Search
[Video] Best Practice Tips For Designing Compensating Controls In ERP Systems
Organizations use Segregation of Duties (SoD) to reduce the risk of fraud, operational errors, misuse of information, and other security concerns. However, resource limitations, such as technical or staffing constraints, mean that it’s not always possible to achieve perfect SoD. When that happens, organizations turn to compensating controls to mitigate those risks. In this edition…
[Video] Best Practice Tips For Audit Reporting In ERP Systems
Raise your hand if you’re looking forward to your next audit. Anybody? An audit can be a very stressful experience. Even if YOU feel reasonably confident about the process, your team might not and end up spending a lot of time scrambling to find evidence that either doesn’t exist or is difficult to retrieve. One…
[Video] Best Practices For ERP Data Privacy
Your organization is likely using an ERP system (or more than one) such as PeopleSoft, SAP ECC, S/4HANA, Oracle E-Business Suite, and JD Edwards. You are probably facing significant compliance challenges due to the growing number of data privacy and compliance regulations and the inherent limitations of these ERP systems. In this edition of the…
[Video] Best Practice Tips For Role Design In ERP Systems
A well-designed and well-executed role structure is the cornerstone of an efficient, sustainable security model in your ERP system. Poor role design makes security difficult to manage and can have a negative impact on application performance. This creates more work for your technical staff as they need to spend time resolving support calls on access…
Insider Threat: Types, Examples, Detection, and Prevention
Insider Threat Definition An insider threat is a security threat from within the organization being targeted or attacked, typically by an officer or employee of an organization with privileged access. An insider threat can also be a board member, former employee, or anyone who at one point had access to confidential or proprietary information at…
Azure AD Application Proxy: Workflow and Best Practices
What Is Azure AD Application Proxy? Azure Active Directory (AD) offers an Application Proxy feature that lets you access on-prem web applications using a remote client. It consists of two main components: The service and connector interact to securely transmit user sign-on tokens from Azure AD to a web application. Here are several use cases…
Azure AD Premium: Features and License Structure
What is Azure AD Premium? Microsoft Azure Active Directory (AD) is a cloud software, building upon the popular on-premises Active Directory product. Azure AD provides the same security features as the traditional Active Directory, and can be used to manage access to cloud resources, or in tandem with on-premise AD, to enable a hybrid domain…
Azure AD Identity Protection: Eliminating Identity Risk
What is Azure AD Identity Protection? Identity Protection can automatically detect and remediate identity-based risks. It is a tool provided as a feature of Azure Active Directory (AD) available with the paid Premium edition, license P2. Microsoft supplies this tool with learnings acquired from Azure AD and Microsoft Accounts. Microsoft analyses over 6 trillion signals…
What is SOX Compliance in 2025? Complete Guide
What is SOX Compliance in 2025? SOX compliance is a set of financial control requirements designed to ensure the accuracy and reliability of financial statements of public companies, preventing fraud and protecting investors. A more descriptive definition for SOX Compliance in 2025 could be: SOX compliance refers to the requirements set by the Sarbanes-Oxley Act…