Search
Why SAP Threat Detection Remains a Challenge and How Pathlock Can Help
SAP systems often serve as the backbone of an enterprise’s business processes. They enable access to sensitive data and critical processes that have a direct financial impact on the business, making them prime targets for intruders to gain undetected access. While several threat detection solutions are available, the sheer scale and complexity of SAP applications…
Securing Your SAP Systems: Essential Takeaways from the 2023 Cybersecurity Threats Report
Pathlock is pleased to announce the release of the 2023 edition of The Cybersecurity Threats to SAP Systems Benchmark Report by SAPinsider (Pathlock is the sponsor of the report). SAPinsider recently surveyed its community members to understand the major cybersecurity threats they face, the challenges they encounter when addressing these threats, and their strategies for…
Achieve Robust Cross-Application Access Governance with Pathlock AAG
Managing user identities and access is becoming increasingly complex for businesses in today’s digital landscape. With multiple ERP and business applications, each housing its own set of user identities, security, and compliance teams face the daunting task of managing identities and accesses with a fragmented view. This complexity poses significant challenges in tracking cross-application access…
[Video] How to Automate and Streamline Your PeopleSoft HCM User Provisioning Processes
If you’re a PeopleSoft HCM customer, you’re typically driving much of your company’s provisioning and de-provisioning processes. This includes onboarding new and offboarding departing employees. In addition, there are all the steps to take when somebody gets a new job or responsibility. Actions like what changes in their access need to take place? And what…
Pathlock CEO Piyush Pandey on Reshaping Application Access Governance: Insights from KuppingerCole Reports
The IT industry is currently experiencing a significant shift in priorities and focus on access tools. Enterprises are not just migrating essential functions to the cloud but also transitioning their point solutions to this digital domain. However, businesses require access tools that offer extensive visibility and control over multiple line-of-business applications. KuppingerCole’s Leadership Compass reports…
SAP Password Cracking Exploits: How to Secure User Access with Pathlock
When it comes to SAP security, following password best practices is essential to ensure secure user access and prevent unauthorized permissions. However, cyber attackers frequently target SAP systems with constantly evolving tactics, and detecting breaches stemming from password-cracking exploits is difficult, as SAP-native change logs are insufficient and manually validating user permissions is time-consuming. As…
PeopleSoft SSO: Why You Should Avoid Customizing to Enable SAML
Don’t Risk the Security of your Data with Customized SSO SAML/ADFS Integration for PeopleSoft On a recent discovery call, a Senior Software Engineer shared how they’re “ripping out” a custom-built PeopleSoft single sign-on solution (SSO). After acquiring an enterprise SSO, they attempted to build a custom integration with PeopleSoft that presented far more challenges than…
SEC Releases Final Rules for Cybersecurity Incident Disclosure: Here’s What You Need to Know!
On July 26, 2023, the Securities and Exchange Commission (SEC) unveiled its final regulation concerning Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure (PDF). This rule was developed to address concerns regarding the accessibility of prompt and consistent information regarding cybersecurity for investors. The escalating and persistent threat of cybersecurity incidents to public companies, investors,…
Role Adjustments for Technical SAP Users – How to Handle SAP Authorizations Safely and Effectively
Technical SAP users with extensive authorizations like SAP_ALL pose a heightened security risk. Vulnerabilities can endanger interfaces and paralyze processes, so external auditors are intensifying their focus on authorization management. Let’s look at how we helped one of our customers – a company in the energy sector – who was facing the challenge of having…