Search
6 Ways Automated User Provisioning Ensures Compliance In PeopleSoft
Staying current with regulatory changes in a complex business landscape can be challenging for PeopleSoft teams but not impossible. While organizations are trying to keep pace, they often view compliance as a burden. This often leads to cracks in user provisioning that is foundational to complying with new regulations and internal policies. The key concern…
Achieving Digital Trust Across Your Business Applications
When consumers decide to use a company’s product or service, they are consciously or subconsciously confirming their digital trust in that organization to keep their data private and secure. Data security and data privacy are terms that the cybersecurity and infosec industries are familiar with, but perhaps you might not have heard much about digital…
Pathlock Reshapes the Access Governance Market with a Series of Strategic Mergers
Pathlock, the leading provider of access governance solutions for business applications, today announced a merger with Appsian, the leading provider of ERP data security solutions, and Security Weaver, the leading provider of governance, risk, and compliance management (GRCM) software for SAP. In addition to the mergers, the newly combined company, Pathlock, is announcing the acquisition…
Eight Key Investments For An Effective Data Privacy Risk Program
As a Certified Data Privacy Solution Engineer, I have led hundreds of data privacy risk assessment and remediation services across many industries. Maintaining effective data privacy can be challenging for organizations. According to the 2021 Thomson Reuters Regulatory Intelligence Cost of Compliance annual report, two of the top compliance challenges that organizations face each year…
3 Major Benefits Of Implementing Automated User Provisioning For JD Edwards
Increased compliance regulations and the rising number of internal threats have forced organizations to tighten application access and adopt the principle of least privilege. However, when ERP applications like JD Edwards have thousands of users accessing them to perform their daily tasks, managing user access requests while adhering to compliance requirements can be challenging. The…
How To Simplify Your JD Edwards Access Reviews
What Is A Periodic Access Review? Access review or recertification is an IT General Control procedure that involves auditing all user access roles, privileges, and combinations of roles to determine if they are correct and adhere to the organization’s internal policies and compliance regulations. Most organizations only perform this audit of user access once a…
[Appsian Insights] Using Internal Controls to Ensure Data Security and Audit Readiness
Appsian’s Vice President of Product Strategy & Customer Experience, David Vincent, appears in the latest episode of the Business Class News podcast. The wide-ranging conversation between David and host Karl Woolfenden covered the threats of cyber-attacks on businesses, which is clearly a priority. They also discuss the ever-increasing pressures to protect data brought about by…
3 Key Steps To Prevent Fraud In Your JD Edwards EnterpriseOne
When you have a few hundred or maybe thousands of users logging into your JD Edwards EnterpriseOne applications – many of them handling critical financial data and transactions – fraud prevention measures are necessary. Here are three key steps you can implement to identify and prevent fraud in your JD Edwards EnterpriseOne applications. Step 1:…