The world is slowly, but increasingly, taking cognizance of looking deeper within when it comes to protecting data. CNBC TV18 recently published an article by Utkarsh Morarka on the ‘why’ and ‘how’ of data security. This is SECUDE’s take on the article.
Despite the growing complexity of threats that faces enterprises today, data security practitioners need to be agile and keep in mind the bigger threat picture. While this does translate to dynamic response mechanisms and constantly evolving security paradigms, those responsible for data security shouldn’t lose sight of the ‘small’ things, for as they say, the devil is in the details.
SECUDE India today announced that it has signed an agreement with Enstrapp, to enable it to sell and support its SAP data security products, HALOCORE® and HALOCAD®.
SECUDE’s signature event at Hochschule Informatik, Lucerne University of Applied Sciences and Arts on Thursday, 14th March 2019, provided an opportunity of collaborative learning and networking. The event was supported by Microsoft and Keyon AG. Here is a brief narrative of what transpired.
HALOCORE 5.1 is based on new, powerful rules and configuration templates (available for SAP solutions for financial and HR functions) to easily meet classification and reaction requirements, even in complex use cases. The new engine also provides the foundation for forthcoming automation initiatives that incorporate machine learning concepts.
Through this brief post, Philipp Meier, Vice President (Research & Development) shares his thought on the values of industry-university connect after the recently inaugurated bachelors programme in Information and Cyber Security.
“HALOCORE provides effective classification and protection of sensitive data by controlling SAP exports and encrypting extracted documents… Deploying HALOCORE at Microsoft helps us keep our company more secure and compliant,” says Shalini Gupta, Principal Privacy Lead at Microsoft. Read the brief case study to know more.
Outsider threats, while still an important consideration in cyber security, account for only 40% of malicious attacks on your system while 60% potentially come from trusted insiders. Here are 4 important steps to keep in mind.
SAP customers are concerned about identification of data in the SAP system, their pseudonymisation in copies of the production system, and timely information, blocking and finally deletion of user data. This is what users should keep in mind.