November, 2020 Roundup – Latest News, Trends & Updates in Data Centric Security
November, 2020 Roundup – Latest News, Trends & Updates in Data Centric Security
October, 2020 Roundup – Latest News, Trends & Updates in Data Centric Security
Read why he says that, what it means for your company and how you can protect yourself .
Organizations are increasingly becoming aware of the need focus on data security. SECUDE, after the sale of its immensely popular Single Sign-On module to SAP, is now gaining the attention of global companies and media for its unique data security products – HALOCORE and HALOCAD. The Enterprise World magazine recently caught up with SECUDE to feature the company in its magazine.
Through this brief post, Philipp Meier, Vice President (Research & Development) shares his thought on the values of industry-university connect after the recently inaugurated bachelors programme in Information and Cyber Security.
Most business processes are not limited to SAP. Sensitive data is exported by users using Microsoft Office applications – a risk that is clearly underestimated. In this article, Holger Hügel (VP, Products and Services), explains inherent risks in data sharing.
Organizations are increasingly going ‘Digital’. But this is not without its due share of challenges, especially when it comes to data security. In this interview with Express Computer, Dola Krishna (Director – Sales) shares his thoughts on solutions that are more robust than standard content-based DLP solutions.
The news media recently carried the story of a lost USB stick found on a London street – innocuous enough, except that the stick contained extremely sensitive information on infrastructure security and travel routines of dignitaries, etc. One of the fundamental questions is: Could theft of such information be avoided?
The SAP specialist magazine, E3, recently published a series by SECUDE on SAP data security. In this article, the author Holger Heugel (VP, Products and Services), shares his perspectives on data classification in context to SAP data security. This article is part of a series published by the magazine.