As we inch closer to the end of the decade, it doesn’t hurt to start thinking about what the 2020’s will bring in terms of data security. So, we put on our thinking caps and came up with how we see the data security landscape shaping up as we enter a new decade.
Simply put, we see “data safety” becoming the new data
security. The term “data security” has
been around for awhile, but we need to start rethinking the term’s relevance as
we tread deeper into a more digitally driven world.
If you want to read up on how we see this world evolving, you can download the paper here.
SAP security requirements are becoming increasingly complex.
Security threats, data restrictions, emerging regulations, and innovation in
technology is leading traditional approaches to security and access governance
to become costly, unmanageable, and without adequate risk coverage in many
cases. As your technology landscape evolves, so should your approach to
managing security and access governance.
KPMG, a NextLabs partner, will be hosting a webcast, “ERP Risk Series – Next Generation Security
Considerations for SAP” on July 11,
2pm ET. They’ll discuss strategies for evolving your access governance and
next generation SAP security considerations. The webcast will be hosted by
Brian Jensen (Managing Director of the Oracle Risk Management Team), and the
featured presenter will be Jonathan Levitt (Director Advisory, GRC Technology).
One CPE credit will be available to U.S. participants who
meet the eligibility requirements.
So, click here to secure your spot today!
“Securing customer data in property and casualty insurance, life & savings, and asset management products is tantamount to protecting a company’s ethos. After all, organizations in this industry gain brand loyalty by promising to give customers’ “peace of mind,” which now includes maintaining the privacy and security of their information.
However, one leading global insurance company reports that another business mandate— offering best-in-class customer service—can pose challenges to the mandate to protect customer data. How does an organization provide anytime, anywhere access to services, while also protecting confidential customer data from unauthorized access and leak? more “Providing secure access to information for improved customer service while streamlining IT operations”
In their recent article on Big Data Management and Trends, Gartner identifies Enterprise Data as one of the key challenges facing organizations. The challenge is consolidating data from disparate sources across the extended enterprise and transforming it into critical business intelligence.
“You have many data disparate sources – from your enterprise’s ‘dark data’ and partner, employee, customer and supplier data to public, commercial and social media data – that you need to link and exploit to its fullest value.”
more “Another Challenge of Big Data Analytics: Data Leak and Spill (Part 1)”
As companies grow and expand globally, there is an increasing number of enterprise application users, and with this growth, an ever increasing risk of security breaches and violations. As enterprises are becoming more susceptible to security risks and violations from internal users, businesses are moving towards implementing more preventative measures rather than staying in reactive mode.
SAP GRC enables organizations to establish effective internal controls, along with processes to make sure these controls remain consistent, updated and cost-effective to manage. Administrators can now use a single SAP GRC framework to monitor and enforce business, compliance and security policies across the enterprise. SAP has enhanced the GRC offering to include the SAP Dynamic Authorization Management by NextLabs to ensure that companies can quickly adapt to changing policies and streamline enforcement and administration of those policies. more “Real Time Enforcement for Risk Management”
By E.K. Koh, VP of Solutions at NextLabs
There has been a lot of talk about how data breach is exponentially increasing. In a recent NIST cyber security framework, there is an entire segment on “Protecting” Data. more “Protecting Against Data Breach – what offers the best bang for your buck?”
By Soujanya Madhurapantula, Senior Product Manager at NextLabs
I have had the same conversation with a lot of our customers… it keeps me awake at night.
Here is how many customers have described it to me:
We have millions of documents sitting in our enterprise application servers that we know are accessible to all our users. We are subject to regulations that require us to identify classified documents within these large sets of data, and segregate them into restricted servers. It is also important for us to restrict users from storing documents in the wrong servers. We are not sure how to segregate this data and put them into the right physical servers. This project is so complex, we do not even know where to start. more “Data Segregation: Missing piece in securing Enterprise Content”
By Ashwin Bhaskar, Senior Software Engineer at NextLabs
In the first part of the blog Series, we discussed the importance of ABAC (Attributes Based Access Control) as a way to augment traditional RBAC (Role Based Access Controls) for field level security.
Let us now analyze how we can go about implementing field level security using a combination of RBAC and ABAC approaches. more “SAP Field Level Security – Augmenting Roles with Attributes”