Introducing a Roles, Permissions, and SoD product

Untangle Roles and Permissions| Segregation of Duty Issues| Terminated Employees with ERP Access| Least Privilege Access| RBAC
and protect your ERP with confidence

No one needs to know it was this easy.

Built for Tyler Enterprise ERP powered by Munis® Roles & Permission Settings

Thank you for your interest in ThirdLine Shield! One of our team members will be contacting you soon.
Oops! Something went wrong while submitting the form.

Book a call to learn how we show risk and help you monitor

Software for the ERP Gatekeeper

Understand which Tyler Enterprise® ERP or Munis® ERP users have access to what data, and know how your users use the permissions they have been given.

ISACA Segregation of Duty (SoD) issues

Out of th box mapping of 1000+ Tyler Munis® Permissions to 50+ SoD conflict pairs.

Terminated employees with access to the ERP

Payroll and HR do not communicate with you about employees that are terminated or inactive. We can help.

Principle of Least Privilege

There are too many employees with so many roles. It's hard to know how to limit their access.

Easily see which Roles are causing the biggest issues

Grant minimum access to users necessary with ThirdLine's analysis of all roles & permissions in your ERP.

High Risk Permissions

ThirdLine identifies the highest risk permissions to tell you which Users and Roles do not need them.

Try ThirdLine Roles, Permssions, and SoD Now!

Talk to an expert!

Free Demo

Segregation of Duty Analytic Examples

See how our analytics flag highest risk Users, Roles, and Permissions

Audit Fraud

Maintain PO - Manual Check Processing

Permissions allow the possibility for a user to enter a fictitious purchase order and enter the covering payment.

Audit Fraud Risk

PO Approval - AP Payments

Permissions allow the possibility for a user to approve a fictitious purchase order and enter the covering payment.

audit fraud

Manual Check Processing - Vendor Master Maintenance

Permissions allow the possibility for a user to maintain a fictitious vendor and create a payment to that vendor.

Audit Risk

Maintain Asset Document - Goods Receipt to PO

Permissions allow the possibility for a user to create an invoice through ERS goods receipt and hide it in an asset that would be depreciated over time.

Risk

Cash Application - Bank Reconciliation

Permissions allow the possibility for differences between cash deposited and cash collections posted to be covered up.

Audit Fraud Risk

Basic Table Maintenance - System Administration

Permissions allow the possibility for a user to modify data in tables or modify valid configuration values and set up the production environment to run transactions and programs using the inappropriately modified data.

Audit Fraud Risk

Maintain Hierarchies - Post Journal Entry

Permissions allow the possibility for a user to post a journal entry and the ability to modify hierarchy and reporting output.

Audit Risk

System Admin and Non-View Permissions

Flags if a user has IT system admin and non-view permissions at the same time.

Summarize risk & spend at the Vendor, Employee, & Department level

Sign up now to get access!

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.