Tag: SAP Data Security

3
Oct

SECUDE India Enters into Partnership with Leading Digital and Mobile Technology Company Enstrapp

SECUDE India today announced that it has signed an agreement with Enstrapp, to enable it to sell and support its SAP data security products, HALOCORE® and HALOCAD®.

Read more

4
Sep

SECUDE’s HALOCAD Enables Manufacturing and Engineering Companies to Protect Their CAD Files by Leveraging Microsoft AIP

SECUDE has developed a unique solution to protect Computer-Aided Design (CAD) files. The solution, exclusively meant for engineering and manufacturing companies across industries, will protect files, leveraging Microsoft Information Protection (MIP), across the design-to-production lifecycle.

Read more

13
Aug

Serial data breach cases. When corporations know so much about you. Why don’t they protect your information?

They know all about you. Your health status. Your financial status. About your family. About your vacations – where you go, what you consume and what you do. All that information just got into the hands of pretty unsavory characters from institutions that you believed would never reveal your data.

Read more

1
Aug

Apple and Tesla Story Needn’t Be Yours

Apple recently revealed that its CAD schematics had leaked, spurring it to reduce ‘factory secrecy staff’ and invest in technology. Last year, Tesla had revealed such loss. This needn’t be if organizations take one small, but largely overlooked, step towards CAD file protection. This is what they should do.

Read more

30
Jul

SECUDE sponsors ‘Customer Privacy & Data Protection India Summit 2019’ in Mumbai

SECUDE sponsors ‘Customer Privacy & Data Protection India Summit 2019’ in Mumbai Presentations, panel discussions and face-to-face opportunity with technology solution providers – Customer Privacy & Data Protection India Summit 2019 provided the perfect platform to deep dive into real-world data security challenges in India Technology is one of the major forces transforming our lives. However, its misuse causes detrimental

Read more

Read more

16
Jul

What is the first step towards data-centric security?

To be forewarned is to be forearmed. This popular truism cannot be truer when it comes to data-centric security. However, the key question often is: where does one begin? This brief blog presents a clear step forward towards data-centric protection.

Read more

5
Jul

Big Data + Small Gaps = Big Trouble

It is all about protecting your crown jewels. If you are an SAP user, you will be well aware of the security provided ‘inside’. But the key question is: what happens to the security of your data once they are downloaded or even shared with ‘legitimate’ outsiders? Can you ensure data integrity?

Read more

18
Jun

Protecting IP of a Manufacturing Company – A Case Study

IP is the crown jewel of any organization. Protecting it goes beyond traditional security paradigms. Here is the case study of a leading Swiss chip manufacturer who took the extra step of taking a data-centric approach beyond the standard security paradigm.

Read more

12
Jun

Five SAP data protection scenarios where HALOCORE must be considered

An ERP, such as SAP, is ubiquitous and all-encompassing. The key value of such a platform is its ability to power operations across departments by enabling seamless data sharing. However, data that is being shared may also be misused and stolen. Here are five SAP data protection scenarios where HALOCORE must be considered.

Read more

4
Jun

Five Types of Insiders who may steal your Company’s Data

Most CIOs and data security practitioners believe that traditional security measures such as firewalls, anti-virus and even password best practices are credible protection against data leaks and theft. The fact is that they are not – especially when the root of the problem could be the employee himself.

Read more