Search
Total Guide to Enterprise Risk Management in 2021
Any meaningful endeavor is always accompanied by risk, and running a business is no exception. 40 years ago, the only industries that actively managed risk were banking and manufacturing. But in the last two decades, the nature, speed, and sophistication of both internal and external threats have increased dramatically. Much of this can be credited…
How Remote Work Has Accelerated ERP Data Privacy Challenges
If 2020 was the year of hastily enabling secure remote access to ERP applications, then 2021 will be the year when organizations realize that remote ERP access is here to stay – and long-term data privacy, security, and access governance strategies will be mission–critical. Securing ERP data has always been important in principle, but the…
[Podcast] Potential ERP Data Security And Compliance Risks For Legacy Applications
Appsian’s Executive Director for Security Solutions, Greg Wendt, appears in the latest episode of Brilliance Security Magazine Podcast. The focus of the conversation between Greg and host Steven Bowcut is legacy ERP data security and compliance. Their wide-ranging conversation also includes some of the potential security risks associated with legacy applications, what companies can do to protect sensitive…
10 Cream-of-the-Crop IAM (Identity and Access Management) Software Solutions in 2021
Are you looking for an Identity and Access Management (IAM) solution? You’re spoiled for choices. With the IAM market expected to hit +$24 billion by 2025, vendors are eager to create Identity and Access Management solutions to meet modern security needs. In fact, there are well over a hundred Identity and Access Management solutions with…
The 19 Best SOX Compliance Software Solutions
The Sarbanes-Oxley Act of 2002 (SOX) was designed to protect investors from fraudulent accounting practices at public corporations. While a win for investors, the act created an increased regulatory burden on businesses, requiring strict protections to guard against fraud. Because the cost of non-compliance with SOX can be high (e.g., reputational damage, stock drop, remediation…
5 Types Of Insider Threats And How To Detect Them In Your ERP System
While the majority of data breaches are from insider threats—a startling 57% according to the Verizon Insider Threat Report—many organizations overlook these internal dangers. Whether careless or malicious, employee, partner, or contractor, insider threats are difficult to spot and often go undetected in your ERP system for months or years. Insider threats can be particularly…
Securing Business Data In ERP Applications: A Fast Path Guide To Success
With 2020 coming to a close, ensuring business applications are equipped to meet the longterm access demands of 2021 is a critical objective. All around the world, information security and financial risk leaders are being tasked with ensuring the security of business data while remote access (on unknown networks and devices) remains the standard for…
Why The California Privacy Rights Act (CPRA) Presents Challenges For Legacy ERP Customers
While nearly everyone was focusing on the results of the 2020 Presidential race, California voters passed Proposition 24, the California Privacy Rights Act (CPRA) (full text here). You might be wondering if this is a new privacy law that will replace the 2018 California Consumer Privacy Act (CCPA), which went into effect earlier this year….