Schedule Demo

Search

Search page

Unpacking China’s New Data Security Law And Privacy Legal Framework

If you’re a multinational enterprise (MNE) that does business in or with China, you’re likely aware of the Data Security Law (DSL) that went into effect on September 1, 2021. The DSL adds to an increasingly comprehensive legal framework for information and data security in China. The law also imposes extensive data processing requirements and…

SAP Access Management: Automating And Centralizing The Identity Lifecycle

If you do an internet search for the most common cause of data breaches, you’re going to get a variety of answers: ransomware, phishing attacks, stolen credentials, insider activity, etc. While these types of cyberattacks lead to data breaches, there is one simple truth ERP customers can never overlook: data breaches are caused by unauthorized…

3 Critical SAP Risks To Prioritize In A Dynamic Business Environment

SAP applications are the backbone of business operations across the world. They improve efficiency and help your business grow. But are they equipped to protect your business and data? The risk landscape is constantly evolving, with users working remotely and using personal devices to access enterprise SAP applications. Since SAP is a critical business application…

[Customer Story] How ProfileTailor GRC Helped Global Shipping Leader, ZIM, Streamline Segregation Of Duties And Authorizations in SAP

ZIM Integrated Shipping Services Ltd., commonly known as ZIM, is a publicly held Israeli global container liner shipping company. The company operates over 100 management systems spread across the company’s global offices. Each system has multiple users running numerous applications, all consisting of different authorization systems. This scattered approach eventually led to siloed teams operating…

Solving Complex Security Challenges with Dynamic SAP Data Masking

It’s been a period of unprecedented change and adaptation for organizations of all sizes and in every industry over the past 18 months. During this time, I’ve had the opportunity to speak with many of our SAP customers about how they are managing their business risks and protecting their sensitive data. While the topics vary,…

Access Governance to Secure SAP and Other Business Applications  

With sensitive data residing in SAP and other business-critical applications, users with access to these applications pose one of the biggest inherent security risks. As employees, contractors, vendors and customers access business applications to perform their routine and firefighter activities, they could intentionally or accidentally pose a threat to business continuity. In addition, as the…

What CXOs Need To Know: Economic Recovery Is Not An End To Disruption

Around the world, business leaders are all asking themselves the same question: Is there light at the end of the tunnel? If you ask top executives at the top global companies, they’d say yes. But does economic recovery mean a welcome sigh of relief and smooth sailing after a year of challenges? CXOs are gaining…

Pathlock Named to Inc. 5000 List After Notable Expansion

Flemington, New Jersey, Aug. 24, 2021 — Pathlock, the leading provider of unified access orchestration, has been recognized among the fastest-growing private companies in America. The Inc. 5000 list is a distinguished editorial award, celebrating thriving and innovative private companies throughout America. Pathlock was recognized for their 80% overall growth over a three-year period. This…

How To Reduce SoD Conflicts In SAP For Effective SOX Compliance

With several large public companies deploying SAP applications for their financial and accounting operations, ensuring SOX compliance within the SAP ecosystem is crucial for a successful audit. Segregation of Duties (SoD) in SAP plays an important role in managing roles and authorizations among SAP users to prevent conflicts and mitigate the risk of fraud. However,…