Schedule Demo

Search

Search page

Top 5 SAP HANA Security Features

What is SAP HANA Security? SAP HANA is an in-memory database for real-time processing and querying high volumes of data. HANA’s in-memory computing database infrastructure eliminates the need to load or write data back. It is a popular database that often stores sensitive corporate information that requires protection and compliance controls. Securing HANA is a…

SAPinsider Cybersecurity Threats Report: Key Insights Part 3 | Real-Time Monitoring

In part two of this three-part blog series, we discussed how identifying and cleaning up risky code can help mitigate risk across your SAP systems. This blog looks at the third key insight from the SAPinsider Cybersecurity Threats benchmark report that emphasizes real-time security monitoring and audits. Part 3: Key Insight | Real-time Monitoring is…

Why PeopleSoft Process Automation Is Fundamental To Security And Compliance 

Today’s distributed businesses need solutions to mitigate the risks of diverse access to PeopleSoft applications. Organizations have discovered that the outdated, manual ways of designing and managing controls are inadequate for addressing dynamic risks. As various employees (on-site and remote) and third-party vendor systems require access, PeopleSoft customers face challenges in protecting critical data and…

SAPinsider Cybersecurity Threats Report: Key Insights Part 2

While the key finding in part one of this SAP insider series discussed how to keep your SAP landscape properly patched and configured, part two, in our three-part series, is about the risks ABAP custom code creates across SAP landscapes and how to address that risk. Part 2: Key Insight | SAP Custom Code is…

SAPinsider Cybersecurity Threats Report: Key Insights Part 1

The recently published SAPinsider Cybersecurity Threats to SAP Systems benchmark report reveals some insightful SAP security trends. While many of the traditional security concerns remain, the changing threat landscape has shifted priorities and is impacting strategic decision-making when it comes to protecting SAP data. In this three-part article series, we’ll discuss the key findings of…

Pathlock and SAPinsider Release The Cybersecurity Threats to SAP Systems Benchmark Report

Pathlock is pleased to announce the release of The Cybersecurity Threats to SAP Systems Benchmark Report by SAPinsider (Pathlock is a co-sponsor of the report). SAPinsider recently surveyed members of its community to understand what they see as the biggest cybersecurity threats facing their SAP environments, what challenges they face in addressing those threats, and…

Pathlock Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2022

Pathlock, the leading provider of access orchestration and application security for critical business applications, is proud to be announced the Market Leader for Zero Trust from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. “We’re thrilled to receive one of the most prestigious and coveted awards from Cyber Defense Magazine during their…

NIST Cybersecurity Framework Executive Summary And Overview

As cyberattacks across the world increase in frequency and sophistication, companies are constantly working to improve detection capabilities, discover hidden vulnerabilities, and implement security strategies to counter modern attacks. In an effort to help government departments and private organizations improve their cybersecurity measures, the National Institute of Standards and Technology (NIST) published a set of…

MFA Is A “Critical Security Baseline” For Your Zero Trust Strategy

Following up on last year’s Executive Order to help improve the nation’s cybersecurity posture, the White House released a 30-page zero-trust strategy document outlining several measures federal agencies must enact to secure systems and limit the risk of security incidents. The White House noted that the growing threat of sophisticated cyberattacks (for example, SolarWinds, ransomware,…