SAP Data Security

1
Dec

How SECUDE HALOCORE helps Infosys extend data protection outside the organization – A Case Study

Infosys wanted to ensure that data especially sensitive information is available only to its employees and is safe-guarded from any third-party views or downloads.

16
Nov

Why you need a layered security approach for protecting your data in today’s threat landscape

Learn how SECUDE’s HALOCORE provides contextual-driven data protection to SAP exported out of the system by integration with Microsoft Information Protection services.

22
Sep

How SECUDE’s HALOCORE complements Microsoft 365 E5 Compliance for securing sensitive SAP data

Learn how HALOCORE complements Microsoft 365 E5 Compliance to protect sensitive data extracted from SAP systems with intelligent data classification, storage encryption, and fine-grained access policies even outside the SAP environment.

9
Apr

Webinar Recording: How to protect your critical data leaving the SAP environment?

Recently, SECUDE in collaboration with Wipro conducted a joint webinar on the topic – How to protect your critical data leaving the SAP environment. If you missed the webinar, you can watch it at the link below.

5
Jul

Big Data + Small Gaps = Big Trouble

It is all about protecting your crown jewels. If you are an SAP user, you will be well aware of the security provided ‘inside’. But the key question is: what happens to the security of your data once they are downloaded or even shared with ‘legitimate’ outsiders? Can you ensure data integrity?

18
Jun

Protecting IP of a Manufacturing Company – A Case Study

IP is the crown jewel of any organization. Protecting it goes beyond traditional security paradigms. Here is the case study of a leading Swiss chip manufacturer who took the extra step of taking a data-centric approach beyond the standard security paradigm.

12
Jun

Five SAP data protection scenarios where HALOCORE must be considered

An ERP, such as SAP, is ubiquitous and all-encompassing. The key value of such a platform is its ability to power operations across departments by enabling seamless data sharing. However, data that is being shared may also be misused and stolen. Here are five SAP data protection scenarios where HALOCORE must be considered.

17
Dec

Complying with HIPAA – The HALOCORE way

The recent report about an ex-employee’s access to e-PHI data of a leading Colorado-based medical center raises another important question in addition to robust access control: How to protect data that egress an organization’s enterprise landscape?

31
Aug

Four steps to spot and stop data theft in your SAP landscape

Outsider threats, while still an important consideration in cyber security, account for only 40% of malicious attacks on your system while 60% potentially come from trusted insiders. Here are 4 important steps to keep in mind.

31
Jul

Number of data breaches has gone up, but data security is still not top priority

On 24th July, NBC News published a rather statistic heavy report by ITRC that presented a paradoxical picture. While on one end, the frequency of data breach in the US has “jumped 29% in the first half of this year”, on the other “cyber security still doesn’t get the respect it deserves”. Strange, but true!