Upcoming Event: Next-Gen SAP Access Governance Solutions

Organizations today face unique security challenges within their SAP ecosystems. Specifically, they need to protect their sensitive data within their SAP applications and other business-critical applications as well as the data shared with partners and suppliers.

KPMG, a NextLabs partner, will be hosting an event in its Chicago office, “Next-Gen SAP Access Governance Solutions: Protecting Data & Regulatory Compliance” on September 27, 10:30am CT, where you’ll see live demos on how you can leverage Dynamic Authorization Management, Attribute-Based Access Control, Enterprise Digital Rights Management, and Cloud Access Governance to overcome these challenges.

You’ll walk away with a better understanding of the use cases, the solutions, and industry best practices for enhancing your security posture within your SAP and non-SAP environments.

So, click here to secure your spot today!

Upcoming Webinar: Next Generation Security Considerations for SAP

KPMG - Securing the ERP Webcast

SAP security requirements are becoming increasingly complex. Security threats, data restrictions, emerging regulations, and innovation in technology is leading traditional approaches to security and access governance to become costly, unmanageable, and without adequate risk coverage in many cases. As your technology landscape evolves, so should your approach to managing security and access governance.

KPMG, a NextLabs partner, will be hosting a webcast, “ERP Risk Series – Next Generation Security Considerations for SAP” on July 11, 2pm ET. They’ll discuss strategies for evolving your access governance and next generation SAP security considerations. The webcast will be hosted by Brian Jensen (Managing Director of the Oracle Risk Management Team), and the featured presenter will be Jonathan Levitt (Director Advisory, GRC Technology).

One CPE credit will be available to U.S. participants who meet the eligibility requirements.

So, click here to secure your spot today!

Providing secure access to information for improved customer service while streamlining IT operations

“Securing customer data in property and casualty insurance, life & savings, and asset management products is tantamount to protecting a company’s ethos. After all, organizations in this industry gain brand loyalty by promising to give customers’ “peace of mind,” which now includes maintaining the privacy and security of their information.

However, one leading global insurance company reports that another business mandate— offering best-in-class customer service—can pose challenges to the mandate to protect customer data. How does an organization provide anytime, anywhere access to services, while also protecting confidential customer data from unauthorized access and leak? more “Providing secure access to information for improved customer service while streamlining IT operations”

Another Challenge of Big Data Analytics: Data Leak and Spill (Part 1)

In their recent article on Big Data Management and Trends, Gartner identifies Enterprise Data as one of the key challenges facing organizations. The challenge is consolidating data from disparate sources across the extended enterprise and transforming it into critical business intelligence.

“You have many data disparate sources – from your enterprise’s ‘dark data’ and partner, employee, customer and supplier data to public, commercial and social media data – that you need to link and exploit to its fullest value.”
source: http://www.gartner.com/technology/topics/big-data.jsp

more “Another Challenge of Big Data Analytics: Data Leak and Spill (Part 1)”

Real Time Enforcement for Risk Management

As companies grow and expand globally, there is an increasing number of enterprise application users, and with this growth, an ever increasing risk of security breaches and violations. As enterprises are becoming more susceptible to security risks and violations from internal users, businesses are moving towards implementing more preventative measures rather than staying in reactive mode.

SAP GRC enables organizations to establish effective internal controls, along with processes to make sure these controls remain consistent, updated and cost-effective to manage. Administrators can now use a single SAP GRC framework to monitor and enforce business, compliance and security policies across the enterprise. SAP has enhanced the GRC offering to include the SAP Dynamic Authorization Management  by NextLabs to ensure that companies can quickly adapt to changing policies and streamline enforcement and administration of those policies. more “Real Time Enforcement for Risk Management”

Data Segregation: Missing piece in securing Enterprise Content

By Soujanya Madhurapantula, Senior Product Manager at NextLabs

I have had the same conversation with a lot of our customers… it keeps me awake at night.

Here is how many customers have described it to me:

We have millions of documents sitting in our enterprise application servers that we know are accessible to all our users. We are subject to regulations that require us to identify classified documents within these large sets of data, and segregate them into restricted servers. It is also important for us to restrict users from storing documents in the wrong servers. We are not sure how to segregate this data and put them into the right physical servers. This project is so complex, we do not even know where to start. more “Data Segregation: Missing piece in securing Enterprise Content”

SAP Field Level Security – Augmenting Roles with Attributes

By Ashwin Bhaskar, Senior Software Engineer at NextLabs

In the first part of the blog Series, we discussed the importance of ABAC (Attributes Based Access Control) as a way to augment traditional RBAC (Role Based Access Controls) for field level security.

Let us now analyze how we can go about implementing field level security using a combination of RBAC and ABAC approaches. more “SAP Field Level Security – Augmenting Roles with Attributes”