SECUDE is celebrating 25 years in business. What began as a small venture by SAP and Fraunhofer Institute in the mid 90’s, SECUDE has grown to a leading Data-centric security vendor in the market. We thank our employees, partners, and customers for being part of our successful journey.
Infosys wanted to ensure that data especially sensitive information is available only to its employees and is safe-guarded from any third-party views or downloads.
Learn how SECUDE’s HALOCORE provides contextual-driven data protection to SAP exported out of the system by integration with Microsoft Information Protection services.
Learn how HALOCORE complements Microsoft 365 E5 Compliance to protect sensitive data extracted from SAP systems with intelligent data classification, storage encryption, and fine-grained access policies even outside the SAP environment.
Improved integration with Microsoft Azure, tamperproof application, and audit logs with HALOCHAIN, and new SAP support improvements will help customers protect their sensitive data wherever it resides.
SECUDE introduces new features to strengthen, safeguard, and protect its clients against evolving cybersecurity threats as part of HALOCORE 6.0 release.
With this new integration, HALOCORE® 5.3 will continue to focus on delivering leading-edge value in intelligent automation, insight and next-generation best practices.
They know all about you. Your health status. Your financial status. About your family. About your vacations – where you go, what you consume and what you do. All that information just got into the hands of pretty unsavory characters from institutions that you believed would never reveal your data.
Apple recently revealed that its CAD schematics had leaked, spurring it to reduce ‘factory secrecy staff’ and invest in technology. Last year, Tesla had revealed such loss. This needn’t be if organizations take one small, but largely overlooked, step towards CAD file protection. This is what they should do.
To be forewarned is to be forearmed. This popular truism cannot be truer when it comes to data-centric security. However, the key question often is: where does one begin? This brief blog presents a clear step forward towards data-centric protection.