Implementation

MTC Skopos offers flexible deployment architectures to meet diverse organizational needs and technical requirements. Our system-agnostic approach ensures seamless integration with your existing ERP landscape while maintaining optimal performance and security.

MTC Skopos Implementation Architecture Diagram

Core Architecture

At the heart of MTC Skopos is our high-performance risk analysis engine that processes data from any ERP system through standardized interfaces. The central analysis hub performs:

  • Risk Analysis: Comprehensive segregation of duties and critical access evaluation
  • Simulation: What-if scenarios for role and authorization changes
  • User & Role Explorer: Intuitive navigation of complex authorization structures
  • Did-Do Analysis: Historical impact assessment of access risks
  • SAP Role Designer (AI): Automated role generation with intelligent recommendations

Data Integration Methods

Direct Integration

  • SAP RFC Connection: Real-time data access for live analysis
  • CSV Import: Standardized data files from any ERP system (Odoo, Dynamics NAV, Sage, PeopleSoft, etc.)

Storage & Processing Options

  • Object Storage (S3): Scalable cloud storage for large datasets with GetObject/PutObject operations
  • Local Processing: Desktop application with no external dependencies
  • Database Integration: Enterprise-grade data persistence and management

Output & Analytics Integration

Transform your risk analysis into actionable business intelligence through:

  • Excel Integration: Direct export for detailed analysis and reporting
  • Tableau: Advanced data visualization and executive dashboards
  • Power BI: Ready-to-use .pbix templates for immediate insights
  • QlikSense: Interactive analytics and self-service BI capabilities

All integrations support ODBC connectivity for seamless data flow and real-time reporting.

Deployment Considerations

Recommended Deployment: Desktop application with CSV import and cloud storage integration provides optimal balance of performance, security, and flexibility.

Enterprise Database Option: This deployment is not recommended for performance and security reasons. While available upon request through our consulting services, performance cannot be guaranteed in this configuration.

Our implementation approach prioritizes data privacy and performance, with most operations running offline and your sensitive authorization data remaining in your controlled environment.


Implementation Process

Phase 1: Initial Setup

The implementation begins with installing the MTC Skopos desktop application on your workstation. The lightweight portable executable requires no complex installation process or administrative privileges. Simply download, extract, and run.

Phase 2: Data Preparation

Depending on your ERP system, data can be extracted through:

  • SAP Systems: Use the provided ABAP extraction programs or connect directly via RFC
  • Other ERP Systems: Export user and authorization data to CSV format following our standardized templates
  • Cloud Storage: Configure S3-compatible storage for automated data synchronization

Phase 3: Ruleset Configuration

Every organization has unique business processes and risk tolerances. During this phase, you will either:

  • Develop a custom ruleset tailored to your specific requirements
  • Adapt our template ruleset to reflect your organization's risk profile
  • Engage our consulting services for comprehensive ruleset development

Phase 4: Analysis and Reporting

Once configured, MTC Skopos delivers immediate value through:

  • Comprehensive Segregation of Duties analysis across all users and roles
  • Critical Access identification and reporting
  • Executive dashboards via Power BI integration
  • Detailed remediation recommendations

Security and Privacy

MTC Skopos is designed with security as a core principle:

  • Local Processing: All analysis runs on your local machine with no data transmission to external servers
  • No Telemetry: We do not collect usage data or track user behavior
  • Offline Operation: The application functions fully offline for maximum security
  • Data Sovereignty: Your authorization data never leaves your controlled environment

For organizations with strict security requirements, this architecture ensures compliance with data protection regulations and internal security policies.


Getting Started

Ready to implement MTC Skopos in your organization? Contact our team to discuss your requirements and receive guidance on the optimal deployment approach for your environment.

Contact Us