Request A demo
  • Types

  • Categories

Not seeing your application?

No problem! We are building new integrations all the time, and this list is constantly growing. Contact us to see if Pathlock can support your desired application(s).

Request a new integration

Resources Explore Our Thought Leadership Content

Learn more about our perspective and how Pathlock is combining application security and controls automation to create a first-of-its-kind solution for the world’s leading enterprises.

On-Demand Webinar [Webinar] Comprehensive Risk Analysis for JD Edwards EnterpriseOne: It’s Not Just About SOD
Governance, Risk, and Compliance (GRC)
Getting accurate and reliable information on your SOD violations can be difficult enough – but when you succeed, the results can be overwhelming. How can you break the results down into manageable chunks and allocate them to the appropriate person to assess the impact and decide what needs to be done? And what else should...
[Webinar] Comprehensive Risk Analysis for JD Edwards EnterpriseOne: It’s Not Just About SOD
On-Demand Webinar [Webinar] 3 Ways to Streamline SoD Control Monitoring in Your SAP Landscape
Governance, Risk, and Compliance (GRC)
The proliferation of cross-app business processes has shifted how organizations must address segregation of duties. Various security models, differing app-to-app, and siloed logs pose a unique challenge. How do you normalize user entitlements and activity? In this session, see how Adsotech and Pathlock partner to help translate cross-app business activities, identifies SoD conflicts across apps,...
[Webinar] 3 Ways to Streamline SoD Control Monitoring in Your SAP Landscape
On-Demand Webinar [Webinar] Why Streamlining Role Management & Design Can Fix Your Security Issues During an S/4 HANA Migration
S/4HANA
Every organization using SAP must move to S/4HANA. So how do you make the transition as smooth as possible for your organization? Many organizations take this change as an opportunity to solve problems within their current SAP security. Adding in new transaction codes and authorization objects, while removing obsolete transaction codes from your security roles...
[Webinar] Why Streamlining Role Management & Design Can Fix Your Security Issues During an S/4 HANA Migration
On-Demand Webinar [Webinar] How to Achieve Efficient, Compliant User Provisioning in JD Edwards EnterpriseOne
Access Governance
Access Governance
Do you need to streamline your User Provisioning processes? Join us at this webinar to find out how User Admin Manager can help you to: Presenter: Preston Leftwich Project & Technical Manager Pathlock
[Webinar] How to Achieve Efficient, Compliant User Provisioning in JD Edwards EnterpriseOne
On-Demand Webinar [Webinar] How to Gain Efficiencies with Your SOD Analysis
Governance, Risk, and Compliance (GRC)
Are inefficiencies within your SAP SoD processes causing your organization extra money? There are inefficiencies built into most SAP Segregation of Duties (SoD) processes. These issues often include higher support costs, lost business productivity and increased security risks to SAP. So how do you overcome these inefficiencies? All SAP SoD solutions come with an out...
[Webinar] How to Gain Efficiencies with Your SOD Analysis
On-Demand Webinar [Webinar] How to Go Beyond Simple Role-Based Control Through Data Masking
Access Governance
Application Data Security
Access Governance
Many organizations are facing greater regulatory mandates to protect sensitive data as well as coming under attack at a more frequent rate. With all of this, attribute-based access controls (ABAC) are necessary, but not always sufficient. Join Pathlock and Adsotech for a webinar that talks about how to simultaneously increase security, agility, and efficiency in...
[Webinar] How to Go Beyond Simple Role-Based Control Through Data Masking
On-Demand Webinar [Webinar] Automating Access Governance in PeopleSoft for Higher Education
Access Governance
How do you save time when trying to on-board students? Every calendar year, universities and colleges across the world have to onboard and offboard thousands of users into/from PeopleSoft. Managing this process of granting appropriate levels of access, creating accounts, and periodically certifying access has traditionally been manual as well as a time-intensive task for...
[Webinar] Automating Access Governance in PeopleSoft for Higher Education
On-Demand Webinar [Webinar] Dynamic Data Masking for Oracle E-Business Suite: How to Take Control of Who Sees What
Application Data Security
Your Oracle EBS applications contain a lot of sensitive data, which needs to be protected from accidental disclosure. Data Masking enables you to show that data items exist without revealing the values. But there are many situations where protected data needs to be visible to authorized users, depending on the context in which it is...
[Webinar] Dynamic Data Masking for Oracle E-Business Suite: How to Take Control of Who Sees What
On-Demand Video [Webinar] Expand Data Masking in PeopleSoft for Stronger Data Privacy Compliance
Application Data Security
Now more than ever, the protection of personally identifiable information (PII) is an enterprise-wide objective. Regulations like GDPR, CCPA, FERPA and more have turned the use and storage of PII into a liability – forcing organizations to re-evaluate how they keep PII from being unnecessarily accessed and potentially exfiltrated. For systems like PeopleSoft, using native...
[Webinar] Expand Data Masking in PeopleSoft for Stronger Data Privacy Compliance
Gradient

Find Out How Pathlock Can Help You Secure Your Business Applications

No matter where you are on the journey to automating your controls, enforcing application security, or ensuring compliance, Pathlock is here to help you. Our audit and security experts have decades of experience working for and with the world's largest organizations.