Schedule Demo

Search

Search page

3 Key SAP Cloud Security Trends from the SAPinsider Benchmark Report

The latest edition of the SAPinsider benchmark report released recently turns its focus towards cloud security trends. With several SAP customers either in the process of migrating to S/4 HANA Cloud or putting it in their future roadmap, cloud security is gaining greater significance. The report puts out some key insights into how SAP customers…

5 Best Practices for Expanding User Access Reviews Across Your Applications

User access reviews are often a tedious, manual exercise that organizations must undertake on a regular basis. While it is important from a compliance and risk perspective, going through the access recertification cycle using spreadsheets and email exchanges can be time-consuming and error-prone, especially in a multi-application environment. While some applications like SAP or Oracle…

Pathlock Expands Leadership Team with Appointment of Damon Tompkins as CRO to Fuel Next Stage of Growth

Pathlock, the leading provider of application security and controls automation for critical business applications, today announced the appointment of Damon Tompkins as the company’s Chief Revenue Officer. Tompkins joins the team with 25 years of experience in the technology industry where he has a proven track record of successfully building and leading high-performance sales teams…

Migrating to S/4HANA: How Automation Can Simplify Your SAP Role Re-design Project

Roles are the foundation of SAP access, and any organization with SAP applications knows that roles pile up over time and become increasingly complicated to manage. With constant changes occurring within the organization and regular requests coming from the business for access modifications, IT is left struggling to keep track of new and existing roles….

7 Application Security Vulnerabilities and Defensive Strategies

What Are Application Security Vulnerabilities? An application security vulnerability is a flaw that exposes an application to a cyberattack. Vulnerabilities often result from poor coding practices, neglecting security responsibilities, human error, and unpatched software. Web applications are especially susceptible to cybersecurity vulnerabilities, given their exposure to the public Internet. Attacks can exploit various vectors, so…