Schedule Demo

Search

Azure AD Premium: Features and License Structure

What is Azure AD Premium? Microsoft Azure Active Directory (AD) is a cloud software, building upon the popular on-premises Active Directory product. Azure AD provides the same security features as the traditional Active Directory, and can be used to manage access to cloud resources, or in tandem with on-premise AD, to enable a hybrid domain…

Azure AD Application Proxy: Workflow and Best Practices

What Is Azure AD Application Proxy? Azure Active Directory (AD) offers an Application Proxy feature that lets you access on-prem web applications using a remote client. It consists of two main components: The service and connector interact to securely transmit user sign-on tokens from Azure AD to a web application. Here are several use cases…

Insider Threat: Types, Examples, Detection, and Prevention

Insider Threat Definition An insider threat is a security threat from within the organization being targeted or attacked, typically by an officer or employee of an organization with privileged access. An insider threat can also be a board member, former employee, or anyone who at one point had access to confidential or proprietary information at…

Pathlock Reshapes the Access Governance Market with a Series of Strategic Mergers

Pathlock, the leading provider of access governance solutions for business applications, today announced a merger with Appsian, the leading provider of ERP data security solutions, and Security Weaver, the leading provider of governance, risk, and compliance management (GRCM) software for SAP. In addition to the mergers, the newly combined company, Pathlock, is announcing the acquisition…

Pathlock Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2022

Pathlock, the leading provider of access orchestration and application security for critical business applications, is proud to be announced the Market Leader for Zero Trust from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. “We’re thrilled to receive one of the most prestigious and coveted awards from Cyber Defense Magazine during their…

Pathlock and SAPinsider Release The Cybersecurity Threats to SAP Systems Benchmark Report

Pathlock is pleased to announce the release of The Cybersecurity Threats to SAP Systems Benchmark Report by SAPinsider (Pathlock is a co-sponsor of the report). SAPinsider recently surveyed members of its community to understand what they see as the biggest cybersecurity threats facing their SAP environments, what challenges they face in addressing those threats, and…

SAPinsider Cybersecurity Threats Report: Key Insights Part 1

The recently published SAPinsider Cybersecurity Threats to SAP Systems benchmark report reveals some insightful SAP security trends. While many of the traditional security concerns remain, the changing threat landscape has shifted priorities and is impacting strategic decision-making when it comes to protecting SAP data. In this three-part article series, we’ll discuss the key findings of…

SAPinsider Cybersecurity Threats Report: Key Insights Part 2

While the key finding in part one of this SAP insider series discussed how to keep your SAP landscape properly patched and configured, part two, in our three-part series, is about the risks ABAP custom code creates across SAP landscapes and how to address that risk. Part 2: Key Insight | SAP Custom Code is…

Why PeopleSoft Process Automation Is Fundamental To Security And Compliance 

Today’s distributed businesses need solutions to mitigate the risks of diverse access to PeopleSoft applications. Organizations have discovered that the outdated, manual ways of designing and managing controls are inadequate for addressing dynamic risks. As various employees (on-site and remote) and third-party vendor systems require access, PeopleSoft customers face challenges in protecting critical data and…