Search
7 Essential Capabilities To Consider When Evaluating ERP Security, Risk, And Compliance Solutions
Organizations looking to secure their ERP’s security defenses are often required to sort through vendor claims of features that are unique to their solution (i.e., leading-edge, disruptive, or other catchy buzz words). Rather than focusing on features and marketing buzz words, organizations should first create a prioritized list of their requirements that covers ERP security,…
How To Handle Expiring SAP User Role Assignments
There are many reasons why SAP customers need to provide temporary access to their applications. These include short-term contractors or consultants, backup access when an employee is on vacation or suffering a long-term illness or disability, and emergency access scenarios. Regardless of the reason, organizations often encounter a common challenge: temporary SAP user role assignments…
Detect And Prevent Fraud At The Transaction Level With Adaptive Authentication
According to PwC’s Global Economic Crime and Fraud Survey 2020, 47% of companies experienced fraud in the past 24 months. The survey found that the most common types of fraud were cybercrime, customer fraud, and asset misappropriation. The total cost of these crimes reached a staggering $42 Billion. Considering that most large enterprises deploy ERP…
[ERP Market Insights] A Closer Look At The Adaptive Security Model
This is the online edition of the ERP Market Insights Newsletter by David Vincent. Agility is the name of the game in today’s ERP data security landscape. Being able to continuously monitor and detect anomalies and threats as they happen and quickly respond with an effective mitigation action is critical to maintaining a security posture. However, getting…
How Step-Up Authentication Protects Access To Sensitive Data
Protecting and maintaining the integrity of data, especially sensitive data, is one of the core objectives of any security strategy. Since a majority of this data is stored and accessed using ERP applications, access to ERPs presents a significant risk to data security. To mitigate this risk, organizations have been deploying multi-factor authentication (MFA). While MFA…
Pathlock How-To: Enforce Transaction Level Policy Controls In SAP
The typical business application’s role-based access control (RBAC) security model provides poor dynamic transaction level policy control enforcement. In this video demonstration, you’ll see how to enforce transaction level controls in SAP using attribute-based access controls(ABAC). You’ll also see how Pathlock’s analytics platform, Appsian360, allows you to monitor user behavior around those transactions and spot deviations from…
Pathlock How-To: Enforce Transaction Level Policy Controls In SAP
The typical business application’s role-based access control (RBAC) security model provides poor dynamic transaction level policy control enforcement. In this video demonstration, you’ll see how to enforce transaction level controls in SAP using attribute-based access controls(ABAC). You’ll also see how Pathlock’s analytics platform, Appsian360, allows you to monitor user behavior around those transactions and spot deviations from…
What Is Continuous Adaptive Risk And Trust Assessment (CARTA) And Why You Can’t Depend On Just RBAC Anymore
Organizations rely on the static, role-based access control (RBAC) security model that came with most ERP applications to safeguard their systems and data, enable effective governance and oversight of access management, and support effective threat detection and response capabilities. However, Gartner recommends organizations move away from the static RBAC security model to adaptive security enabled…