Audit Manager


Secure Enterprise Data. Act on Trusted Information

We enable internal auditors to:

  • Efficiently manage the complete audit program

  • Continuously analyze enterprise data for qualitative and quantitative risk assessment

  • Improve controls testing by leveraging the controls catalog to detect deficiency

  • Ensure timely issue-remediation with workflow-based collaboration

Risk-Based Audit Management
  • Implement risk assessment processes to meet your organization objectives. Maintain your Risk Library with Process, Risks and Controls
  • Manage Enterprise Risk Ratings such as Impact and Likelihood, which best describe your approach to risk evaluation
  • Manage Control Design based on contextual framework to measure Risk Factors before controls (inherent), after controls (residual), or both Audit Planning
  • The Audit Planning module enables you to schedule projects and resources so there is a clear view of fieldwork assignments and tracking of audit testing in an annual plan
  • The easy-to-use web-based planning tool can be configured for small or large groups, allowing multiple plans to support enterprise audit objectives Resource Management
  • Resource Management enables audit planners to assign resources to audit plans based on resource specific skills, credentials, languages, experience or locations to meet the needs of a project
  • Improve resource utilization by tracking and monitoring estimated project costs (both internal and external). Automatically detect conflict to easily identify when you are about to create a conflict – and if conflicts exist, easily resolve the
  • Custom views to allow planners and auditors to focus on their key projects and information to manage the audit plan Audit Analytics
  • Improve audit findings by replacing random sampling, spreadsheets, or generic business intelligence with audit analytics that are purposely built to detect anomalies or patterns in any data-source to provide better assurance for business processes and controls
  • Take a snapshot of any ERP system to map and translate your data into actionable insight. With advanced fuzzy matching, you can prevent operational losses such as duplicate supplier payments


  • Field Work
    Improve audit efficiency by enabling testers in the field to follow detailed test instructions during the fieldwork phase. Create findings and assign remediation activities to person-in-charge.
    Test major internal controls based on the accuracy and timeliness of transactions as control evidence. Test automated controls during the fieldwork phase.

    Electronic Work Papers Management
    Maintain all audit information such as test steps, issues, notes, sign-offs, and edit histories in a secure central data vault. Enable audit team to access real-time, role-based security, facilitate filtering and sorting of key documents which is superior to the error-prone document-based file systems.
    Filter and sort content instantly to view test procedures assigned to you, ready for review, high risk, edited after review, etc.

    Issue and Remediation Workflows
    Workflow enabled issue and remediation management tracks findings from all audit engagements and allows you to track the implementation status of recommendations made by your department and related management action plans.
    You can facilitate issue follow-up, trend analysis, prior audit review, and committee reporting.
    Management can easily access the findings and perform remediation actions in a timely manner to reduce overall risk exposure. Role-based access ensures that data and functions are only accessible and available based on the role and authorization each user is assigned. Automated ERP Controls Testing
    You can continuously monitor business activities within your enterprise applications with instant access to the largest catalog of automated application monitors covering 1,000+ business objects for major processes such as Procure-to-Pay, Order-to-Cash, Hire-to-Retire, Design-to-Ship, and Financial Record-to-Report.
    You can test ERP configuration controls by enforcing consistent application setup that consistent with operating standards.nsure a risk-based response to security threats.