podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Appsian ERP
Shows
BCN News
The Threat is Real. Protect Your Data. Today.
Karl speaks with David Vincent, VP Product Strategy and Customer Engagement at Appsian, a Global ERP Security platform that monitors various levels of threat detection, controls and ensures that its customers are audit ready to be compliant in this very important part of a business - data protection.David talks about how businesses need to think not only of the protection of their customers data but also prepare themselves to align with the ever increasing Corporate Governance pressures for the Boards of Directors.ABOUT APPSIANAppsian Provides ERP Security Below The Network...
2022-04-13
21 min
Brilliance Security Magazine Podcast
Automated Controls for Compliance - How and Why
In Episode S4E2 our guest is David Vincent, VP of Product Strategy and the chief security evangelist at Appsian Security. Our topic is Automated Controls for Compliance - How and Why. Appsian provides ERP security below the network layer. David shares his insights about: Challenges associated with manually maintaining compliance. How automated controls can affect compliance. Leading practices for effective Data Security & Privacy Compliance. And more. David Vincent has over twenty-five years of experience delivering Security, Audit, Risk, & Compliance services while employed with some of...
2022-02-28
25 min
Understanding Some Significant Challenge
Key Dimensions Of Ensuring ERP Data Security
When attacks on business data grow more complex, the security features of legacy ERP applications are not able to keep up. Initially designed for easy access to data and business processes, Legacy ERP applications have created wide enforcement and security gaps that can lead to disastrous data breaches and millions lost to business policy violations. Outlined here are some approaches to meet the data security challenges successfully
2021-03-17
01 min
Understanding Some Significant Challenge
ERP Implementation Points To Consider For Comprehensive Data Security
Emerging technologies such as Artificial Intelligence (AI) and the Internet of Things (IoT) are supplementing the market intelligence generated by modern ERP systems. While this business intelligence helps businesses develop their bottom line and optimize customer experience, ERP data protection also presents fresh challenges.
2021-03-17
01 min
Brilliance Security Magazine Podcast
Potential Security Risks Within Legacy Databases
In Episode S3E1 we talk with Greg Wendt, Executive Director of Security at Appsian. The focus of the conversation is data and compliance as it relates to Enterprise Resource Planning (ERP) software. We uncover some of the potential security risks associated with legacy databases and what can be done to protect sensitive data in a post-COVID world. Greg Wendt is an Oracle® PeopleSoft security expert. During his 23-year career, he has been recognized as a leader in data security, application architecture, and business operations. He served as an ERP Application Architect at Texas Ch...
2021-01-22
24 min
Understanding Some Significant Challenge
Implementing ERP Some Data Security Tips
2020-12-31
04 min
Understanding Some Significant Challenge
ERP Security The Relevance of Context of User Access and Data Usage
2020-12-31
03 min
Understanding Some Significant Challenge
Data Exfiltration Understanding the Basics
2020-12-31
02 min
Understanding Some Significant Challenge
Dealing With Challenges during GRC Establishment in PeopleSoft
2020-12-31
03 min
Understanding Some Significant Challenge
Common Misconceptions Related To SAP Landscape Security
https://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/products/dynamic-data-masking/https://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/appsian-partners/partners-overview/https://www.appsian.com/solutions/attribute-based-access-control-for-sap-ecc-s-4han/https://www.appsian.com/
2020-12-28
05 min
Understanding Some Significant Challenge
Attribute-Based Access Control and Its Advantages
https://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/products/dynamic-data-masking/https://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/appsian-partners/partners-overview/https://www.appsian.com/solutions/attribute-based-access-control-for-sap-ecc-s-4han/https://www.appsian.com/
2020-12-28
02 min
Understanding Some Significant Challenge
An Overview of Single Sign-On Security Risks
https://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/products/dynamic-data-masking/https://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/appsian-partners/partners-overview/https://www.appsian.com/solutions/attribute-based-access-control-for-sap-ecc-s-4han/https://www.appsian.com/
2020-12-28
04 min
Understanding Some Significant Challenge
An Overview of Single Sign-On Security Risks
2020-12-24
04 min
Understanding Some Significant Challenge
An Overview of PeopleSoft HCM
2020-12-24
01 min
Understanding Some Significant Challenge
Access Control An Integral Component Of Data Security Strategy
2020-12-21
05 min
Understanding Some Significant Challenge
Dynamic Data Masking Unique Advantages Ensure Data Security
2020-12-21
03 min
Understanding Some Significant Challenge
The Key Advantages Of Adaptive Multi-Factor Authentication
2020-12-21
05 min
Understanding Some Significant Challenge
Some Practical Tips To Prevent Data Exfiltration
2020-12-21
05 min
Understanding Some Significant Challenge
Enterprise Identity Management The Changing Landscape
Enterprise Identity Management The Changing Landscape
2020-12-21
03 min
Understanding Some Significant Challenge
Access Control An Integral Component Of Data Security Strategy
2020-12-21
05 min
Understanding Some Significant Challenge
Common Misconceptions Related To SAP Landscape Security
2020-12-21
05 min
Understanding Some Significant Challenge
The Key Advantages Of Real-Time ERP Data
The Key Advantages Of Real-Time ERP Data
2020-12-17
02 min
Understanding Some Significant Challenge
The Relevance Of SAML Authentication
The Relevance Of SAML Authentication
2020-12-17
03 min
Understanding Some Significant Challenge
Tips On Handling ERP Data Transfers And Migrations
Tips On Handling ERP Data Transfers And Migrations
2020-12-17
04 min
Understanding Some Significant Challenge
Access Control An Integral Component Of Data Security Strategy
2020-12-17
05 min
Understanding Some Significant Challenge
5 Steps To Counter ERP Security Threats
5 Steps To Counter ERP Security Threats
2020-12-17
05 min
Understanding Some Significant Challenge
4 Easy Ways To Ensure ERP Data Security
4 Easy Ways To Ensure ERP Data SecurityYour ERP data truly represents your business in a virtual form. The ERP system includes all of an enterprise's important information. With that in mind, your ERP data security strategy must be at least as watertight as your security strategy for your other business assets. Here are some ways on how to build a robust ERP data security strategy.1. Define User-Access and Audit RegularlyFor all datasets, every ERP user should have role-based access specified. Such access should also be divided into at least three categories: read-only, export-permitted, and complete...
2020-12-17
03 min
Understanding Some Significant Challenge
3 Steps To Rapid Response For Strengthening Cybersecurity
3 Steps To Rapid Response For Strengthening Cybersecurity
2020-12-17
04 min
Understanding Some Significant Challenge
The Significance Of Access Governance In Preventing Data Breaches
The Significance Of Access Governance In Preventing Data Breaches
2020-12-17
05 min
Understanding Some Significant Challenge
Role-Based Access Control Some Best Practices
Role-Based Access Control: Some Best PracticesRole-Based Access Control (RBAC) is an aspect of identity and access management whereby resource access is granted to users based on their role in organizations. Implemented properly, it can help organizations ensure data security and adhere to data privacy guidelines. Listed here are some RBAC best practices.1. Build an RBAC StrategyCreating a plan starts with an evaluation of where you are (data, method, policy, systems), determines your ideal future state (automated RBAC-enabled access provisioning for a collection of apps and systems), and identifies the critical gaps that need to be...
2020-12-11
04 min
Understanding Some Significant Challenge
3 Reasons Why Organizations Should Use Data Masking
3 Reasons Why Organizations Should Use Data MaskingIn order to minimize the excessive spread and disclosure of confidential data within an organization, data masking, often known as pseudonymization, is used. Data masking replaces real data with usable fictional data so that it can be safely used in cases where there is no requirement for actual data.Many types of sensitive data can be shielded with data masking. For example:Protected health information (PHI)Personally identifiable information (PII)Intellectual property (ITAR and EAR regulations)Payment card information (PCI-DSS regulation)Through the data masking solution...
2020-12-11
04 min
Understanding Some Significant Challenge
Data Exfiltration Understanding the Basics
Data Exfiltration: Understanding the BasicsData exfiltration - one of the greatest risks to data security - may lead to catastrophic consequences for enterprises. Data exfiltration is a critical business risk, and the outcomes may range from major financial losses to regulatory enforcement breaches to sensitive asset leaks. With the right security strategies, the question as to how to prevent data exfiltration gets answered.What is Data Exfiltration?Data exfiltration, also known as data theft or data extrusion, refers to the process of data transfer from a computer, storage device, or other electronic systems to another system...
2020-12-11
02 min
Understanding Some Significant Challenge
Segregation of Duties (SoD) in SAP GRC The Basics
Segregation of Duties (SoD) in SAP GRC: The BasicsIn any efficient Governance, Risk, and Enforcement (GRC) program, Segregation of Duties (SoD) is an essential part of fundamental controls. It requires the separation of individuals who perform various business transaction tasks
2020-12-10
01 min
Understanding Some Significant Challenge
Security Threats and PeopleSoft Some Protection Measures
ERP systems, being a treasure trove of data, especially need to be protected. Worldwide, companies use legacy ERP systems such as SAP and PeopleSoft to handle the full spectrum of their everyday operations across business verticals.
2020-12-10
02 min
Understanding Some Significant Challenge
SAP ABAC An Overview
Attribute-based access control (ABAC) is a strategy in which access rights are given to the users through the use of policies consisting of attributes that function together. In order to describe access control rules and access requests, ABAC uses attributes as the building blocks.
2020-12-10
02 min
Understanding Some Significant Challenge
RBAC vs. ABAC Which One to Choose
Identity management systems are usually made up of three main elements at the highest level: users, systems/applications, and policies. Policies describe how users communicate with various frameworks and software.
2020-12-10
02 min
Understanding Some Significant Challenge
An Overview of PeopleSoft HCM
2020-12-10
01 min
Understanding Some Significant Challenge
PeopleSoft SAML Single Sign-On For Better User Experience
To simplify their everyday tasks, workers use different logins, including emails, financial systems, CRM applications, and other programs and systems during a typical workday. It can be overwhelming to remember
2020-12-10
02 min
Understanding Some Significant Challenge
Managing Data Security in SAP Environments
To simplify their everyday tasks, workers use different logins, including emails, financial systems, CRM applications, and other programs and systems during a typical workday. It can be overwhelming to remember
2020-12-10
02 min
Understanding Some Significant Challenge
Maintaining ERP Data Security Few Effective Steps
High-profile data breaches have aptly highlighted the issue of data protection in recent years. Organizations have, largely, failed to protect personal information. Governments worldwide have passed data privacy legislations
2020-12-10
02 min
Understanding Some Significant Challenge
The Evolving Dynamics of Enterprise Identity Management
The Evolving Dynamics of Enterprise Identity ManagementAs the cybersecurity environment of the enterprise shifts with a plethora of emerging technologies, companies need to learn how not just to adapt and thrive but also to prosper. Enterprise users have access to hundreds of applications and resources, with many users using a multitude of them simultaneously on a daily basis. Manually provisioning diverse access levels is an almost impossible task.Businesses are increasingly using centralized solutions that simplify enterprise identity management in order to resolve this. However, since each organization has specific features, the criteria for identity management often...
2020-12-09
02 min
Understanding Some Significant Challenge
Understanding the Basics of SAP Attribute-Based Access Control
SAP and Attribute-Based Access Control Attribute-based access control (ABAC) in a standardized language uses attributes as building blocks that define rules for access control and explain access requests. Attributes are collections of marks or properties that can be used to identify all entities which need to be considered for authorization purposes.SAP has an authorization management system that, using the ABAC feature, allows protected access to company data in SAP applicati
2020-12-09
02 min
Understanding Some Significant Challenge
The Significance of Data Loss Prevention
The Significance of Data Loss PreventionData loss prevention (DLP) is a collection of activities and products (data loss prevention software) that ensure that confidential or vital data from an entity remains open to approved users and is not shared with unauthorized users or available to them. And with many businesses developing their entire business model around data collection and analysis, to fit its growing importance, companies need to enforce a robust
2020-12-09
04 min
Understanding Some Significant Challenge
An Overview of PeopleSoft HCM
PeopleSoft is an ERP system that incorporates human capital management (HCM), financial management, management of supplier relationships, automation of business resources, supply chain management, and modules for campus solutions. Let's get an overview of PeopleSoft HCM.Comprehensive core and strategic HR features are provided by PeopleSoft HCM. It is intended to satisfy large organizations with diverse business criteria and is either deployed on-site or in the cloud.
2020-12-09
01 min
Understanding Some Significant Challenge
The Various Types of Data Security Controls
The Various Types of Data Security ControlsData security refers both to the technology and the practice of protection of critical and sensitive company and consumer data, such as personal or financial information.Enterprises collect, process, store, and delete large volumes of data. Confidential personal information about your employees and clients and data related to financial or payment details, intellectual property is a gold mine for hackers. Data protection, which essentially refers to the processes and technologies that you can use to safeguard that information, is a key element in protecting the integrity and fiscal health of your...
2020-12-09
03 min
Understanding Some Significant Challenge
Workday versus PeopleSoft Which One to Choose
The HR and Finance software market is witnessing tough competition among various players, big and small. Among all players, PeopleSoft and Workday, both leaders in the segment, compete hard to capture the future market. The epic war between them is to win the market share and improve the features to the highest possible standards.
2020-12-09
02 min
Understanding Some Significant Challenge
Why SAP Customers Need Fine-Grained Control And Visibility
Onapsis recently discovered a critical vulnerability of the SAP (CVE-2020-6287 or RECON), which gives attackers complete control over vulnerable business applications. It enables hackers to gain unauthenticated access to SAP, and then create new user accounts with privileges of admin (superuser). A malicious hacker can inflict massive damages with these privileges, including stealing data, changing bank account numbers, altogether sabotaging systems, etc.
2020-12-09
03 min
Understanding Some Significant Challenge
Why is Attribute-Based Access Control (ABAC) Critical For ERP Security
The dark web is flooded with offers to purchase access to corporate networks, according to a new "Access for Sale" study from Positive Technologies. Otherwise, the dark web is generally viewed as a place on the web where hackers purchase and sell personal information such as credit cards, login credentials, social security numbers, and other personally identifiable information (PII).
2020-12-09
02 min
Understanding Some Significant Challenge
Why Employers Still Look for PeopleSoft Skills
PeopleSoft is a massive, monolithic system that was launched way back in 1988. Though competing with the faster and cheaper cloud and SaaS solutions, PeopleSoft applications are being used by organizations worldwide even now.
2020-12-09
02 min
Understanding Some Significant Challenge
Why Do We Need Access Management System
Identity and Access Management (IAM) is about identifying and controlling the roles and privileges of individual network users and the situations in which such privileges are given (or denied) to users.
2020-12-09
02 min
Understanding Some Significant Challenge
Why Context of User Access and Data Usage Matters
Organizations using conventional on-site ERP applications such as SAP ECC and Oracle PeopleSoft are faced with a rapidly evolving environment around data collection, storage, and use. Apart from the number of compliance regulations they need to obey, such as GDPR, CCPA, and others, they deal with critical visibility gaps
2020-12-09
02 min
Understanding Some Significant Challenge
User Behavior Analytics Significantly Improving Data Security
User Behavior Analytics (UBA) refers to a class of cybersecurity tools deployed on networks and other systems to analyze user behavior. In order to detect irregularities and malicious behavior, it applies advanced analytics. UBA systems are specifically meant to provide cybersecurity teams with actionable knowledge. These can be used to reveal vulnerabilities to data protection such as malicious insiders and privileged account abuses that traditional security approaches cannot see
2020-12-07
02 min
Understanding Some Significant Challenge
Understanding the Different Types of Security Threats
'Data protection' refers to the preventive steps taken during the data lifecycle to safeguard data from unapproved access and data corruption. Data security is an essential aspect of businesses of every size. Data protection technologies that include tokenization, data encryption, data security solutions, and key management practices that protect data are deployed in the process.
2020-12-07
03 min
Understanding Some Significant Challenge
Understanding the Basics and Working of SAML
The Security Assertion Markup Language, aka SAML, is a widely used open standard that allows authorization credentials to be transferred to service providers (SP) by identity providers (IdP). In essence, SAML implementation enables Single Sign-On, which means to log into several different websites; you can use one set of credentials. Managing one username per user is much easier than managing separate email logins, customer relationship management (CRM) applications, Active Directory, etc.
2020-12-07
02 min
Understanding Some Significant Challenge
Understanding Some Significant Challenges to ERP Data Security
In many respects, ERP systems serve as the core of many enterprises. These applications are mainly represented by mega-vendors such as SAP, Microsoft, and Oracle, and the most important and valuable data is handled by them within organizations. They store records related to sales, finance, products, services, employee data, and trade secrets. A breach of such critical applications can lead to unintended downtime, increased compliance risk, decreased brand trust, and project delays.
2020-12-07
02 min
Understanding Some Significant Challenge
Understanding Identity and Access Management
Identity and access management (IAM) is a basic security component that helps ensure that users have the access they need and that unauthorized users are unable to access systems, data, and applications.
2020-12-07
02 min
Understanding Some Significant Challenge
Understanding How SAML Works
Understanding How SAML WorksSecurity Assertion Markup Language (aka SAML) is a widely used open standard that passes on authorization credentials from Identity Providers (IdPs) to Service Providers (SPs). It allows safe communication between applications and provides access to users with a single set of credentials
2020-12-07
02 min
Understanding Some Significant Challenge
Understanding How PeopleSoft Single-Sign-On Works
Single Sign-On (SSO) is an aspect of Identity and Access Management (IAM) that enables users to authenticate themselves with only one set of credentials – generally a set of username and password - securely with several websites and applications, by signing in only once. The website or application (that the user is trying to access) relies on a trusted third party with Single-Sign-On solutions to verify that users are actually who they say they are.
2020-12-07
02 min
Understanding Some Significant Challenge
Practical Tips To Improve SAP Access Policy Management
The increased provisioning of users puts additional pressure on the SAP policy management and IAM teams, considering the fact that they are already burdened with maintaining remote access to apps for people working from home
2020-12-04
02 min
Understanding Some Significant Challenge
Identity Management Oversights An Overview
The foundations of cybersecurity of enterprises in today's digital era are based on 'identity.' The new digital perimeter, in reality, is identity. By deploying strong ongoing authentication, businesses can ensure more robust cybersecurity than ever. Yet, companies continue to struggle to deploy and retain strategies for identity and access management. This generally is the outcome of some identity and access management (IAM) oversights. Outlined here are a few of them:
2020-12-04
02 min
Understanding Some Significant Challenge
Improving Cybersecurity Some Strategies
Those working in the crucial field of cybersecurity are often stressed due to multiple reasons. As cybersecurity teams are generally understaffed, the workload is enormous. The very nature of the job is also extremely demanding. Solving the burnout problem in such circumstances requires enterprises to work smarter, not harder. Some approaches that companies can leverage to take the challenges head-on are outlined here.
2020-12-02
02 min
Understanding Some Significant Challenge
Implementing The Zero Trust Security Model Some Suggestions
Zero trust is a concept that is discussed much in the cybersecurity industry. Over the past couple of years, almost every organization has jumped on the zero trust bandwagon in some capacity. So what is the concept of zero trust
2020-12-02
02 min
Understanding Some Significant Challenge
Identity Providers The Need For Identity Orchestration
For Single Sign-On (SSO) and federation that enable employee and customer access to tools ranging from personalized applications to cloud-based services, traditional identity providers (IdPs) are important. They are great at doing these things by themselves, but there are trade-offs that need to be taken into account. Let's have an overview of the top 3
2020-12-02
03 min
Understanding Some Significant Challenge
Identity Providers Simplifying Access and Improving User Experience
For digital and cloud-hosted applications, an identity provider (IdP) stores and maintains the digital identities of users. Using username-password combinations and other variables, an IdP can verify user identities, or it may simply include a list of user identities that another service provider (such as an SSO) checks.
2020-12-02
03 min
Understanding Some Significant Challenge
Identity Access Management The Changing Dimensions
Identity Access Management (IAM) is a system, according to Gartner, that allows the right people to access the required resources at the right time for the right reasons. Identity management services address the mission-critical need to ensure adequate access to resources across highly heterogeneous technology environments and to meet increasingly stringent requirements for compliance. Businesses that build mature Identity Access Management capabilities will reduce identity management costs and become much more agile in promoting new business initiatives.
2020-12-02
02 min
Understanding Some Significant Challenge
Ways To Detect and Prevent Insider Threats To ERP System
Insider attacks are one of the most prevalent causes of data breaches worldwide, and they can also be among the most costly. Sixty-eight percent of organizations noted that insider attacks have become more common over the last 12 months, according to the 2020 Insider Threat Survey (Cybersecurity Insiders
2020-11-30
03 min
Understanding Some Significant Challenge
Using ERP Data For Quick Incident Response
Several ERP incidents take a long time to investigate and resolve. When the staff faces significant challenges in resolving incidents in a timely manner, it is difficult to offer exemplary customer support to the business lines.
2020-11-30
02 min
Understanding Some Significant Challenge
How Enhanced Visibility Leads to Effective Compliance Management
Several data privacy laws have been enacted in many countries, and many more are in the offing. These regulations have fundamentally changed the way organizations look at data. It is well known that data is the new currency for businesses. With the coming into force of CCPA and GDPR
2020-11-26
03 min
Understanding Some Significant Challenge
Few Tips for Quick Access to PeopleSoft
For organizations worldwide, providing mobile access to PeopleSoft ERP transactions and data has become one of the key objectives. And it has become more of a requirement, considering the present COVID-19 pandemic scenario, to maintain business continuity without any hindrance.
2020-11-26
03 min
Understanding Some Significant Challenge
Few Potential Identity Management Oversights
Identity forms the foundation of cybersecurity for businesses. In fact, identity is the new digital perimeter. Companies can enforce better cybersecurity than ever through strong continuous authentication.
2020-11-26
02 min
Understanding Some Significant Challenge
ERP Systems Key Security Challenges
With ever-increasing data breach instances, ensuring data protection has assumed vital importance in today's digital era. The value of securing confidential data will continue to form and alter the security strategies' framework across organizations. This will undoubtedly result in an increased emphasis on access controls, visibility solutions, and investments in data-centric ERP security. Businesses will find the expense of data breaches too high with many comprehensive data protection laws in the offing. Enterprises should invest in strategic solutions to address emerging threats to data security.
2020-11-26
03 min
Understanding Some Significant Challenge
ERP Security The Relevance of Context of User Access and Data Usage
Organizations that use traditional on-site ERP applications such as SAP ECC and Oracle PeopleSoft face a rapidly transforming data collection, storage, and use environment. They deal with critical visibility gaps, particularly at a fine-grained level, related to understanding the access & use of ERP data. Apart from this,
2020-11-26
02 min
Understanding Some Significant Challenge
Tips For Secure And Compliant Cloud Transformation
One of the top trending facets of the cybersecurity strategy of companies is migration to the cloud. According to Forrester Research, almost three-quarters of organizations are running a hybrid and/or multi-cloud approach today
2020-11-25
02 min
Understanding Some Significant Challenge
The Three Key Challenges of Identity and Access Management
There's more of everything in today's digital age. More cloud-based applications, more devices, more resources, and more users. In a recent survey, 94% of Chief Information Officers agreed that the technology stack, with more applications, data, devices, and transactions, would be more complicated in the future
2020-11-25
03 min
Understanding Some Significant Challenge
The Ideal Identity and Access Management Solution Key Considerations
The proliferation of digital access has resulted in a world more connected than ever before. Today's users - customers and staff - have the freedom to communicate with technology on their own terms with the availability of technology, devices, and global access points. Consequently,
2020-11-25
02 min
Understanding Some Significant Challenge
Strengthening Enterprises' Security Posture Some Strategies
There have been, in the recent past, several instances of data breaches wherein human error caused company information to be compromised. Human error is the reason behind 52 percent of security breaches, according to a new survey.
2020-11-25
02 min
Understanding Some Significant Challenge
Strengthening Enterprises' Security Posture Some Strategies
2020 has been an unusual year riddled with unrest and uncertainty. Cyberattacks have been growing exponentially during this year. Reports of Denial-of-Service, phishing, and ransomware attacks appear to be everywhere. Some techniques to protect you and your company are outlined here.
2020-11-25
02 min
Understanding Some Significant Challenge
Strategies to Prevent Brute Force Attacks
2020 has been an unusual year riddled with unrest and uncertainty. Cyberattacks have been growing exponentially during this year. Reports of Denial-of-Service, phishing, and ransomware attacks appear to be everywhere. Some techniques to protect you and your company are outlined here.
2020-11-25
03 min
Understanding Some Significant Challenge
Strategies to Prepare Against Cyberattacks
2020 has been an unusual year riddled with unrest and uncertainty. Cyberattacks have been growing exponentially during this year. Reports of Denial-of-Service, phishing, and ransomware attacks appear to be everywhere. Some techniques to protect you and your company are outlined here.
2020-11-25
01 min
Understanding Some Significant Challenge
Steps To Improve Detection-Based Security
Many security experts have moved from a stance of prevention to detection in today's IT environment, where device compromises are almost a regular occurrence. Instead of constructing higher walls in hopes of keeping them out, CISO's are more focused on using techniques to locate the attackers inside their walls.
2020-11-25
01 min
Understanding Some Significant Challenge
Data Privacy And SoD
As part of organizational security assessments, application-level vulnerability testing typically requires an evaluation of the application's capacity to facilitate the segregation of duties. Specifically, tests are guided by regulatory criteria or enforcement, such as PCI-DSS, GDPR, HIPAA, or SOX.
2020-11-19
02 min
Understanding Some Significant Challenge
Attribute-Based Authentication The Way Forward
In general, people do not want to retain complicated passwords; they seem tedious. It is indeed challenging to remember so many different passwords for numerous accounts that every user has. The few whose identities have been stolen in the past understand the significance of privacy and protection
2020-11-19
04 min
Understanding Some Significant Challenge
Are your data privacy strategies ready
Organizations that use SAP ECC, PeopleSoft, S/4HANA, and Oracle EBS are likely to face additional compliance issues due to the inherent limitations of these legacy ERP systems. Let's look at a few approaches to strengthen the ERP systems to boost CCPA compliance and develop capabilities to prepare for the uncertainty concerning data privacy.
2020-11-19
02 min
Understanding Some Significant Challenge
Access Governance Is Critical For Preventing Phishing Attacks
There has been quite an upsurge in instances of phishing attacks during the past few months. Cybercriminals, exploiting people's COVID-19 fears, are engaging in phishing and social engineering aimed at stealing user credentials to business applications and VPNs. Ultimately, the credentials used for authentication are the network perimeter of an organization. This puts companies in a challenging position - they can limit employee access to these programs and risk negative impacts on efficiency and business continuity, or they can hope that nothing terrible happens. Many prefer the latter, and worldwide, the consequences are being felt.
2020-11-19
03 min
Understanding Some Significant Challenge
ABAC vs. RBAC A Comparison
ABAC vs. RBAC: A ComparisonIn organizations, users of the network must be authenticated and authorized before accessing the system. This is especially the case for parts of the system capable of contributing to security breaches. Access control is a way of ensuring that users are who they say they are and that they have adequate access to company data. There are two key methods of controlling access for systems — role-based access control (RBAC) and attribute-based access control (ABAC)
2020-11-19
03 min
Understanding Some Significant Challenge
ABAC and RBAC For SAP Dynamic Authorization
In identity and access management (IAM), Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC)are two types of authentication process control and SAP user authorization. Over the years, due to the rising complexity of access rules and the exponential number of staff accessing useful ERP data remotely, SAP's traditional RBAC approach has reached its limits
2020-11-19
02 min
Understanding Some Significant Challenge
5 Remote Access Security Risks
With the COVID-19 pandemic forcing organizations worldwide to opt for remote work, not only do security teams face the universal obstacles posed by this crisis, but they also need to resolve particular hurdles, such as securing newly remote staff and avoiding malicious attacks against remote users. Here are the top security threats that teams must face, as well as best practices in technology to keep users and business data secure:
2020-11-19
02 min
Understanding Some Significant Challenge
Common Causes of Security Breaches and Suggestions to Prevent Them
Security breaches are widespread today, frequently impacting organizations and users around the world adversely. Knowing the underlying incidents and injuries that cause these violations not only allows us to understand how they occur but also provides valuable knowledge to tackle this increasing danger
2020-11-17
01 min
Understanding Some Significant Challenge
PeopleSoft Data Security Incorporating Modern Measures
The point-to-point integration approach prevalent in most companies lacks versatility and does not handle changes vital to the success of organizations. Organizations, therefore, need to devise a plan for integration and ensure its use through data, devices, and systems. The introduction of centralized integration through an independent platform meets all enterprise integration needs.
2020-11-06
04 min
Understanding Some Significant Challenge
Improve SAP Access Policy Management with These Simple Steps
The increased user provisioning puts additional strain on the teams handling SAP policy management and IAM, which are already burdened with maintaining remote access to applications for people working from home.
2020-11-06
04 min
Understanding Some Significant Challenge
ERP Security The Relevance of Context of User Access and Data Usage
2020-11-04
03 min
Understanding Some Significant Challenge
An Overview of Single Sign-On Authentication
The traditional login process has been replaced by Single Sign-On authentication (or SSO authentication), and the way people use the web has been completely transformed. It allows users to log in once, even across various domains, to access multiple apps, programs, and accounts.
2020-11-04
03 min
The PeopleSoft Administrator Podcast
#218 - 8.58 DPK
This week on the podcast, Kyle and Dan talk about the benefits of blogging for yourself, a fun SQL murder mystery game, and then they dive into the changes in the DPK for PeopleTools 8.58. Show Notes SQL Murder Mystery @ 2:30 HTML Compare Reports @ 7:30 Domain Name Changes @ 9:30 Opitmal Flexible Architecture PeopleTools 8.58 DPK @ 19:00 PIA Secure Admin Port Idea DPK Patch Repo psadmin.io DPK Modules Weblogic PORTAL.war App Server IB Gateway Appsian/ERP Firewall
2020-01-03
35 min