Connect with us

Hi, what are you looking for?

HEADLINES

Infor announces availability of newest iteration of cloud-enabled Infor Governance, Risk, and Compliance

The next-generation Infor GRC helps the Chief Finance Officers, Business Process Owners, Risk Officers, and Auditors monitor business processes and risks at a high level with the role-based homepages. Infor is able to help its customers enable identification of violations, which in turn can reduce the risk of fraud and help avoid inappropriate access rights.

Infor, a provider of industry-specific cloud applications, announced the availability of the newest iteration of cloud-enabled Infor Governance, Risk, and Compliance. The next-generation Infor GRC helps the Chief Finance Officers, Business Process Owners, Risk Officers, and Auditors monitor business processes and risks at a high level with the role-based homepages. Infor is able to help its customers enable identification of violations, which in turn can reduce the risk of fraud and help avoid inappropriate access rights.

“Every organization has multiple business processes such as procurements, payroll, benefits, and all cash processes, which have many points of failure and intervention, and could easily lead to fraud, inefficiency and lack of compliance,” said Manjunath Ganimasty, vice president, Infor. “We continue to develop Infor’s risk and compliance offerings so our customers can navigate risk in complex business environments with system-wide visibility, evaluation, and response. Infor GRC allows companies to address these key issues and better manage enterprise risks, such as regulatory developments, control failures, resource management, process standardization, and cost reduction, among others.”

Infor GRC is a comprehensive solution for enterprise risk management that helps private and public sector organizations monitor and analyze transactional and master data, as well as user access and application security data. Hosted on Infor OS, Infor GRC can receive data near real time and make it available for analysis to capture violations. With Infor GRC, insightful reports can be generated to document point-in-time information that might be helpful for audit purposes. Users also have access to a new way of provisioning a user using the improved Approval Process, which allows the Chief Information Officer to shift the burden of access control. Multiple users can be provisioned across multiple applications in the same user provision, and the risk of role assignment can be identified by simulating the assignment using the “what-if” feature.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

Advertisement