What users are saying about

Acronis Files Connect

4 Ratings
Score 8.4 out of 101

SAP Access Control

179 Ratings
Score 8 out of 101

Add comparison

Likelihood to Recommend

Acronis Files Connect

If you have enough Mac clients working off a server, and they need search, or have been causing issues with Office docs, then this is definitely for you. Even if it's just a few users, the price of a small license is quite reasonable. If you don't have these issues, I wouldn't bother. The Mac does SMB "relatively" well.
Ryan Stasel profile photo

SAP Access Control

SAP Access Control is suitable for organizations with more than 100 users. At this user amount it begins to get difficult to keep track of the roles assigned to every user and the satisfaction of segregation of duties rules on every role assigned. If the number of users extends the hundreds, the cost of assurance of the right privileges assigned to every user rises exponentially. Failure to implement a solution like SAP Access Control in an organization will result in the execution of fraud cases. If a company is not managing access privileges with a tool like SAP Access Control, I suggest keeping a record of loss events related to excessive privileges. This record will justify investment in the product.
Luis Cruz profile photo

Pros

  • Spotlight Search
  • Mac Connectivity
  • Fixing bad behavior of Mac Office, Adobe Apps, etc.
Ryan Stasel profile photo
  • Segregation of duties is the first thing. SAP Access Control allows to declare couple of transactions that can not be assigned together because they represent an action and an authorization for the action. Using these Segregation of Duties rules allows SAP Access Control to report on users that do not comply with a given rule.
  • Workflow for access management is second. The provision of new users, new roles or the changes made to roles can be streamlined on the application. This allows the implementation of effective and efficient procedures to meet all access requests.
  • Monitoring on super user activities. Using SAP Access Control, we can remove to IT personnel all the super user privileges. If the occasion arises and someone for the IT department requires super user privileges to solve or troubleshoot a problem, a special role is assigned temporally to him. SAP Access Control keeps a log of the activities performed during the time the IT user works with the in the temporary role, allowing complete monitoring on super user activities.
Luis Cruz profile photo

Cons

  • Would love some type of remote administration (web interface, Mac app, whatever)
  • Some logging level between "OH GOD, TOO MUCH" and the "mediocre" default
Ryan Stasel profile photo
  • SAP products in general are not user friendly. SAP Access Control is no exception to this. Even though the use of the Netweaver interface is a big improvement on user interaction, the presentation of big amounts of data could be improved (list of roles, information of values assigned to authorization object fields, and the like).
  • Regarding functionality on Access Control, the product is about complete; I cannot think of anything else to add to it.
Luis Cruz profile photo

Return on Investment

  • Been a great ROI. We wouldn't be able to function without it, given how many Mac users we have.
Ryan Stasel profile photo
  • Reducing risk of fraud. Implementing SAP Access Control allows analysis of every role assigned to a job on the organization. Through this analysis, weakness on roles are detected, corrected and monitored. As the users feel the change, they also feel that they are being monitored, preventing any intent to use his position and privileges to take personal advantage. So a major impact to organizations is to reduce the financial lost due to frauds.
  • Reducing cost for monitoring. Another positive impact is lowering the cost of monitoring. This is twofold: First, a rather small team can manage access management. Second, through the use of SAP Access Control the complete universe of roles and users can be monitored without increasing the cost for the continuous monitoring.
  • During transactions. The use of SAP Access Controls allows detection of transactions that, from an information security point of view, require some redesign. When SAP GCR is implemented, you make some discoveries such as: obsolete transactions, transactions with no authorization objects and the like. The transactions with these problems can be left out of the active roles, waiting for remediation of the issues found.
Luis Cruz profile photo

Pricing Details

Acronis Files Connect

General
Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No
Additional Pricing Details

SAP Access Control

General
Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No
Additional Pricing Details