Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 2 Ratings

Total
ease
features
design
support

Description

Oracle Governance, Risk and Compliance (GRC) operates through two primary components: Enterprise Governance, Risk and Compliance Manager (EGRCM) and Enterprise Governance, Risk and Compliance Controls (EGRCC). The EGRCM serves as a comprehensive documentation tool that outlines a company’s approach to managing risk and adhering to regulatory standards. It allows users to identify potential risks within the business, establish controls to mitigate those risks, and link them to relevant business processes. On the other hand, EGRCC consists of two key parts, namely Application Access Controls Governor (AACG) and Enterprise Transaction Controls Governor (ETCG), which empower users to design models and controls to detect and rectify segregation of duties issues and transaction-related risks within business applications. Both components function as modules within the GRC framework, with EGRCC operating as a Continuous Controls Monitoring (CCM) module and EGRCM inherently including a Financial Governance module. This integrated approach ensures that organizations can systematically address various compliance and risk management challenges effectively.

Description

Provide employees with the necessary applications and services while safeguarding data and processes from unauthorized access. Simplify the management and validation of user access through governance tools that automate user provisioning and ensure compliance with access certification for on-premise applications and data. By integrating preventive policy checks and monitoring emergency access, governance can be effectively enforced. Automatically detect and address access risk violations within SAP and external systems, while embedding compliance checks and essential risk mitigation into operational workflows. Facilitate user-initiated, workflow-oriented access requests and approvals, ensuring transparency and efficiency in the process. Accurately identify and resolve issues related to segregation of duties and critical access by incorporating integrated risk analysis. Streamline user access assignments across SAP and third-party systems automatically, while defining and maintaining compliance roles in clear, business-friendly terminology to enhance understanding and adherence. This comprehensive approach not only mitigates risks but also fosters a secure and efficient operational environment.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

4ALLPORTAL
7pace Timetracker
Asite
Axya
ChemicalSafety
Dovetail Software
FlashBlade//S
Funding Gates
GoodCompany
IAMTech
Instanta Facility
Kytes
Panax
SAP Joule
Secret Double Octopus
StarRez
VSG-365.ai
eTEAM
edloomio LMS

Integrations

4ALLPORTAL
7pace Timetracker
Asite
Axya
ChemicalSafety
Dovetail Software
FlashBlade//S
Funding Gates
GoodCompany
IAMTech
Instanta Facility
Kytes
Panax
SAP Joule
Secret Double Octopus
StarRez
VSG-365.ai
eTEAM
edloomio LMS

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Oracle

Founded

1977

Country

United States

Website

docs.oracle.com/cd/E37379_01/index.htm

Vendor Details

Company Name

SAP

Founded

1972

Country

Germany

Website

www.sap.com/products/access-control.html

Product Features

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

GRC

Auditing
Disaster Recovery
Environmental Compliance
IT Risk Management
Incident Management
Internal Controls Management
Operational Risk Management
Policy Management

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Product Features

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Alternatives

Cyberator Reviews

Cyberator

Zartech

Alternatives

EzyWine PRO Reviews

EzyWine PRO

Ezy Systems
ADOGRC Reviews

ADOGRC

BOC Group
SPHEREboard Reviews

SPHEREboard

SPHERE Technology Solutions