Implementation
MTC Skopos offers flexible deployment architectures to meet diverse organizational needs and technical requirements. Our system-agnostic approach ensures seamless integration with your existing ERP landscape while maintaining optimal performance and security.
Core Architecture
At the heart of MTC Skopos is our high-performance risk analysis engine that processes data from any ERP system through standardized interfaces. The central analysis hub performs:
- Risk Analysis: Comprehensive segregation of duties and critical access evaluation
- Simulation: What-if scenarios for role and authorization changes
- User & Role Explorer: Intuitive navigation of complex authorization structures
- Did-Do Analysis: Historical impact assessment of access risks
- SAP Role Designer (AI): Automated role generation with intelligent recommendations
Data Integration Methods
Direct Integration
- SAP RFC Connection: Real-time data access for live analysis
- CSV Import: Standardized data files from any ERP system (Odoo, Dynamics NAV, Sage, PeopleSoft, etc.)
Storage & Processing Options
- Object Storage (S3): Scalable cloud storage for large datasets with GetObject/PutObject operations
- Local Processing: Desktop application with no external dependencies
- Database Integration: Enterprise-grade data persistence and management
Output & Analytics Integration
Transform your risk analysis into actionable business intelligence through:
- Excel Integration: Direct export for detailed analysis and reporting
- Tableau: Advanced data visualization and executive dashboards
- Power BI: Ready-to-use .pbix templates for immediate insights
- QlikSense: Interactive analytics and self-service BI capabilities
All integrations support ODBC connectivity for seamless data flow and real-time reporting.
Deployment Considerations
Recommended Deployment: Desktop application with CSV import and cloud storage integration provides optimal balance of performance, security, and flexibility.
Enterprise Database Option: This deployment is not recommended for performance and security reasons. While available upon request through our consulting services, performance cannot be guaranteed in this configuration.
Our implementation approach prioritizes data privacy and performance, with most operations running offline and your sensitive authorization data remaining in your controlled environment.
Implementation Process
Phase 1: Initial Setup
The implementation begins with installing the MTC Skopos desktop application on your workstation. The lightweight portable executable requires no complex installation process or administrative privileges. Simply download, extract, and run.
Phase 2: Data Preparation
Depending on your ERP system, data can be extracted through:
- SAP Systems: Use the provided ABAP extraction programs or connect directly via RFC
- Other ERP Systems: Export user and authorization data to CSV format following our standardized templates
- Cloud Storage: Configure S3-compatible storage for automated data synchronization
Phase 3: Ruleset Configuration
Every organization has unique business processes and risk tolerances. During this phase, you will either:
- Develop a custom ruleset tailored to your specific requirements
- Adapt our template ruleset to reflect your organization's risk profile
- Engage our consulting services for comprehensive ruleset development
Phase 4: Analysis and Reporting
Once configured, MTC Skopos delivers immediate value through:
- Comprehensive Segregation of Duties analysis across all users and roles
- Critical Access identification and reporting
- Executive dashboards via Power BI integration
- Detailed remediation recommendations
Security and Privacy
MTC Skopos is designed with security as a core principle:
- Local Processing: All analysis runs on your local machine with no data transmission to external servers
- No Telemetry: We do not collect usage data or track user behavior
- Offline Operation: The application functions fully offline for maximum security
- Data Sovereignty: Your authorization data never leaves your controlled environment
For organizations with strict security requirements, this architecture ensures compliance with data protection regulations and internal security policies.
Getting Started
Ready to implement MTC Skopos in your organization? Contact our team to discuss your requirements and receive guidance on the optimal deployment approach for your environment.