Blog

Start Here

Get in touch with a
TriCore Solutions specialist

Blog

Blog | Oct 14, 2016

Going Above and Beyond: An Example of a Happy SAP Compliance Client

Posted by Judy Thompson

The Background: SAP Security Best Practice

SAP Best Practices for SAP Security encourage the PRODUCTION systems to keep only Security roles that are used for executing job duties in that system. SAP Roles that are provided during an ‘Upgrade’ or a new installation are to be copied and re-named with the customer’s naming convention.

SAP's recommendation is to copy the standard roles into your own name space and make modifications to the copies as needed”

The standard roles need only exist in the DEV system. This would be the ‘BASE’ to copy the Standard roles needed by the Business, and re-name those roles and modify them to the business needs. This also would be a ‘START’ since later on customized roles can be created based on the usage for a group of users over a period of time.

Read More

Blog | Aug 11, 2016

Intro to EU Data Privacy Shield

Posted by Prashant Sharma


For both EU US Data Privacy Shield and US Swiss Safe Harbor one policy statement will suffice to meet the data protection and the data privacy principles. The new compliance will build maintain and build data integrity and security. It will build more transparency in the company’s action on data transfers and ensure that the company follows the prescribed privacy commitments.

Read More

Blog | Apr 19, 2016

TriCore’s Approach in Managing & Improving Vendor Management

Posted by Prashant Sharma


A vendor management model is designed to manage third party suppliers thereby ensuring that a continuous, accurate, timely and quality services are being provided as per the agreed service levels for your Managed Applications & services.
Read More

Blog | Sep 10, 2015

Service Organization Controls and Their Importance for a MSP

Posted by Prashant Sharma


SOC reports are a mechanism for customers to build trust while outsourcing business services. TriCore has achieved new SOC 1 and SOC 2 reports.

Read More

Blog | Jun 10, 2015

Compliance Building and Corporate Responsibility

Posted by Prashant Sharma


The realm of compliance and security has spread its wings far. We all are aware that the business model and its aspects have changed from what they used to be a decade back. There is a larger emphasis now in providing the best to the customer and yet complying with all the security norms to keep customer data from breaches. 

Read More