Prevent Vendor Fraud in SAP ECC6

Trustpair, leading payment fraud platform, enables access to its core features seamlessly in SAP ECC6. International Account Validation, Vendor Database Monitoring, Payment Files Checks : work with secure vendor data along the P2P process and prevent payment fraud.

What Trustpair brings to SAP ECC6

Trustpair’s integration with SAP ECC6 streamlines the procure-to-pay process, offering seamless fraud prevention directly within your ERP. This means users can effortlessly enhance payment security, automate vendor account validation and bank account ownership, and maintain data accuracy. All directly within SAP ECC6.

It streamlines the procure-to-pay journey, saving time, and ensuring trustworthy payment campaigns, ultimately making the entire process more secure and efficient. For users of other versions of the SAP suite, we also feature a SAP S/4 HANA native connector.

sap-logo-svg

Start protecting your company from payment fraud today!

Benefits of Trustpair for SAP ECC6

Detect and Block Payment Fraud directly in your SAP ERP

Trustpair leverages external data sources, mutualized vendor data, customer payment history, and complementary controls carried out by fraud prevention experts to ensure you pay the right vendor. Your payment campaigns are 100% secure and controls occur directly in your SAP ERP.

Save time by Automating Account Validation Processes

Trustpair helps you boost productivity by replacing time-consuming and manual tasks with automated and international account ownership verification, directly in SAP ECC6.

Improve Vendor Quality And Work With Accurate Data

Trustpair ensures ERP data reliability thanks to continuous monitoring of your vendor database which maintains data accuracy and allows faster payment processing, resulting in a better ROI.

Key features of SAP ECC6

Validate account ownership when onboarding a new vendor (XK01)

When registering new vendors (legal or natural persons) in SAP ERP ECC6 (transaction XK01), enter the vendor’s company and bank details, go on the Trustpair tab, and get an immediate evaluation of the match between companies and their bank details.

Monitor the vendor database continuously with real-time jobs

Set daily screening of your vendor master data file to detect errors and anomalies with jobs in SAP ERP ECC6 interface. Define custom settings such as countries, companies, and subsidiaries. Activate notifications and alerts for vendor status changes.

Payments Requests : Block fraudulent payments and errors (F110)

Define rules in your SAP ERP to exclude « at risk » vendors from the payment requests (transaction F110), and be notified in case of risky situations. Leverage reports and dashboards in Trustpair’s web app to view excluded business partners and take action.

Benefit from GIACT network

Trustpair’s collaboration with the GIACT network empowers clients to effectively manage risk and prevent vendor fraud.

Our customers integrated Trustpair into SAP ECC6

Discover how finance teams successfully to automate and streamline their account validation processes in SAP ECC6.

“Trustpair nous fait gagner en confiance et en sérénité. Le Directeur financier est plus serein lors de la validation de l’ordre de virement.”

Sade Telecom - Témoignage - Trustpair (1)
Malika Benfares

"Avec la méthodologie de contrôle Trustpair, il ne s’agit plus seulement d’un contrôle de cohérence mais d’une confirmation exacte de la validité du tiers : il n'y a plus de risque."

Decathlon - Témoignage - Trustpair (1)
Michele Bruno

“Avec Trustpair, nous sommes en mesure de contrôler automatiquement et rapidement nos fournisseurs, et d’assurer la sécurité de cette donnée sur le long terme.”

Leaseplan - Témoignage - Trustpair (1)
Joffrey Tabouret

“Je recommanderais sans hésiter cette solution aux directions financières.”

Fabrice Menieur - Keys Asset Management - Temoignage Trustpair
Fabrice Meunier

“Trustpair est un outil utile pour diminuer le risque de fraude, et qui rassure les personnes qui engagent leur responsabilité.”

Fanny Harquel - Octapharma - Temoignage Trustpair
Fanny Harquel

“Trustpair s’adapte très bien aux spécificités de notre marché et à notre fonctionnement. Plusieurs fonctionnalités sont développées au fur et à mesure de notre collaboration. C’est un vrai plus.“

Colin Cesena - axereal - temoignage Trustpair
Colin Cesena

“Au-delà d’un réflexe, Trustpair est devenu une obligation. L’équipe ne valide plus un IBAN si Trustpair ne nous l’a pas confirmé.”

etienne mechain - groupe dehon - temoignage Trustpair
Etienne Mechain

More international data sources integrated within Trustpair

In order to provide the best vendor coverage Trustpair integrates multiple international data sources.

FAQ

Frequently asked questions

Want to know more? Here are the most frequently asked questions.

B2B payment fraud can occur in an ERP system when there are vulnerabilities or weaknesses in the system’s security protocols. Fraudsters may exploit these weaknesses to manipulate transaction data, create fake invoices, or steal sensitive financial information. Here are some ways that B2B payment fraud can occur in an ERP:

 

  • Insider threats: Employees with access to the ERP system may intentionally or inadvertently leak confidential information, alter information or commit other fraudulent activities.
  • Phishing attacks: Scammers may send phishing emails impersonating legitimate vendors or employees, tricking users into providing login credentials or other sensitive information.
  • Malware and viruses: Attackers may inject malware or viruses into the system, giving them remote access to sensitive data and allowing them to carry out fraudulent activities undetected. They could download employee personal information for example.
  • Weak passwords and access controls: If passwords and access controls are weak, fraudsters can easily gain access to the system and manipulate data.

 

To prevent B2B payment fraud in an ERP, companies must implement strong security measures and protocols such as multi-factor authentication, regular system updates, and employee training. Regular monitoring and audits can also detect any suspicious activity early and mitigate damage caused by any potential fraud.

B2B payment fraud takes many forms: CEO scams, phishing, supplier fraud, etc. To summarize, it’s all the ways fraudsters can embezzle funds from a company. Scammers are more and more innovative, often resorting to sophisticated cybercrime.

One of the most common ways is using identity theft to change banking information and have money sent to fraudulent bank accounts. Thieves can use vendors or even employees to change banking credentials.

This type of fraud is difficult to detect: that’s why it’s crucial to have an automated solution like Trustpair that checks bank account ownership.

B2B payment fraud can occur in a procurement tool when there are vulnerabilities or weaknesses in the system’s security protocols. Fraudsters may exploit these weaknesses to impersonate suppliers during registration. Here are some common scenarios in which B2B payment fraud can take place within a procurement tool:

  • Supplier Impersonation: Scammers can impersonate legitimate suppliers during the procurement process. They may create fake supplier accounts or compromise the accounts of real suppliers to change payment details, diverting funds to their accounts.
  • Phishing Attacks: Fraudsters may send phishing emails to procurement professionals, posing as suppliers or internal team members. These emails can contain malicious links or attachments that, when clicked, compromise the user’s credentials or infect the system with malware.
  • Identity Theft: Criminals can steal the identities of legitimate suppliers or employees within the organization. They may then use this stolen identity to change payment information, redirect funds, or initiate fraudulent transactions.
  • Unauthorized Access: If the procurement tool lacks robust access controls and authentication mechanisms, unauthorized individuals or employees may gain access to the system. They can manipulate supplier data, payment instructions, or procurement orders.
  • Vendor Database Manipulation: Fraudsters with access to the procurement tool’s vendor database can alter supplier information, including bank account details, to reroute payments to fraudulent accounts.

To mitigate the risk of B2B payment fraud in a procurement tool, organizations should implement robust security measures, such as multi-factor authentication, encryption, and regular security audits. Employee training programs on recognizing and reporting potential fraud attempts are also essential. But essentially, conducting due diligence on new suppliers and verifying the authenticity of supplier information and its bank account ownership with software like Trustpair can help prevent fraud.

Trustpair is integrated directly within SAP ECC6 interface and does not require users to leave the platform. You can register a new vendor and validate their bank account ownership automatically during the process. You can also parameter continuous monitoring through the SAP interface and finally get confirmation of vendor validation just before sending Payment proposal. We control vendor credentials throughout all the supply chain. 

 

Having Trustpair directly within your SAP ECC6 platform will enhance user experience: no need to switch from one tool to another and use multiple systems. Trustpair becomes a part of your ERP – almost like a module. 

Please keep in mind that Trustpair offers integrations with other versions of the SAP suite like SAP S4/ HANA. In fact, we have a dedicated S/4 HANA native connector. We also offer a cloud version if needed: contact our sales team to learn more!

Defend your P2P chain with a fraud prevention platform.

Join the 200+ companies globally that are fighting fraud with Trustpair.