Search
Packets and Logs Working Together
by Jasmine Chennikara-Varghese For cyber awareness and threat discovery, a combination of identity, network, device and application level solutions provide the most complete coverage. In detecting, responding and remediating threats, packet analysis and log analysis are often the go-to tools for security and SIEM teams. Packet captures provide network level insight enabling security teams to…
Better Balancing of Risks and Opportunities
By Terence Leung A recent McKinsey article speaks of the everyday challenge of controlling working capital: “A thousand everyday decisions can dramatically increase the cash needed to run a large business”. It seems that even though working capital is a priority to many companies (as discussed in my recent article at Finance Executives International), and…
Gain the Next Mile of Improvements in Working Capital, Inventory and Customer Satisfaction Measurements
by Terence Leung In a growing economy, competition and the emergence of digital business models are compelling companies to improve both their physical and financial supply chain (for a definition of financial supply chain, please refer to this article). However, they are facing many chronic (and by no means trivial) issues in their financial and…
When SIEM Data Is Not Enough
by Jasmine Chennikara-Varghese, Pathlock Technologies Security breaches are costly. Just ask Target, Equifax and dozens of other large organizations who have experienced data breaches in the past few years. To improve the ability to detect and respond to security incidents, companies are implementing more mature cyber security processes to defend their cyber landscape and to…
Are Your Cash Flow Improvements Sustainable? Get More Out of Your Balance Sheet
by Mark Kissman, CFO, Pathlock Technologies Cash from operations is the lifeblood of organizations and many companies continue to make improvements to managing their overall working capital. But when examined closely, large companies’ working capital performance is often not as stellar as their balance sheets suggest. This false sense of progress could result in financial…
Why Jabil Selected SAP Access Violation Management by Pathlock
Hear from Jabil, a Fortune 200 global manufacturing services company, how they quantified and identified true Segregation of Duties. View this video to understand first hand about their selection process, implementation, lessons learned, and key successes they have realized with SAP Access Violation Management by Pathlock. Click here to learn more about SAP Access Violation…
Ensure Regulatory Compliance and Reduce Risk with Confidence and Efficiency
Regulations are simply a part of doing business in today’s complex, global economy, but staying current with regulatory changes and ensuring organizational compliance is anything but simple. But by taking a holistic, proactive approach to compliance, organizations can assess and respond to changes in regulations without missing a beat. Regulations have a direct impact on…
A Worthwhile Event about Advanced Technology for Finance Executives in NYC on July 27th by SAP and Pathlock
by Terence Leung We discussed the first hurdle, data acquisition, out of several, in applying advanced and predictive analytics by organizations in a previous blog. The second hurdle involves applying advanced analytic models to make sense of the data and look for often times much larger improvement opportunities than possible before. The process starts with…
Ensure Audit Readiness with Comprehensive & Effective Controls
Instead of implementing and relying on manual processes to meet governance standards and objectives, you can arm your Audit, Compliance and Business teams with Pathlock to automate the process and eliminate the possibility of control failures. More importantly, you can provide visibility to real risk that can drive change to reduce your company’s risk exposure….