Search
Uniting Q Software & Appsian Security: Thoughts From Q Software CEO, Mike Ward
Taken from Mike Ward’s original November 3rd blog post on www.qsoftware.com: For years, Q Software has worked closely with our customers to provide the strongest set of GRC, security, and audit tools available for the Oracle market. To continuously increase value for our customers, we are always striving to make strategic improvements to our products…
Pathlock How-To: Easily Identify & Explore User-Level SoD Violations In Oracle EBS
Automation is simplifying Segregation of Duties. In this video demonstration, you can see how Pathlock can identify, explore, and resolve SoD violations in Oracle EBS and beyond. Leveraging user behavior profiling and actual usage data, Pathlock turns the complex task of managing SoD into something you can handle with ease. About Pathlock Pathlock helps you…
Pathlock How-To: Easily Identify & Explore User-Level SoD Violations In Oracle EBS
Automation is simplifying Segregation of Duties. In this video demonstration, you can see how Pathlock can identify, explore, and resolve SoD violations in Oracle EBS and beyond. Leveraging user behavior profiling and actual usage data, Pathlock turns the complex task of managing SoD into something you can handle with ease. About Pathlock Pathlock helps you…
Why Role-Based Access Control Is Not Enough For Effective Policy Management
A policy is a deliverable from the governance function created by senior executives to establish measurable guidelines and expectations for the effective performance of all security, risk, and compliance activities. Policies are often captured into a Microsoft Word document and distributed to the responsible managers to ensure they understand the policy and will comply. The…
What Is Continuous Adaptive Risk And Trust Assessment (CARTA) And Why You Can’t Depend On Just RBAC Anymore
Organizations rely on the static, role-based access control (RBAC) security model that came with most ERP applications to safeguard their systems and data, enable effective governance and oversight of access management, and support effective threat detection and response capabilities. However, Gartner recommends organizations move away from the static RBAC security model to adaptive security enabled…
Pathlock How-To: Enforce Transaction Level Policy Controls In SAP
The typical business application’s role-based access control (RBAC) security model provides poor dynamic transaction level policy control enforcement. In this video demonstration, you’ll see how to enforce transaction level controls in SAP using attribute-based access controls(ABAC). You’ll also see how Pathlock’s analytics platform, Appsian360, allows you to monitor user behavior around those transactions and spot deviations from…
Pathlock How-To: Enforce Transaction Level Policy Controls In SAP
The typical business application’s role-based access control (RBAC) security model provides poor dynamic transaction level policy control enforcement. In this video demonstration, you’ll see how to enforce transaction level controls in SAP using attribute-based access controls(ABAC). You’ll also see how Pathlock’s analytics platform, Appsian360, allows you to monitor user behavior around those transactions and spot deviations from…
How Step-Up Authentication Protects Access To Sensitive Data
Protecting and maintaining the integrity of data, especially sensitive data, is one of the core objectives of any security strategy. Since a majority of this data is stored and accessed using ERP applications, access to ERPs presents a significant risk to data security. To mitigate this risk, organizations have been deploying multi-factor authentication (MFA). While MFA…
[ERP Market Insights] A Closer Look At The Adaptive Security Model
This is the online edition of the ERP Market Insights Newsletter by David Vincent. Agility is the name of the game in today’s ERP data security landscape. Being able to continuously monitor and detect anomalies and threats as they happen and quickly respond with an effective mitigation action is critical to maintaining a security posture. However, getting…