Blog

Latest and greatest about IT and SAP security

Why reinvent the wheel? Leverage existing investments in data security with a difference

CISOs are increasingly investing in robust data security solutions, such as DLP, assuming that their organization’s data will be perfectly secure. Most DLPs are content-based solutions that function based on key words. While it might seem secure, they could lead to complications, such as ‘false positives’ and ‘false negatives’, maybe even leading to permitted data being blocked and unauthorized data passing through the security filter.

read more

Complete Digital interconnection through IOT is the way forward for global businesses. But be wary.

Over the past few decades, Digital has been considered a key enabler in business and operations. In this regard, in January 2017, SAP launched SAP Leonardo – its digital transformation platform based on the Internet of Things. With a singular focus on levering ‘Things’ for superior business ‘Outcomes’, SAP Leonardo promises a revolution. But there may be a few things to keep in mind…

read more

Is your automated, policy-based machine-to-machine communication secure? Think again!

The rapid change in the development of enterprise IT architecture in the context of the digital transformation has led to a significant shift in application integration and data distribution models. As a result, applications too exchange sensitive data based on protocol. This is in addition to exchanges between users – internal and external. To effectively protect intellectual property and personal data, and thus, to meet the requirements of the new European Data Security regulation – GDPR, new solutions need to be considered.

read more

GDPR is around the corner. Are companies really prepared?

A recent study by Veritas Technologies reveals startling facts about the level of preparedness by companies, especially in Germany. While CISOs and CTOs may state their level of readiness being on track, certain fundamental issues are still, scarily, left unanswered.

read more

Companies realize that they are unprepared for GDPR

Why should enterprises simplify timely provision of data?
The General Data Protection Regulation (GDPR), which will be enforced from May 2018, requires companies to localize and provide personal data on request to clients and users within a short period of time. This would, essentially mean that, within 30 days, an applicant should have a copy of his or her data in order to be able to decide on its use, if necessary.

read more

Dark Web augments insider threat for organizations

The Dark Web is considered a trading place for all kinds of illegal goods and cannot be viewed through ordinary search engines. In addition to criminals, whistle blowers, political dissidents and increasingly disgruntled ‘insiders’ use this anonymity to their advantage.

read more

What does Design Thinking have to do with Data Security?

Have you heard of the concept called Design Thinking? Yes? No? Okay. Its evangelists define it as “a proven and repeatable problem-solving protocol that any business or profession can employ to achieve extraordinary results.” In other words it’s a very methodical...

read more

5 Steps to Implement a Successful Data Classification Policy

Many organizations have recognized that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into every day business activities. However, many companies fail to...

read more