Schedule Demo

Search

Search page

Pathlock How-To: Easily Identify & Explore User-Level SoD Violations In Oracle EBS

Automation is simplifying Segregation of Duties. In this video demonstration, you can see how Pathlock can identify, explore, and resolve SoD violations in Oracle EBS and beyond. Leveraging user behavior profiling and actual usage data, Pathlock turns the complex task of managing SoD into something you can handle with ease. About Pathlock Pathlock helps you…

Pathlock How-To: Easily Identify & Explore User-Level SoD Violations In Oracle EBS

Automation is simplifying Segregation of Duties. In this video demonstration, you can see how Pathlock can identify, explore, and resolve SoD violations in Oracle EBS and beyond. Leveraging user behavior profiling and actual usage data, Pathlock turns the complex task of managing SoD into something you can handle with ease. About Pathlock Pathlock helps you…

Uniting Q Software & Appsian Security: Thoughts From Q Software CEO, Mike Ward

Taken from Mike Ward’s original November 3rd blog post on www.qsoftware.com: For years, Q Software has worked closely with our customers to provide the strongest set of GRC, security, and audit tools available for the Oracle market. To continuously increase value for our customers, we are always striving to make strategic improvements to our products…

3 Essential Capabilities You Need To Modernize Your ERP Security And Compliance

The fundamental goal of information security has long been to effectively maintain confidentiality, integrity, and availability. Confidentiality ensures that information is only accessed by authorized personnel requiring such access to complete their job. Integrity involves protection from unauthorized modifications of data. Availability ensures that systems and data are available to be used when needed. Organizations…

Material Weakness Series Part 3: Ineffective Transaction Level Controls

In the previous article of this series, we talked about data field-level controls and how you can resolve a data field-level control weakness with security best practices. This article goes one level deeper from ERP data fields to ERP transactions. Sensitive transactions like approving payments, adding vendors, and modifying contracts have a direct impact on…

Material Weakness Series Part 1: Ineffective Access Controls

This is the first article of a multi-part series featuring material weaknesses. Each piece will focus on one critical internal control weakness and provide solutions on how to resolve the weakness with granular security controls. The purpose of an independent audit of a company’s financial reports, called a Financial Statement Audit, is to form an…

6 Warning Signs Of Potential Insider Threat Activity And How To Detect Them

Data breaches caused by ransomware attacks, phishing scams, and state-sponsored hacker groups tend to grab the headlines. However, the reality is that insider threat activity causes 60% of these breaches. Moreover, while these threats are becoming more frequent – up 47% over the latest two-year period – and costly to organizations, it still takes organizations…