SAP

How SECUDE HALOCORE helps Infosys extend data protection outside the organization

Infosys is a global leader in next-generation digital services and consulting. It enables clients in 46 countries to navigate their digital transformation. With $13 Billion USD as its last 12 month’s revenue, serving a client base of 1500 customers, human capital of 249K employees, and managing millions of square feet of real estate.

Securing SAP SuccessFactors to remain compliant

Lookout is the only CASB in the SAP Store, and the only CASB vendor in the SAP integration partner lineup. We’ve worked closely with SAP to understand how SuccessFactors interacts with users and handles data. Recognized by Gartner as an industry-leading solution, Lookout CASB has built-in advanced data security and user and entity behavior analytics. But we wanted to ensure we can safeguard SuccessFactors and its vast functionalities, that’s why we worked hard to understand how the HCM solution interacts with users and handles data.

SECUDE and Turnkey Announce Strategic Technology Partnership

LUCERNE, NOVEMBER 2021: SECUDE, an established global security solutions provider offering innovative data protection for users of SAP and CAD/PLM software is pleased to announce the recently formed competency partnership with Turnkey Consulting Ltd., the world’s Risk, Identity, and Security specialists.

October 2021 Roundup - Latest News, Trends & Updates in Data Centric Security

Nearly all U.S. executives (98%) report that their organizations experienced at least one cyber event in the past year, compared to a slightly lower rate of 84% in non-U.S. executives, according to Deloitte’s 2021 Future of Cyber Survey. Further, COVID-19 pandemic disruption led to increased cyber threats to U.S. executives’ organizations (86%) at a considerably higher rate than non-U.S. executives experienced (63%). Yet, 14% of U.S.

A new "zero-code" and "zero-role impact" approach to protect data and automate data privacy in SAP

Privacy Data Protection has led to role explosion and custom code explosion in the past years. Consequences are increasing project/maintenance costs, but also complexity for audit and compliance to follow the controls in place, that right users have right roles and data access, at the right time. In this Webinar, CAG and NextLabs will be presenting a new approach to dynamic data protection without any code and any role impact, for SAP and beyond.

A ground-breaking "zero-code" "zero-role impact" approach to protect & automate data privacy in SAP

Privacy Data Protection has led to role explosion and custom code explosion in the past years. The consequences are not only increasing project and maintenance costs, but also increased complexity for audit and compliance to follow the controls in place, so that users have the correct roles and data access, at the right time. We will cover the following topics.

NextLabs releases Data Access Enforcer for SAP 2021

A groundbreaking approach to address data privacy and data segregation in SAP San Mateo, California– July 14, 2021– NextLabs today announced the release of Data Access Enforcer (DAE) for SAP 2021, an enhancement to its industry leading DAE for SAP product that allows enterprises to leverage attribute-based policy and centralized policy management to improve compliance posture and security for SAP.

How to Detect SAP Threats in Real-Time with LogSentinel SIEM?

When it comes to the security of SAP systems, SIEM products often fail to meet companies’ expectations as they couldn’t fully interpret the SAP logs. LogSentinel Next-Gen SIEM solves this problem, eliminating the blind spots, as well as all SAP threats, and successfully parsing every log file in a human-readable format.

How SECUDE's HALOCORE complements Microsoft 365 E5 Compliance for securing sensitive SAP data

The new normal of working remotely calls for solutions that are seamless, flexible, and secure. Most enterprises believe that they are well-equipped to address the evolving cybersecurity threats. However, when employees connect through a myriad of devices, most of the time the security is highly questionable. This is because either they do not use secure devices or lack critical security updates. With cyberattacks becoming highly sophisticated, a host of security challenges awaits for the enterprise!