Application Development Blog Posts
Learn and share on deeper, cross technology development topics such as integration and connectivity, automation, cloud extensibility, developing at scale, and security.
Showing results for 
Search instead for 
Did you mean: 
In the US, the number of data breaches grew within the past decade from 662 in 2010 to 1001 by 2020. The numbers show the importance of data protection, especially in the current era.

Luckily, there are several solutions today that offer data and financial fraud protection. These solutions lower the risk of fraud and detect suspicious activities in your systems.

SAP Business Suite 4 SAP HANA has a fraud management solution that can protect you and your assets. Read on to know how SAP Business Integrity Screening can help you protect your business.

SAP Business Integrity Screening

Customers and individuals are not the only ones at risk of fraud. Malicious actors also target businesses through fraudulent emails and data breaches.

SAP Business Integrity Screening aims to improve the prevention and detection of fraud. The goal is to mitigate fraud risk and reduce losses for organizations.

The solution screens high volumes of business transactions for potential anomalies. It detects suspicious patterns using behavioural analytics.

This feature allows users to take the necessary steps to mitigate future fraud risks.

With SAP Business Integrity Screening, you can use two ways to identify fraud:

Online detection 

This refers to the real-time online monitoring of business data. The data comes from business processes at specific points in time during creation.

Mass detection

This process uses stored records to look for patterns or suspicious relations between data records.  You can conduct mass detection on data replicated into the application system.

How to Use the SAP Business Integrity Screening

The solution lets you create detection strategies that address your unique fraud-prevention needs.

The strategy should check your business data for potential fraud. It will use selection parameters to specify which business records need examination.

Your strategy should specify the detection methods that will run. It should also specify how you will assess your results.

You can always use different sets of selection parameters or detection methods to assess different kinds of data.

Creating a Detection Strategy

Decide whether you want to use a pre-made strategy or if you want to create a new one.

You can use an existing detection strategy or create a new one that fits your business needs.

If you are doing the former, search for the detection strategy that you would like to use. You can also opt to change the parameters of an existing strategy, so you do not have to start from scratch.

If you choose the latter, click the Detection Method Editor under the Detection tab.

On the left sidebar, you will see the list of available detection methods. Select a method you want to customize and click “Edit”.

  • Fill out the required fields.

  • Set the values for the selection parameters of your new detection strategy. You can find the parameters section at the bottom of the page.

The selection parameters will limit the detection objects that the strategy will assess.

  • Save your new detection strategy by clicking the “Save” button at the bottom of the page. You can deactivate a detection strategy you created anytime you want.

Once deactivated, the strategy will be unavailable for production use. Activating an inactive strategy also automatically deactivates any active version available.

Calibrating Your Detection Strategies

SAP Business Integrity Screening has a calibration feature with a simulation function. It simulates what-if scenarios to improve the result of detection strategies.

The simulation allows you to do the following:

  • Change the settings and compare them with a detection strategy

  • Compare the result of the strategy with the simulated results

  • Define a selection period for the data relevant to the simulation

  • Change the strategy's threshold

  • Change the weighting factors and the parameter values of the detection procedures

  • Compare the actual and simulated results of a strategy with the results of a different strategy

Every simulation generates a new tile showing the following details:

  • The simulation ID

  • Number of alert items

  • The number of records assessed

After calibration, you will have a detection strategy with a new set of weighting factors, parameters, and thresholds. Saving the results of the simulation creates a new and inactive strategy version.

Keeping your data safe should be a top priority for any business. You must make use of new technology that streamlines processes involving data and fraud prevention.
Labels in this area