Implementation

MTC Skopos offers flexible deployment architectures to meet diverse organizational needs and technical requirements. Our system-agnostic approach ensures seamless integration with your existing ERP landscape while maintaining optimal performance and security.

MTC Skopos Implementation Architecture Diagram

Core Architecture

At the heart of MTC Skopos is our high-performance risk analysis engine that processes data from any ERP system through standardized interfaces. The central analysis hub performs:

  • Risk Analysis: Comprehensive segregation of duties and critical access evaluation
  • Simulation: What-if scenarios for role and authorization changes
  • User & Role Explorer: Intuitive navigation of complex authorization structures
  • Did-Do Analysis: Historical impact assessment of access risks
  • SAP Role Designer (AI): Automated role generation with intelligent recommendations

Data Integration Methods

Direct Integration

  • SAP RFC Connection: Real-time data access for live analysis
  • CSV Import: Standardized data files from any ERP system (Odoo, Dynamics NAV, Sage, PeopleSoft, etc.)

Storage & Processing Options

  • Object Storage (S3): Scalable cloud storage for large datasets with GetObject/PutObject operations
  • Local Processing: Desktop application with no external dependencies
  • Database Integration: Enterprise-grade data persistence and management

Output & Analytics Integration

Transform your risk analysis into actionable business intelligence through:

  • Excel Integration: Direct export for detailed analysis and reporting
  • Tableau: Advanced data visualization and executive dashboards
  • Power BI: Ready-to-use .pbix templates for immediate insights
  • QlikSense: Interactive analytics and self-service BI capabilities

All integrations support ODBC connectivity for seamless data flow and real-time reporting.

Deployment Considerations

Recommended Deployment: Desktop application with CSV import and cloud storage integration provides optimal balance of performance, security, and flexibility.

Enterprise Database Option: This deployment is not recommended for performance and security reasons. While available upon request through our consulting services, performance cannot be guaranteed in this configuration.

Our implementation approach prioritizes data privacy and performance, with most operations running offline and your sensitive authorization data remaining in your controlled environment.