Microsoft Power BI is a visualization and data discovery tool from Microsoft. It allows users to convert data into visuals and graphics, visually explore and analyze data, collaborate on interactive dashboards and reports, and scale across their organization with built-in governance and security.
$10
per month per user
SAP Access Control
Score 7.8 out of 10
N/A
SAP Access control streamlines the process of managing and validating user access to applications and data with minimal support from IT, with the goal of giving employees the applications and services they need without exposing data and processes to unauthorized use.
In operations we use the tool for many different topics, from factory quality systems to high level reviews. We have created kind of an internal "App Store" based on Power BI where you have a lot of different dashboards for different solutions (cost, cash, health and safety, sales, factories, distribution centers...) and you as an user just need to get in that "App Store" and enter in whatever tool can be useful for you. It is open to all the operations employees and can use on demand. Also it has raised the imagination of our colleagues, as they are not only working by themselves creating new reports, but also raising fantastic ideas that can be extended for the usage of all the community.
Appropriate for SAP hrs hierarchy integration and can have multiple hierarchies of org structures adopted as alternative workflow support. Cons of access control are the logs of firefighter usage are still limited in depth and does not evolve to adop more cloud products which are coming at a plaster pace than the ac product as such.
SAP Access Control ensures that our services are accessed by the right users since it send me alerts when an employee tries to access any application. That way, I am able to either authorize or cancel the request to safeguard of company data.
With SAP Access Control, it is easy to automate and monitor how our team access services and applications. SAP Access Control has an automatic feature that notifies me when employees access applications and services and the issues they are encountering.
In addition, SAP Access Control add security on employees login to ensure that their data on the applications are encrypted to never leak to cyber attackers.
The desktop app is great but needs a lot of performance improvements
No MacOS Version for the Desktop app, this is a big limitation for business since executives prefer Macs
Premium Cloud Version of Power BI is awfully expensive
On-Premise Version of the Power BI Reports Server is bundled only with SQL Server Enterprise License and cannot be purchased separately and requires Software Assurance Subscription
On-Premise Power BI Report Server doesn't support ADFS, AzureAD or any Claims-Based authentication platform, a sad disadvantage for enterprises
At this point, I think we all know who has taken the lead in the business intelligence and analytics market worldwide. With fresh new updates every other day on top of an already robustly built product with all features that one can dream of is a no brainer, I feel. Microsoft will invariably be synonymous with quality and professionalism.
This is a great tool for a medium to large sized company. SAP Access Control requires a great deal of SAP knowledge to use, but it is certainly information that can be learned. Their customer support is wonderful and easy to work with. The overall usability is great. I greatly recommend this software.
I can't really speak to the support overall, [but] I will say that in the almost three years I have used the system, I have only needed to contact their support team once. I think the team was helpful, but it did take some time for us to resolve the issues/ request that they had. I guess the good news is that the system is pretty stable, and I personally have rarely needed to contact their technical support team.
This product fulfills all our requirements. We can use this for user management, role management, risk analysis, business role management, workflow management. Initial configuration takes a lot of effort. Otherwise it's a great product for the end user. SAP Access Control tool performance needs improvement, sometimes it slows down the processing time for requests.
[Microsoft] Power BI is practical and effective, like a hammer for a nail, it is easy to use and produces very quickly the results that in most cases are urgently required by clients (nice reports to share on the web). To start using [Microsoft] Power BI you need a business email address, with that you create an account in Power BI Service and in less than 1 hour you will have installed Power BI Desktop, a report will have been created and it will have been published on the web .
Pricing was higher for the cloud version of the BTP service - IAG. SAP Access Control pretty much facilitates everything we are looking for as an enterprise with an efficient dollar cost ROI for the services we are looking for. Also, there were many features on the cloud version which came bundled with the license and we had to pay for them even though we did not actually use these products.
Reducing risk of fraud. Implementing SAP Access Control allows analysis of every role assigned to a job on the organization. Through this analysis, weakness on roles are detected, corrected and monitored. As the users feel the change, they also feel that they are being monitored, preventing any intent to use his position and privileges to take personal advantage. So a major impact to organizations is to reduce the financial lost due to frauds.
Reducing cost for monitoring. Another positive impact is lowering the cost of monitoring. This is twofold: First, a rather small team can manage access management. Second, through the use of SAP Access Control the complete universe of roles and users can be monitored without increasing the cost for the continuous monitoring.
During transactions. The use of SAP Access Controls allows detection of transactions that, from an information security point of view, require some redesign. When SAP GCR is implemented, you make some discoveries such as: obsolete transactions, transactions with no authorization objects and the like. The transactions with these problems can be left out of the active roles, waiting for remediation of the issues found.