Sie sind auf Seite 1von 4


Stands for "Access Control List." An ACL is a list of user permissions for a file, folder, or other object. It
defines what users and groups can access the object and what operations they can perform. These
operations typically include read, write, and execute. For example, if an ACL specifies read-only access
for a specific user of a file, that user will be able open the file, but cannot write to it or run the file.

Access control lists provide a straightforward method of managing file and folder permissions. They are
used by most operating systems, including Windows, Mac, and Unix systems. While ACLs are typically
hidden from the user, they can often be modified using a graphical interface. For example, in Mac OS X
10.5, ACL settings can be edited by selecting a file or folder and choosing "Get Info." The access control
settings can be modified within the "Sharing and Permissions" section of the window. On Unix systems,
ACLs can be edited using the chmod() command.

celerate Performance

The ACL platform scours your data haystacks for fraud and corruption risk needles, leaving no transaction
unturned. Built-in workflow helps you automate the assignment, review, and remediation of red flags—
and track case investigation status—to see your program through detection, review, investigation, and

Program Oversight

Program oversight

Establish a fraud framework, and measure ROI and effectiveness.

Set a tone from the top by cascading strategic focus down to link to controls and evidence.

Manage regulatory programs for anti-bribery and anti-corruption (e.g., FCPA, SAPIN II) and financial
crimes (e.g., AML, conduct risk).

Manage anti-fraud programs by industry, region, or functional area (e.g., asset misappropriation, conflict
of interest, code of conduct, financial misstatement, cyber crime, third-party risk, etc.).

IDEA Server® is a collaborative analytics platform that is accelerated by powerful server-based

processing. Users are given the opportunity to simultaneously perform their audit tasks by using server-
based processing for data analysis, instead of the traditional desktop.
You can now save time by bridging the gap between your desktop and data center. The outcome is
results that are readily available providing you with the ability to respond quickly to errors, anomalies,
and fraudulent activity.

Data Security

Users must sign on with a separate user ID and password adding an extra layer of protection to your
data. Permissions can be set up to allow access to all users or only specific personnel to ensure
confidential information remains private.

Collaborate and speak from the same data

Data redundancy and duplicated audit efforts are common and costly problems that can be stamped out
by having a single point of access to both the audit data and analytics. With one platform to house the
disparate data drawn from multiple systems along with the accompanying analytics, the audit team can
make synchronized decisions based on accurate information. Audit know-how and expertise can now be
kept long term in a central repository.

Ideal for organizations with large data sets and need additional data security.

RapidMiner builds a software platform for data science teams that unites data prep, machine learning,
and predictive model deployment. Organizations can build machine learning models and put them into
production faster than ever before on a single platform. RapidMiner eliminates the complexities of
cutting edge data science by making it easy to deploy the latest machine learning algorithms and
innovative technologies like Tensorflow, Hadoop, and Spark. More than 300,000 data scientists in over
150 countries use RapidMiner products on-premise or in the cloud to drive revenue, reduce costs, and
avoid risks.

Weka contains a collection of visualization tools and algorithms for data analysis and predictive
modeling, together with graphical user interfaces for easy access to these functions.[1] The original non-
Java version of Weka was a Tcl/Tk front-end to (mostly third-party) modeling algorithms implemented in
other programming languages, plus data preprocessing utilities in C, and a Makefile-based system for
running machine learning experiments. This original version was primarily designed as a tool for
analyzing data from agricultural domains,[2][3] but the more recent fully Java-based version (Weka 3),
for which development started in 1997, is now used in many different application areas, in particular for
educational purposes and research. Advantages of Weka include:

Free availability under the GNU General Public License.

Portability, since it is fully implemented in the Java programming language and thus runs on almost any
modern computing platform.

A comprehensive collection of data preprocessing and modeling techniques.

Ease of use due to its graphical user interfaces.

Weka supports several standard data mining tasks, more specifically, data preprocessing, clustering,
classification, regression, visualization, and feature selection. All of Weka's techniques are predicated on
the assumption that the data is available as one flat file or relation, where each data point is described
by a fixed number of attributes (normally, numeric or nominal attributes, but some other attribute types
are also supported). Weka provides access to SQL databases using Java Database Connectivity and can
process the result returned by a database query. Weka provides access to deep learning with
Deeplearning4j.[4] It is not capable of multi-relational data mining, but there is separate software for
converting a collection of linked database tables into a single table that is suitable for processing using
Weka.[5] Another important area that is currently not covered by the algorithms included in the Weka
distribution is sequence modeling.


ACLTM GRC is described on ACL's website as "software designed to solve the time suck of managing GRC
activities."[10] ACL GRC is a cloud-based, data-driven audit, risk, and compliance management platform
that does not rely on third-party vendors and is hosted on Amazon's infrastructure.[11] Features include:
Strategic risk view & single source of truth, offline & remote work, project management to kill silos &
spreadsheets, risk assurance & frameworks, 360° oversight: triggered workflow remediation for flagged
records, Investigations & forensic workflow, Issue management & tracking, and Reporting & visualization.

ACL Analytics Edit

ACLTM Analytics is a PC client-based data extraction and analysis software tool used for fraud detection
& prevention, and risk management. By sampling large data sets, ACL data analysis software is used to
find irregularities or patterns in transactions that could indicate control weaknesses or fraud. ACL
Analytics connects users to any data source, and lets them run sophisticated risk analytics and detect
anomalies or patterns that can’t be uncovered with random sampling, spreadsheets, or business
ACL GRC Analytics Exchange Edit

ACLTM GRC Analytics Exchange is a client/server-based platform that includes the capabilities of ACL
Analytics plus: a centralized platform for collaborative team-based work, automated data extraction and
blending with IT-trusted connections, and continuous monitoring. [12]

ACL GRC Content & Intelligence Edit

ACL GRC Content & Intelligence allows users to embed ready-to-use regulatory updates, frameworks,
standards, metrics & best practices into their daily compliance management workflow.[13] Categories of
content includes: Banking & Lending, Government & Higher Education, Financial Control Monitoring, IT
Governance, Subscription Value.