Tag: HALOCORE

1
Dec

How SECUDE HALOCORE helps Infosys extend data protection outside the organization – A Case Study

Infosys wanted to ensure that data especially sensitive information is available only to its employees and is safe-guarded from any third-party views or downloads.

16
Nov

Why you need a layered security approach for protecting your data in today’s threat landscape

Learn how SECUDE’s HALOCORE provides contextual-driven data protection to SAP exported out of the system by integration with Microsoft Information Protection services.

22
Sep

How SECUDE’s HALOCORE complements Microsoft 365 E5 Compliance for securing sensitive SAP data

Learn how HALOCORE complements Microsoft 365 E5 Compliance to protect sensitive data extracted from SAP systems with intelligent data classification, storage encryption, and fine-grained access policies even outside the SAP environment.

12
Aug

SECUDE’s HALOCORE takes Data Security to the next level with added new features

Improved integration with Microsoft Azure, tamperproof application, and audit logs with HALOCHAIN, and new SAP support improvements will help customers protect their sensitive data wherever it resides.

10
Dec

SECUDE Strengthens HALOCORE® 6.0 With Software-as-a-Service (SaaS), SAP ECTR & Other Features

SECUDE introduces new features to strengthen, safeguard, and protect its clients against evolving cybersecurity threats as part of HALOCORE 6.0 release.

1
Apr

SECUDE’S HALOCORE® 5.3 Now Certified for SAP S/4 HANA 1909

With this new integration, HALOCORE® 5.3 will continue to focus on delivering leading-edge value in intelligent automation, insight and next-generation best practices.

13
Aug

Serial data breach cases. When corporations know so much about you. Why don’t they protect your information?

They know all about you. Your health status. Your financial status. About your family. About your vacations – where you go, what you consume and what you do. All that information just got into the hands of pretty unsavory characters from institutions that you believed would never reveal your data.

1
Aug

Apple and Tesla Story Needn’t Be Yours

Apple recently revealed that its CAD schematics had leaked, spurring it to reduce ‘factory secrecy staff’ and invest in technology. Last year, Tesla had revealed such loss. This needn’t be if organizations take one small, but largely overlooked, step towards CAD file protection. This is what they should do.

16
Jul

What is the first step towards data-centric security?

To be forewarned is to be forearmed. This popular truism cannot be truer when it comes to data-centric security. However, the key question often is: where does one begin? This brief blog presents a clear step forward towards data-centric protection.

5
Jul

Big Data + Small Gaps = Big Trouble

It is all about protecting your crown jewels. If you are an SAP user, you will be well aware of the security provided ‘inside’. But the key question is: what happens to the security of your data once they are downloaded or even shared with ‘legitimate’ outsiders? Can you ensure data integrity?