Schedule Demo

Search

Search page

GRC vs. IRM: Elements and 3 Key Differences

What is Governance, Risk Management and Compliance (GRC)? Governance, Risk, and Compliance (GRC) is an organizational strategy that creates one organizational function handling governance, corporate risk management, and compliance with regulations and industry standards. GRC has also come to refer to an integrated suite of software functions used to implement and manage corporate GRC programs….

Build Your Insider Threat Program: A Practical Guide

What Is an Insider Threat Program? An insider threat is when an individual with privileged access to an organization’s critical applications and sensitive information takes measures—on purpose or inadvertently—that leave the organization open to threat. Because of their privileged status and authorized access to the organization’s resources, such insiders present a sizable risk to corporate…

Cloud Governance: 6 Essential Components

What Is Cloud Governance? Cloud governance refers to policies and rules that organizations adopt to manage the services they run in the cloud. Cloud governance aims to improve data security, enable cloud systems to operate smoothly, and manage cloud-related risk. In larger organizations, it is typically part of a large governance, risk and compliance (GRC)…

[Customer Story] How Pathlock Implemented Dynamic Data Masking To Help The State Of Kansas Secure Sensitive PeopleSoft Data

Like most state governments, the State of Kansas wanted employees and non-employees to access PeopleSoft self-service within and outside the corporate network. They encountered a common challenge: How do they roll out PeopleSoft self-service to a massive audience while still protecting their data and addressing compliance risks. To fortify their PeopleSoft environment and secure remote…

7 Essential Capabilities To Consider When Evaluating ERP Security, Risk, And Compliance Solutions

Organizations looking to secure their ERP’s security defenses are often required to sort through vendor claims of features that are unique to their solution (i.e., leading-edge, disruptive, or other catchy buzz words). Rather than focusing on features and marketing buzz words, organizations should first create a prioritized list of their requirements that covers ERP security,…

How To Handle Expiring SAP User Role Assignments

There are many reasons why SAP customers need to provide temporary access to their applications. These include short-term contractors or consultants, backup access when an employee is on vacation or suffering a long-term illness or disability, and emergency access scenarios. Regardless of the reason, organizations often encounter a common challenge: temporary SAP user role assignments…

Detect And Prevent Fraud At The Transaction Level With Adaptive Authentication

According to PwC’s Global Economic Crime and Fraud Survey 2020, 47% of companies experienced fraud in the past 24 months. The survey found that the most common types of fraud were cybercrime, customer fraud, and asset misappropriation. The total cost of these crimes reached a staggering $42 Billion. Considering that most large enterprises deploy ERP…

[ERP Market Insights] A Closer Look At The Adaptive Security Model

This is the online edition of the ERP Market Insights Newsletter by David Vincent. Agility is the name of the game in today’s ERP data security landscape. Being able to continuously monitor and detect anomalies and threats as they happen and quickly respond with an effective mitigation action is critical to maintaining a security posture. However, getting…