Search
Detect And Prevent Fraud At The Transaction Level With Adaptive Authentication
According to PwC’s Global Economic Crime and Fraud Survey 2020, 47% of companies experienced fraud in the past 24 months. The survey found that the most common types of fraud were cybercrime, customer fraud, and asset misappropriation. The total cost of these crimes reached a staggering $42 Billion. Considering that most large enterprises deploy ERP…
How To Handle Expiring SAP User Role Assignments
There are many reasons why SAP customers need to provide temporary access to their applications. These include short-term contractors or consultants, backup access when an employee is on vacation or suffering a long-term illness or disability, and emergency access scenarios. Regardless of the reason, organizations often encounter a common challenge: temporary SAP user role assignments…
7 Essential Capabilities To Consider When Evaluating ERP Security, Risk, And Compliance Solutions
Organizations looking to secure their ERP’s security defenses are often required to sort through vendor claims of features that are unique to their solution (i.e., leading-edge, disruptive, or other catchy buzz words). Rather than focusing on features and marketing buzz words, organizations should first create a prioritized list of their requirements that covers ERP security,…
[Customer Story] How Pathlock Implemented Dynamic Data Masking To Help The State Of Kansas Secure Sensitive PeopleSoft Data
Like most state governments, the State of Kansas wanted employees and non-employees to access PeopleSoft self-service within and outside the corporate network. They encountered a common challenge: How do they roll out PeopleSoft self-service to a massive audience while still protecting their data and addressing compliance risks. To fortify their PeopleSoft environment and secure remote…
Cloud Governance: 6 Essential Components
What Is Cloud Governance? Cloud governance refers to policies and rules that organizations adopt to manage the services they run in the cloud. Cloud governance aims to improve data security, enable cloud systems to operate smoothly, and manage cloud-related risk. In larger organizations, it is typically part of a large governance, risk and compliance (GRC)…
Build Your Insider Threat Program: A Practical Guide
What Is an Insider Threat Program? An insider threat is when an individual with privileged access to an organization’s critical applications and sensitive information takes measures—on purpose or inadvertently—that leave the organization open to threat. Because of their privileged status and authorized access to the organization’s resources, such insiders present a sizable risk to corporate…
GRC vs. IRM: Elements and 3 Key Differences
What is Governance, Risk Management and Compliance (GRC)? Governance, Risk, and Compliance (GRC) is an organizational strategy that creates one organizational function handling governance, corporate risk management, and compliance with regulations and industry standards. GRC has also come to refer to an integrated suite of software functions used to implement and manage corporate GRC programs….
What is SOX Compliance in 2025? Complete Guide
What is SOX Compliance in 2025? SOX compliance is a set of financial control requirements designed to ensure the accuracy and reliability of financial statements of public companies, preventing fraud and protecting investors. A more descriptive definition for SOX Compliance in 2025 could be: SOX compliance refers to the requirements set by the Sarbanes-Oxley Act…
[Video] Best Practice Tips For Role Design In ERP Systems
A well-designed and well-executed role structure is the cornerstone of an efficient, sustainable security model in your ERP system. Poor role design makes security difficult to manage and can have a negative impact on application performance. This creates more work for your technical staff as they need to spend time resolving support calls on access…