Prevent Vendor Fraud in SAP ECC6

Trustpair, leading payment fraud platform, enables access to its core features seamlessly in SAP ECC6. International Account Validation, Vendor Database Monitoring, Payment Files Checks : work with secure vendor data along the P2P process and prevent payment fraud.

What Trustpair brings to SAP ECC6

Trustpair’s integration with SAP ECC6 streamlines the procure-to-pay process, offering seamless fraud prevention directly within your ERP. This means users can effortlessly enhance payment security, automate vendor account validation and bank account ownership, and maintain data accuracy. All directly within SAP ECC6.

It streamlines the procure-to-pay journey, saving time, and ensuring trustworthy payment campaigns, ultimately making the entire process more secure and efficient. For users of other versions of the SAP suite, we also feature a SAP S/4 HANA native connector.


Start protecting your company from payment fraud today!

Benefits of Trustpair for SAP ECC6

Detect and Block Payment Fraud directly in your SAP ERP

Trustpair leverages external data sources, mutualized vendor data, customer payment history, and complementary controls carried out by fraud prevention experts to ensure you pay the right vendor. Your payment campaigns are 100% secure and controls occur directly in your SAP ERP.

Save time by Automating Account Validation Processes

Trustpair helps you boost productivity by replacing time-consuming and manual tasks with automated and international account ownership verification, directly in SAP ECC6.

Improve Vendor Quality And Work With Accurate Data

Trustpair ensures ERP data reliability thanks to continuous monitoring of your vendor database which maintains data accuracy and allows faster payment processing, resulting in a better ROI.

Key features of SAP ECC6

Validate account ownership when onboarding a new vendor (XK01)

When registering new vendors (legal or natural persons) in SAP ERP ECC6 (transaction XK01), enter the vendor’s company and bank details, go on the Trustpair tab, and get an immediate evaluation of the match between companies and their bank details.

Monitor the vendor database continuously with real-time jobs

Set daily screening of your vendor master data file to detect errors and anomalies with jobs in SAP ERP ECC6 interface. Define custom settings such as countries, companies, and subsidiaries. Activate notifications and alerts for vendor status changes.

Payments Requests : Block fraudulent payments and errors (F110)

Define rules in your SAP ERP to exclude “at risk” vendors from the payment requests (transaction F110), and be notified in case of risky situations. Leverage reports and dashboards in Trustpair’s web app to view excluded business partners and take action.

Benefit from GIACT network

Trustpair’s collaboration with the GIACT network empowers clients to effectively manage risk and prevent vendor fraud.

Our customers integrated Trustpair into SAP ECC6

Discover how finance teams successfully to automate and streamline their account validation processes in SAP ECC6.

"Trustpair gives us more reliability and peace of mind. The financial director is more serene when it comes to approving the transfer order."

Sade Telecom - Témoignage - Trustpair (1)
Malika Benfares

"With Trustpair’s verification methodology, it's no longer just a consistency check but an exact confirmation of the validity of the third party: there is no longer any risk."

Decathlon - Témoignage - Trustpair (1)
Michele Bruno

"With Trustpair, we are able to automatically and quickly monitor our third parties and ensure the security of that very data over the long term."

Leaseplan - Témoignage - Trustpair (1)
Joffrey Tabouret

“I would definitely recommend Trustpair to finance departments. It makes adding and modifying beneficiaries more reliable, without resorting to manual processes that are cumbersome, time-consuming and fallible.”

Fabrice Menieur - Keys Asset Management - Temoignage Trustpair
Fabrice Meunier

“The control process is simplified with the Trustpair solution, the Finance Department is reassured and, above all, it no longer needs to waste time performing manual checks to verify a supplier's bank details.”

Fanny Harquel - Octapharma - Temoignage Trustpair
Fanny Harquel

"Trustpair adapts very well to the specifics of our market and our way of working. Several features are developed as we work together. That's a real plus."

Colin Cesena - axereal - temoignage Trustpair
Colin Cesena

"Trustpair has become more than a reflex; it has become an obligation. The team no longer validates an IBAN unless Trustpair has confirmed it to us."

etienne mechain - groupe dehon - temoignage Trustpair
Etienne Mechain

More international data sources integrated within Trustpair

In order to provide the best vendor coverage Trustpair integrates multiple international data sources.

Frequently asked questions

Want to know more? Here are the most frequently asked questions.

B2B payment fraud can occur in an ERP system when there are vulnerabilities or weaknesses in the system’s security protocols. Fraudsters may exploit these weaknesses to manipulate transaction data, create fake invoices, or steal sensitive financial information. Here are some ways that B2B payment fraud can occur in an ERP:


  • Insider threats: Employees with access to the ERP system may intentionally or inadvertently leak confidential information, alter information or commit other fraudulent activities.
  • Phishing attacks: Scammers may send phishing emails impersonating legitimate vendors or employees, tricking users into providing login credentials or other sensitive information.
  • Malware and viruses: Attackers may inject malware or viruses into the system, giving them remote access to sensitive data and allowing them to carry out fraudulent activities undetected. They could download employee personal information for example.
  • Weak passwords and access controls: If passwords and access controls are weak, fraudsters can easily gain access to the system and manipulate data.


To prevent B2B payment fraud in an ERP, companies must implement strong security measures and protocols such as multi-factor authentication, regular system updates, and employee training. Regular monitoring and audits can also detect any suspicious activity early and mitigate damage caused by any potential fraud.

B2B payment fraud takes many forms: CEO scams, phishing, supplier fraud, etc. To summarize, it’s all the ways fraudsters can embezzle funds from a company. Scammers are more and more innovative, often resorting to sophisticated cybercrime.

One of the most common ways is using identity theft to change banking information and have money sent to fraudulent bank accounts. Thieves can use vendors or even employees to change banking credentials.

This type of fraud is difficult to detect: that’s why it’s crucial to have an automated solution like Trustpair that checks bank account ownership.

B2B payment fraud can occur in a procurement tool when there are vulnerabilities or weaknesses in the system’s security protocols. Fraudsters may exploit these weaknesses to impersonate suppliers during registration. Here are some common scenarios in which B2B payment fraud can take place within a procurement tool:

  • Supplier Impersonation: Scammers can impersonate legitimate suppliers during the procurement process. They may create fake supplier accounts or compromise the accounts of real suppliers to change payment details, diverting funds to their accounts.
  • Phishing Attacks: Fraudsters may send phishing emails to procurement professionals, posing as suppliers or internal team members. These emails can contain malicious links or attachments that, when clicked, compromise the user’s credentials or infect the system with malware.
  • Identity Theft: Criminals can steal the identities of legitimate suppliers or employees within the organization. They may then use this stolen identity to change payment information, redirect funds, or initiate fraudulent transactions.
  • Unauthorized Access: If the procurement tool lacks robust access controls and authentication mechanisms, unauthorized individuals or employees may gain access to the system. They can manipulate supplier data, payment instructions, or procurement orders.
  • Vendor Database Manipulation: Fraudsters with access to the procurement tool’s vendor database can alter supplier information, including bank account details, to reroute payments to fraudulent accounts.

To mitigate the risk of B2B payment fraud in a procurement tool, organizations should implement robust security measures, such as multi-factor authentication, encryption, and regular security audits. Employee training programs on recognizing and reporting potential fraud attempts are also essential. But essentially, conducting due diligence on new suppliers and verifying the authenticity of supplier information and its bank account ownership with software like Trustpair can help prevent fraud.

Trustpair is integrated directly within SAP ECC6 interface and does not require users to leave the platform. You can register a new vendor and validate their bank account ownership automatically during the process. You can also parameter continuous monitoring through the SAP interface and finally get confirmation of vendor validation just before sending Payment proposal. We control vendor credentials throughout all the supply chain. 


Having Trustpair directly within your SAP ECC6 platform will enhance user experience: no need to switch from one tool to another and use multiple systems. Trustpair becomes a part of your ERP – almost like a module. 

Please keep in mind that Trustpair offers integrations with other versions of the SAP suite like SAP S4/ HANA. In fact, we have a dedicated S/4 HANA native connector. We also offer a cloud version if needed: contact our sales team to learn more!

Defend your P2P chain with a fraud prevention platform.

Join the 200+ companies globally that are fighting fraud with Trustpair.