Look for any podcast host, guest or anyone
Showing episodes and shows of

Appsian ERP

Shows

BCN NewsBCN NewsThe Threat is Real. Protect Your Data. Today.Karl speaks with David Vincent, VP Product Strategy and Customer Engagement at Appsian, a Global ERP Security platform that monitors various levels of threat detection, controls and ensures that its customers are audit ready to be compliant in this very important part of a business - data protection.David talks about how businesses need to think not only of the protection of their customers data but also prepare themselves to align with the ever increasing Corporate Governance pressures for the Boards of Directors.ABOUT APPSIANAppsian Provides ERP Security Below The Network...2022-04-1321 minBrilliance Security Magazine PodcastBrilliance Security Magazine PodcastAutomated Controls for Compliance - How and WhyIn Episode S4E2 our guest is David Vincent, VP of Product Strategy and the chief security evangelist at Appsian Security. Our topic is Automated Controls for Compliance - How and Why. Appsian provides ERP security below the network layer. David shares his insights about: Challenges associated with manually maintaining compliance. How automated controls can affect compliance. Leading practices for effective Data Security & Privacy Compliance. And more. David Vincent has over twenty-five years of experience delivering Security, Audit, Risk, & Compliance services while employed with some of...2022-02-2825 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeKey Dimensions Of Ensuring ERP Data SecurityWhen attacks on business data grow more complex, the security features of legacy ERP applications are not able to keep up. Initially designed for easy access to data and business processes, Legacy ERP applications have created wide enforcement and security gaps that can lead to disastrous data breaches and millions lost to business policy violations. Outlined here are some approaches to meet the data security challenges successfully2021-03-1701 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeERP Implementation Points To Consider For Comprehensive Data SecurityEmerging technologies such as Artificial Intelligence (AI) and the Internet of Things (IoT) are supplementing the market intelligence generated by modern ERP systems. While this business intelligence helps businesses develop their bottom line and optimize customer experience, ERP data protection also presents fresh challenges.2021-03-1701 minBrilliance Security Magazine PodcastBrilliance Security Magazine PodcastPotential Security Risks Within Legacy DatabasesIn Episode S3E1 we talk with Greg Wendt, Executive Director of Security at Appsian. The focus of the conversation is data and compliance as it relates to Enterprise Resource Planning (ERP) software. We uncover some of the potential security risks associated with legacy databases and what can be done to protect sensitive data in a post-COVID world.  Greg Wendt is an Oracle® PeopleSoft security expert. During his 23-year career, he has been recognized as a leader in data security, application architecture, and business operations. He served as an ERP Application Architect at Texas Ch...2021-01-2224 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeImplementing ERP Some Data Security Tips2020-12-3104 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeERP Security The Relevance of Context of User Access and Data Usage2020-12-3103 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeData Exfiltration Understanding the Basics2020-12-3102 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeDealing With Challenges during GRC Establishment in PeopleSoft2020-12-3103 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeCommon Misconceptions Related To SAP Landscape Securityhttps://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/products/dynamic-data-masking/https://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/appsian-partners/partners-overview/https://www.appsian.com/solutions/attribute-based-access-control-for-sap-ecc-s-4han/https://www.appsian.com/2020-12-2805 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAttribute-Based Access Control and Its Advantageshttps://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/products/dynamic-data-masking/https://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/appsian-partners/partners-overview/https://www.appsian.com/solutions/attribute-based-access-control-for-sap-ecc-s-4han/https://www.appsian.com/2020-12-2802 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAn Overview of Single Sign-On Security Riskshttps://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/products/dynamic-data-masking/https://www.appsian.com/products/peoplesoft-single-sign-on/https://www.appsian.com/appsian-partners/partners-overview/https://www.appsian.com/solutions/attribute-based-access-control-for-sap-ecc-s-4han/https://www.appsian.com/2020-12-2804 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAn Overview of Single Sign-On Security Risks2020-12-2404 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAn Overview of PeopleSoft HCM2020-12-2401 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAccess Control An Integral Component Of Data Security Strategy2020-12-2105 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeDynamic Data Masking Unique Advantages Ensure Data Security2020-12-2103 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeThe Key Advantages Of Adaptive Multi-Factor Authentication2020-12-2105 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeSome Practical Tips To Prevent Data Exfiltration2020-12-2105 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeEnterprise Identity Management The Changing LandscapeEnterprise Identity Management The Changing Landscape2020-12-2103 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAccess Control An Integral Component Of Data Security Strategy2020-12-2105 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeCommon Misconceptions Related To SAP Landscape Security2020-12-2105 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeThe Key Advantages Of Real-Time ERP DataThe Key Advantages Of Real-Time ERP Data2020-12-1702 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeThe Relevance Of SAML AuthenticationThe Relevance Of SAML Authentication2020-12-1703 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeTips On Handling ERP Data Transfers And MigrationsTips On Handling ERP Data Transfers And Migrations2020-12-1704 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAccess Control An Integral Component Of Data Security Strategy2020-12-1705 minUnderstanding Some Significant ChallengeUnderstanding Some Significant Challenge5 Steps To Counter ERP Security Threats5 Steps To Counter ERP Security Threats2020-12-1705 minUnderstanding Some Significant ChallengeUnderstanding Some Significant Challenge4 Easy Ways To Ensure ERP Data Security4 Easy Ways To Ensure ERP Data SecurityYour ERP data truly represents your business in a virtual form. The ERP system includes all of an enterprise's important information. With that in mind, your ERP data security strategy must be at least as watertight as your security strategy for your other business assets. Here are some ways on how to build a robust ERP data security strategy.1. Define User-Access and Audit RegularlyFor all datasets, every ERP user should have role-based access specified. Such access should also be divided into at least three categories: read-only, export-permitted, and complete...2020-12-1703 minUnderstanding Some Significant ChallengeUnderstanding Some Significant Challenge3 Steps To Rapid Response For Strengthening Cybersecurity3 Steps To Rapid Response For Strengthening Cybersecurity2020-12-1704 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeThe Significance Of Access Governance In Preventing Data BreachesThe Significance Of Access Governance In Preventing Data Breaches2020-12-1705 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeRole-Based Access Control Some Best PracticesRole-Based Access Control: Some Best PracticesRole-Based Access Control (RBAC) is an aspect of identity and access management whereby resource access is granted to users based on their role in organizations. Implemented properly, it can help organizations ensure data security and adhere to data privacy guidelines. Listed here are some RBAC best practices.1. Build an RBAC StrategyCreating a plan starts with an evaluation of where you are (data, method, policy, systems), determines your ideal future state (automated RBAC-enabled access provisioning for a collection of apps and systems), and identifies the critical gaps that need to be...2020-12-1104 minUnderstanding Some Significant ChallengeUnderstanding Some Significant Challenge3 Reasons Why Organizations Should Use Data Masking3 Reasons Why Organizations Should Use Data MaskingIn order to minimize the excessive spread and disclosure of confidential data within an organization, data masking, often known as pseudonymization, is used. Data masking replaces real data with usable fictional data so that it can be safely used in cases where there is no requirement for actual data.Many types of sensitive data can be shielded with data masking. For example:Protected health information (PHI)Personally identifiable information (PII)Intellectual property (ITAR and EAR regulations)Payment card information (PCI-DSS regulation)Through the data masking solution...2020-12-1104 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeData Exfiltration Understanding the BasicsData Exfiltration: Understanding the BasicsData exfiltration - one of the greatest risks to data security - may lead to catastrophic consequences for enterprises. Data exfiltration is a critical business risk, and the outcomes may range from major financial losses to regulatory enforcement breaches to sensitive asset leaks. With the right security strategies, the question as to how to prevent data exfiltration gets answered.What is Data Exfiltration?Data exfiltration, also known as data theft or data extrusion, refers to the process of data transfer from a computer, storage device, or other electronic systems to another system...2020-12-1102 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeSegregation of Duties (SoD) in SAP GRC The BasicsSegregation of Duties (SoD) in SAP GRC: The BasicsIn any efficient Governance, Risk, and Enforcement (GRC) program, Segregation of Duties (SoD) is an essential part of fundamental controls. It requires the separation of individuals who perform various business transaction tasks2020-12-1001 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeSecurity Threats and PeopleSoft Some Protection MeasuresERP systems, being a treasure trove of data, especially need to be protected. Worldwide, companies use legacy ERP systems such as SAP and PeopleSoft to handle the full spectrum of their everyday operations across business verticals.2020-12-1002 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeSAP ABAC An OverviewAttribute-based access control (ABAC) is a strategy in which access rights are given to the users through the use of policies consisting of attributes that function together. In order to describe access control rules and access requests, ABAC uses attributes as the building blocks.2020-12-1002 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeRBAC vs. ABAC Which One to ChooseIdentity management systems are usually made up of three main elements at the highest level: users, systems/applications, and policies. Policies describe how users communicate with various frameworks and software.2020-12-1002 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAn Overview of PeopleSoft HCM2020-12-1001 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengePeopleSoft SAML Single Sign-On For Better User ExperienceTo simplify their everyday tasks, workers use different logins, including emails, financial systems, CRM applications, and other programs and systems during a typical workday. It can be overwhelming to remember2020-12-1002 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeManaging Data Security in SAP EnvironmentsTo simplify their everyday tasks, workers use different logins, including emails, financial systems, CRM applications, and other programs and systems during a typical workday. It can be overwhelming to remember2020-12-1002 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeMaintaining ERP Data Security Few Effective StepsHigh-profile data breaches have aptly highlighted the issue of data protection in recent years. Organizations have, largely, failed to protect personal information. Governments worldwide have passed data privacy legislations2020-12-1002 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeThe Evolving Dynamics of Enterprise Identity ManagementThe Evolving Dynamics of Enterprise Identity ManagementAs the cybersecurity environment of the enterprise shifts with a plethora of emerging technologies, companies need to learn how not just to adapt and thrive but also to prosper. Enterprise users have access to hundreds of applications and resources, with many users using a multitude of them simultaneously on a daily basis. Manually provisioning diverse access levels is an almost impossible task.Businesses are increasingly using centralized solutions that simplify enterprise identity management in order to resolve this. However, since each organization has specific features, the criteria for identity management often...2020-12-0902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeUnderstanding the Basics of SAP Attribute-Based Access ControlSAP and Attribute-Based Access Control Attribute-based access control (ABAC) in a standardized language uses attributes as building blocks that define rules for access control and explain access requests. Attributes are collections of marks or properties that can be used to identify all entities which need to be considered for authorization purposes.SAP has an authorization management system that, using the ABAC feature, allows protected access to company data in SAP applicati2020-12-0902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeThe Significance of Data Loss PreventionThe Significance of Data Loss PreventionData loss prevention (DLP) is a collection of activities and products (data loss prevention software) that ensure that confidential or vital data from an entity remains open to approved users and is not shared with unauthorized users or available to them. And with many businesses developing their entire business model around data collection and analysis, to fit its growing importance, companies need to enforce a robust2020-12-0904 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAn Overview of PeopleSoft HCMPeopleSoft is an ERP system that incorporates human capital management (HCM), financial management, management of supplier relationships, automation of business resources, supply chain management, and modules for campus solutions. Let's get an overview of PeopleSoft HCM.Comprehensive core and strategic HR features are provided by PeopleSoft HCM. It is intended to satisfy large organizations with diverse business criteria and is either deployed on-site or in the cloud.2020-12-0901 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeThe Various Types of Data Security ControlsThe Various Types of Data Security ControlsData security refers both to the technology and the practice of protection of critical and sensitive company and consumer data, such as personal or financial information.Enterprises collect, process, store, and delete large volumes of data. Confidential personal information about your employees and clients and data related to financial or payment details, intellectual property is a gold mine for hackers. Data protection, which essentially refers to the processes and technologies that you can use to safeguard that information, is a key element in protecting the integrity and fiscal health of your...2020-12-0903 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeWorkday versus PeopleSoft Which One to ChooseThe HR and Finance software market is witnessing tough competition among various players, big and small. Among all players, PeopleSoft and Workday, both leaders in the segment, compete hard to capture the future market. The epic war between them is to win the market share and improve the features to the highest possible standards.2020-12-0902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeWhy SAP Customers Need Fine-Grained Control And VisibilityOnapsis recently discovered a critical vulnerability of the SAP (CVE-2020-6287 or RECON), which gives attackers complete control over vulnerable business applications. It enables hackers to gain unauthenticated access to SAP, and then create new user accounts with privileges of admin (superuser). A malicious hacker can inflict massive damages with these privileges, including stealing data, changing bank account numbers, altogether sabotaging systems, etc.2020-12-0903 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeWhy is Attribute-Based Access Control (ABAC) Critical For ERP SecurityThe dark web is flooded with offers to purchase access to corporate networks, according to a new "Access for Sale" study from Positive Technologies. Otherwise, the dark web is generally viewed as a place on the web where hackers purchase and sell personal information such as credit cards, login credentials, social security numbers, and other personally identifiable information (PII).2020-12-0902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeWhy Employers Still Look for PeopleSoft SkillsPeopleSoft is a massive, monolithic system that was launched way back in 1988. Though competing with the faster and cheaper cloud and SaaS solutions, PeopleSoft applications are being used by organizations worldwide even now.2020-12-0902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeWhy Do We Need Access Management SystemIdentity and Access Management (IAM) is about identifying and controlling the roles and privileges of individual network users and the situations in which such privileges are given (or denied) to users.2020-12-0902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeWhy Context of User Access and Data Usage MattersOrganizations using conventional on-site ERP applications such as SAP ECC and Oracle PeopleSoft are faced with a rapidly evolving environment around data collection, storage, and use. Apart from the number of compliance regulations they need to obey, such as GDPR, CCPA, and others, they deal with critical visibility gaps2020-12-0902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeUser Behavior Analytics Significantly Improving Data SecurityUser Behavior Analytics (UBA) refers to a class of cybersecurity tools deployed on networks and other systems to analyze user behavior. In order to detect irregularities and malicious behavior, it applies advanced analytics. UBA systems are specifically meant to provide cybersecurity teams with actionable knowledge. These can be used to reveal vulnerabilities to data protection such as malicious insiders and privileged account abuses that traditional security approaches cannot see2020-12-0702 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeUnderstanding the Different Types of Security Threats'Data protection' refers to the preventive steps taken during the data lifecycle to safeguard data from unapproved access and data corruption. Data security is an essential aspect of businesses of every size. Data protection technologies that include tokenization, data encryption, data security solutions, and key management practices that protect data are deployed in the process.2020-12-0703 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeUnderstanding the Basics and Working of SAMLThe Security Assertion Markup Language, aka SAML, is a widely used open standard that allows authorization credentials to be transferred to service providers (SP) by identity providers (IdP). In essence, SAML implementation enables Single Sign-On, which means to log into several different websites; you can use one set of credentials. Managing one username per user is much easier than managing separate email logins, customer relationship management (CRM) applications, Active Directory, etc.2020-12-0702 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeUnderstanding Some Significant Challenges to ERP Data SecurityIn many respects, ERP systems serve as the core of many enterprises. These applications are mainly represented by mega-vendors such as SAP, Microsoft, and Oracle, and the most important and valuable data is handled by them within organizations. They store records related to sales, finance, products, services, employee data, and trade secrets. A breach of such critical applications can lead to unintended downtime, increased compliance risk, decreased brand trust, and project delays.2020-12-0702 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeUnderstanding Identity and Access ManagementIdentity and access management (IAM) is a basic security component that helps ensure that users have the access they need and that unauthorized users are unable to access systems, data, and applications.2020-12-0702 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeUnderstanding How SAML WorksUnderstanding How SAML WorksSecurity Assertion Markup Language (aka SAML) is a widely used open standard that passes on authorization credentials from Identity Providers (IdPs) to Service Providers (SPs). It allows safe communication between applications and provides access to users with a single set of credentials2020-12-0702 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeUnderstanding How PeopleSoft Single-Sign-On WorksSingle Sign-On (SSO) is an aspect of Identity and Access Management (IAM) that enables users to authenticate themselves with only one set of credentials – generally a set of username and password - securely with several websites and applications, by signing in only once. The website or application (that the user is trying to access) relies on a trusted third party with Single-Sign-On solutions to verify that users are actually who they say they are.2020-12-0702 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengePractical Tips To Improve SAP Access Policy ManagementThe increased provisioning of users puts additional pressure on the SAP policy management and IAM teams, considering the fact that they are already burdened with maintaining remote access to apps for people working from home2020-12-0402 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeIdentity Management Oversights An OverviewThe foundations of cybersecurity of enterprises in today's digital era are based on 'identity.' The new digital perimeter, in reality, is identity. By deploying strong ongoing authentication, businesses can ensure more robust cybersecurity than ever. Yet, companies continue to struggle to deploy and retain strategies for identity and access management. This generally is the outcome of some identity and access management (IAM) oversights. Outlined here are a few of them:2020-12-0402 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeImproving Cybersecurity Some StrategiesThose working in the crucial field of cybersecurity are often stressed due to multiple reasons. As cybersecurity teams are generally understaffed, the workload is enormous. The very nature of the job is also extremely demanding. Solving the burnout problem in such circumstances requires enterprises to work smarter, not harder. Some approaches that companies can leverage to take the challenges head-on are outlined here.2020-12-0202 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeImplementing The Zero Trust Security Model Some SuggestionsZero trust is a concept that is discussed much in the cybersecurity industry. Over the past couple of years, almost every organization has jumped on the zero trust bandwagon in some capacity. So what is the concept of zero trust2020-12-0202 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeIdentity Providers The Need For Identity OrchestrationFor Single Sign-On (SSO) and federation that enable employee and customer access to tools ranging from personalized applications to cloud-based services, traditional identity providers (IdPs) are important. They are great at doing these things by themselves, but there are trade-offs that need to be taken into account. Let's have an overview of the top 32020-12-0203 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeIdentity Providers Simplifying Access and Improving User ExperienceFor digital and cloud-hosted applications, an identity provider (IdP) stores and maintains the digital identities of users. Using username-password combinations and other variables, an IdP can verify user identities, or it may simply include a list of user identities that another service provider (such as an SSO) checks.2020-12-0203 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeIdentity Access Management The Changing DimensionsIdentity Access Management (IAM) is a system, according to Gartner, that allows the right people to access the required resources at the right time for the right reasons. Identity management services address the mission-critical need to ensure adequate access to resources across highly heterogeneous technology environments and to meet increasingly stringent requirements for compliance. Businesses that build mature Identity Access Management capabilities will reduce identity management costs and become much more agile in promoting new business initiatives.2020-12-0202 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeWays To Detect and Prevent Insider Threats To ERP SystemInsider attacks are one of the most prevalent causes of data breaches worldwide, and they can also be among the most costly. Sixty-eight percent of organizations noted that insider attacks have become more common over the last 12 months, according to the 2020 Insider Threat Survey (Cybersecurity Insiders2020-11-3003 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeUsing ERP Data For Quick Incident ResponseSeveral ERP incidents take a long time to investigate and resolve. When the staff faces significant challenges in resolving incidents in a timely manner, it is difficult to offer exemplary customer support to the business lines.2020-11-3002 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeHow Enhanced Visibility Leads to Effective Compliance ManagementSeveral data privacy laws have been enacted in many countries, and many more are in the offing. These regulations have fundamentally changed the way organizations look at data. It is well known that data is the new currency for businesses. With the coming into force of CCPA and GDPR2020-11-2603 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeFew Tips for Quick Access to PeopleSoftFor organizations worldwide, providing mobile access to PeopleSoft ERP transactions and data has become one of the key objectives. And it has become more of a requirement, considering the present COVID-19 pandemic scenario, to maintain business continuity without any hindrance.2020-11-2603 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeFew Potential Identity Management OversightsIdentity forms the foundation of cybersecurity for businesses. In fact, identity is the new digital perimeter. Companies can enforce better cybersecurity than ever through strong continuous authentication.2020-11-2602 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeERP Systems Key Security ChallengesWith ever-increasing data breach instances, ensuring data protection has assumed vital importance in today's digital era. The value of securing confidential data will continue to form and alter the security strategies' framework across organizations. This will undoubtedly result in an increased emphasis on access controls, visibility solutions, and investments in data-centric ERP security. Businesses will find the expense of data breaches too high with many comprehensive data protection laws in the offing. Enterprises should invest in strategic solutions to address emerging threats to data security.2020-11-2603 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeERP Security The Relevance of Context of User Access and Data UsageOrganizations that use traditional on-site ERP applications such as SAP ECC and Oracle PeopleSoft face a rapidly transforming data collection, storage, and use environment. They deal with critical visibility gaps, particularly at a fine-grained level, related to understanding the access & use of ERP data. Apart from this,2020-11-2602 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeTips For Secure And Compliant Cloud TransformationOne of the top trending facets of the cybersecurity strategy of companies is migration to the cloud. According to Forrester Research, almost three-quarters of organizations are running a hybrid and/or multi-cloud approach today2020-11-2502 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeThe Three Key Challenges of Identity and Access ManagementThere's more of everything in today's digital age. More cloud-based applications, more devices, more resources, and more users. In a recent survey, 94% of Chief Information Officers agreed that the technology stack, with more applications, data, devices, and transactions, would be more complicated in the future2020-11-2503 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeThe Ideal Identity and Access Management Solution Key ConsiderationsThe proliferation of digital access has resulted in a world more connected than ever before. Today's users - customers and staff - have the freedom to communicate with technology on their own terms with the availability of technology, devices, and global access points. Consequently,2020-11-2502 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeStrengthening Enterprises' Security Posture Some StrategiesThere have been, in the recent past, several instances of data breaches wherein human error caused company information to be compromised. Human error is the reason behind 52 percent of security breaches, according to a new survey.2020-11-2502 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeStrengthening Enterprises' Security Posture Some Strategies2020 has been an unusual year riddled with unrest and uncertainty. Cyberattacks have been growing exponentially during this year. Reports of Denial-of-Service, phishing, and ransomware attacks appear to be everywhere. Some techniques to protect you and your company are outlined here.2020-11-2502 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeStrategies to Prevent Brute Force Attacks2020 has been an unusual year riddled with unrest and uncertainty. Cyberattacks have been growing exponentially during this year. Reports of Denial-of-Service, phishing, and ransomware attacks appear to be everywhere. Some techniques to protect you and your company are outlined here.2020-11-2503 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeStrategies to Prepare Against Cyberattacks2020 has been an unusual year riddled with unrest and uncertainty. Cyberattacks have been growing exponentially during this year. Reports of Denial-of-Service, phishing, and ransomware attacks appear to be everywhere. Some techniques to protect you and your company are outlined here.2020-11-2501 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeSteps To Improve Detection-Based SecurityMany security experts have moved from a stance of prevention to detection in today's IT environment, where device compromises are almost a regular occurrence. Instead of constructing higher walls in hopes of keeping them out, CISO's are more focused on using techniques to locate the attackers inside their walls.2020-11-2501 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeData Privacy And SoDAs part of organizational security assessments, application-level vulnerability testing typically requires an evaluation of the application's capacity to facilitate the segregation of duties. Specifically, tests are guided by regulatory criteria or enforcement, such as PCI-DSS, GDPR, HIPAA, or SOX.2020-11-1902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAttribute-Based Authentication The Way ForwardIn general, people do not want to retain complicated passwords; they seem tedious. It is indeed challenging to remember so many different passwords for numerous accounts that every user has. The few whose identities have been stolen in the past understand the significance of privacy and protection2020-11-1904 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAre your data privacy strategies readyOrganizations that use SAP ECC, PeopleSoft, S/4HANA, and Oracle EBS are likely to face additional compliance issues due to the inherent limitations of these legacy ERP systems. Let's look at a few approaches to strengthen the ERP systems to boost CCPA compliance and develop capabilities to prepare for the uncertainty concerning data privacy.2020-11-1902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAccess Governance Is Critical For Preventing Phishing AttacksThere has been quite an upsurge in instances of phishing attacks during the past few months. Cybercriminals, exploiting people's COVID-19 fears, are engaging in phishing and social engineering aimed at stealing user credentials to business applications and VPNs. Ultimately, the credentials used for authentication are the network perimeter of an organization. This puts companies in a challenging position - they can limit employee access to these programs and risk negative impacts on efficiency and business continuity, or they can hope that nothing terrible happens. Many prefer the latter, and worldwide, the consequences are being felt.2020-11-1903 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeABAC vs. RBAC A ComparisonABAC vs. RBAC: A ComparisonIn organizations, users of the network must be authenticated and authorized before accessing the system. This is especially the case for parts of the system capable of contributing to security breaches. Access control is a way of ensuring that users are who they say they are and that they have adequate access to company data. There are two key methods of controlling access for systems — role-based access control (RBAC) and attribute-based access control (ABAC)2020-11-1903 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeABAC and RBAC For SAP Dynamic AuthorizationIn identity and access management (IAM), Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC)are two types of authentication process control and SAP user authorization. Over the years, due to the rising complexity of access rules and the exponential number of staff accessing useful ERP data remotely, SAP's traditional RBAC approach has reached its limits2020-11-1902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant Challenge5 Remote Access Security RisksWith the COVID-19 pandemic forcing organizations worldwide to opt for remote work, not only do security teams face the universal obstacles posed by this crisis, but they also need to resolve particular hurdles, such as securing newly remote staff and avoiding malicious attacks against remote users. Here are the top security threats that teams must face, as well as best practices in technology to keep users and business data secure:2020-11-1902 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeCommon Causes of Security Breaches and Suggestions to Prevent ThemSecurity breaches are widespread today, frequently impacting organizations and users around the world adversely. Knowing the underlying incidents and injuries that cause these violations not only allows us to understand how they occur but also provides valuable knowledge to tackle this increasing danger2020-11-1701 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengePeopleSoft Data Security Incorporating Modern MeasuresThe point-to-point integration approach prevalent in most companies lacks versatility and does not handle changes vital to the success of organizations. Organizations, therefore, need to devise a plan for integration and ensure its use through data, devices, and systems. The introduction of centralized integration through an independent platform meets all enterprise integration needs.2020-11-0604 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeImprove SAP Access Policy Management with These Simple StepsThe increased user provisioning puts additional strain on the teams handling SAP policy management and IAM, which are already burdened with maintaining remote access to applications for people working from home.2020-11-0604 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeERP Security The Relevance of Context of User Access and Data Usage2020-11-0403 minUnderstanding Some Significant ChallengeUnderstanding Some Significant ChallengeAn Overview of Single Sign-On AuthenticationThe traditional login process has been replaced by Single Sign-On authentication (or SSO authentication), and the way people use the web has been completely transformed. It allows users to log in once, even across various domains, to access multiple apps, programs, and accounts.2020-11-0403 minThe PeopleSoft Administrator PodcastThe PeopleSoft Administrator Podcast#218 - 8.58 DPKThis week on the podcast, Kyle and Dan talk about the benefits of blogging for yourself, a fun SQL murder mystery game, and then they dive into the changes in the DPK for PeopleTools 8.58. Show Notes SQL Murder Mystery @ 2:30 HTML Compare Reports @ 7:30 Domain Name Changes @ 9:30 Opitmal Flexible Architecture PeopleTools 8.58 DPK @ 19:00 PIA Secure Admin Port Idea DPK Patch Repo psadmin.io DPK Modules Weblogic PORTAL.war App Server IB Gateway Appsian/ERP Firewall 2020-01-0335 min