permissions

Untangle Roles and Permissions| Segregation of Duty Issues| Terminated Employees with ERP Access| NIST and ISO Standards| RBAC
and protect the your ERP with confidence

No one needs to know it was this easy.

Built for Public Sector ERP Systems & their Roles & Permission Settings

Thank you for your interest in ThirdLine Shield! One of our team members will be contacting you soon.
Oops! Something went wrong while submitting the form.

Book a call to learn how we show risk and help you monitor

Software for the ERP Gatekeeper

Understand which ERP Users have access to what data, and know what Roles & Permissions really do.

NIST SP 800-53 Rev. 5

Accurately enforce Access Enforcement (AC-3), Least Privilege (AC-6), and Separation of Duties (AC-5)

Terminated employees with access to the ERP

Payroll and HR do not communicate with you about employees that are terminated or inactive. We can help.

ISO/IEC 27001:2022 & 27002

Access Control and Least Privilege principles can now be monitored.

What can a Role or User really do?

Grant minimum access to users necessary with ThirdLine's analysis of all roles & permissions in your ERP.

ISACA COBIT 2019

Align closely with access control, least privilege, and segregation of duties concepts.

Try ThirdLine Roles, Permssions, and SoD Now!

Talk to an expert!

Free Demo

Segregation of Duty Analytic Examples

See how our analytics flag highest risk Users, Roles, and Permissions

Audit Fraud

Maintain PO - Manual Check Processing

Permissions allow the possibility for a user to enter a fictitious purchase order and enter the covering payment.

Audit Fraud Risk

PO Approval - AP Payments

Permissions allow the possibility for a user to approve a fictitious purchase order and enter the covering payment.

audit fraud

Manual Check Processing - Vendor Master Maintenance

Permissions allow the possibility for a user to maintain a fictitious vendor and create a payment to that vendor.

Audit Risk

Maintain Asset Document - Goods Receipt to PO

Permissions allow the possibility for a user to create an invoice through ERS goods receipt and hide it in an asset that would be depreciated over time.

Risk

Cash Application - Bank Reconciliation

Permissions allow the possibility for differences between cash deposited and cash collections posted to be covered up.

Audit Fraud Risk

Basic Table Maintenance - System Administration

Permissions allow the possibility for a user to modify data in tables or modify valid configuration values and set up the production environment to run transactions and programs using the inappropriately modified data.

Audit Fraud Risk

Maintain Hierarchies - Post Journal Entry

Permissions allow the possibility for a user to post a journal entry and the ability to modify hierarchy and reporting output.

Audit Risk

System Admin and Non-View Permissions

Flags if a user has IT system admin and non-view permissions at the same time.

Summarize risk & spend at the Vendor, Employee, & Department level

Sign up now to get access!

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.