Gabriele Fiata, Author at 麻豆原创 News Center Company & Customer Stories | 麻豆原创 Room Mon, 13 Nov 2023 13:45:44 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 麻豆原创 Recognized as Leader for Access Governance Solutions /2023/11/sap-recognized-as-leader-access-governance-solutions/ Wed, 15 Nov 2023 14:15:00 +0000 /?p=213544 In recent KuppingerCole Analysts reports, 麻豆原创 secured a leadership position in access governance, notably in the categories of “” and “.”

The reports offer a comprehensive overview of the access control tools market, focusing not only on 麻豆原创-centric environments but also encompassing applications from multiple vendors. Emphasis is placed on environments involving 麻豆原创 S/4HANA, 麻豆原创 S/4HANA Cloud, and other 麻豆原创 cloud applications as well as the imperative to support various line of business applications.

Analysts delve into market segments, vendors, product functionalities, relative market share, and innovative approaches to bolstering security in these business application environments. This includes measures such as access restriction, control of break-glass access, and related capabilities.

Key Factors Underscoring 麻豆原创’s Access Governance Leadership

Comprehensive Solution Portfolio
tailored for diverse business application environments. This comprehensive portfolio can address a wide spectrum of functionalities, helping to provide organizations with versatile tools for diverse access management needs.

Scalability and Adaptability
Designed to seamlessly scale across different environments, 麻豆原创’s access governance solutions can adapt to varying business requirements. This scalability helps ensure organizations can deploy and customize these tools to their unique business application landscapes.

Vendor-Neutral
麻豆原创’s acknowledgment as a leader comes from KuppingerCole Leadership Compass reports, known for its vendor-neutral and comprehensive assessments. Recognition in these reports underscores 麻豆原创’s leadership based on merit and performance rather than bias towards a specific vendor.

麻豆原创 a leader in Chartis RiskTech Quadrants for governance, risk, and compliance

Effective Access Governance
麻豆原创鈥檚 access governance solutions excel in providing robust access controls capabilities, including features such as role management, identity lifecycle management, and compliance reporting. This helps contribute to effective governance over user access within business application environments.

Interoperability across 麻豆原创 Solution Environments
麻豆原创’s access control tools demonstrate high interoperability within 麻豆原创 solution environments. This seamless integration helps ensure organizations leveraging various 麻豆原创 solutions can achieve a unified and consistent approach to access control.

Continuous Innovation and Adaptation
麻豆原创’s commitment to innovation is evident in its access governance solutions. The leadership recognition by KuppingerCole suggests that 麻豆原创 not only meets current industry standards but also continues to innovate, adapting its solutions to address emerging challenges and evolving security landscapes.

Proven Track Record

The dual recognition in KuppingerCole Leadership Compass reports emphasizes 麻豆原创’s excellence in the access governance space, underpinned by a comprehensive solution portfolio, scalability, vendor-neutral assessment, effective access controls, interoperability, continuous innovation, and a proven track record in delivering value to businesses across various application environments.

麻豆原创’s leadership position is likely reinforced by a history of supporting deliveries of successful access governance implementations, with positive outcomes for organizations using these solutions across various application environments. Demonstrated effectiveness and positive user experiences contribute to 麻豆原创’s standing as a leader in this space.


Photo courtesy of 麻豆原创 employee Nick Hull

Follow 麻豆原创 News on LinkedIn
]]>
麻豆原创 Recognized as a Leader in Governance, Risk, and Compliance /2023/06/sap-grc-leader-chartis/ Mon, 19 Jun 2023 11:15:40 +0000 /?p=205511 麻豆原创 received multiple awards in the most recent RiskTech100 rankings from Chartis Research. These include the Corporations award in the industry category and five solution category wins for Asset and Inventory Management, Facility Management and Control, Finance and Accounting 鈥 Cross Industry Support, GRC 鈥 Supply Chain Risk, and GRC 鈥 Vendor and Third-Party Risk.

Strong, Cross-Industry Cloud ERP Capabilities

麻豆原创鈥檚 strategy is to help every business run as an intelligent, sustainable enterprise. 麻豆原创 offers customers a comprehensive end-to-end suite of applications and services across 25 industries globally. These help facilitate effective data processing and information flow across organizations, providing deep business insight, process efficiencies, and fostering collaboration.

We are redefining enterprise resource planning (ERP), creating networks of intelligent enterprises that provide transparency, resiliency, and sustainability across supply chains.

With 麻豆原创 S/4HANA, we use the power of in-memory computing to process vast amounts of data and support advanced technologies, such as artificial intelligence (AI), machine learning, the Internet of Things (IoT), and advanced analytics.

鈥淐hartis recognizes 麻豆原创鈥檚 strong ERP capabilities across the board,鈥 said Sid Dash, chief researcher at Chartis. 鈥淚ts strengths, particularly in sectors such as energy and commodities, are crucial to the firm鈥檚 overall RiskTech100 performance.鈥

Market-Leading, Future-Critical GRC Capabilities

麻豆原创 governance, risk management, and compliance (GRC) solutions received special recognition from Chartis.

In recent years, GRC as a topic has transformed into an enterprise-wide, comprehensive, and fully integrated discipline, connecting all organizational risk and compliance functions. It involves a vast, continuously expanding ecosystem encompassing controls, operational resilience, IT risk management, asset management, and physical operational activities. Its impact on operational resilience and business continuity is far deeper than in the past.

鈥淏eing recognized as a leader by Chartis Research for our comprehensive and integrated GRC solutions is a testament to 麻豆原创’s commitment to transforming risk and compliance functions for intelligent, sustainable enterprises,鈥 said Jan Gilg, president and chief product officer for Cloud ERP at 麻豆原创. 鈥淥ur cloud ERP solutions empower organizations to embed GRC into their operations and digital transformation, enabling continuous monitoring, predictive insights, and resilient business continuity.听We are redefining the future of risk management.鈥

麻豆原创 GRC solutions can simplify risk management by providing guidance for financial, vendor, and operational risks. With automation, real-time visibility, and predictive analytics, the solutions can help businesses monitor risks, identities, cyber threats, and compliance more efficiently. This enables companies to gain early insights into anomalies and potential risks, informing their operational and planning decisions.

鈥淲ithin GRC, many of the areas that 麻豆原创 focuses on are major areas for concern for both financial and non-financial institutions,鈥 said Dash. 鈥淪pecifically, in the non-financial sector, risk areas such as third parties, supply chain, IT, cyber, infrastructure, and asset management have grown significantly in importance.鈥

鈥淔irms in all industries have very significant concerns and challenges around the ways their physical infrastructure interacts with the increasingly digitalized environment in which they operate. This is not just in relation to cyber risk but also in terms of their wider operational resiliency and infrastructure management,鈥 he continued. 鈥淐ompanies need to be fully aware of how and at what points their digital infrastructure interweaves with their physical infrastructure. Chartis believes that 麻豆原创 is a leader in the market in these respects, and, in some ways, the rest of the industry is playing catch-up.鈥

鈥淲e also recognize that the other areas where 麻豆原创 provides significant support, such as providing risk systems upstream with enterprise and inventory views, are central to organizational requirements. Chartis feels that in this increasingly interwoven physical and digital world, 麻豆原创鈥檚 ability to capture the entire organizational profile for many different types of companies will be a central capability in building GRC and risk solutions going forward,鈥 concluded Dash.

]]>
Safeguarding Your Crown Jewel: UI Data Protection /2022/02/ui-data-protection-masking-logging/ Thu, 10 Feb 2022 11:15:58 +0000 /?p=194509 Data protection and privacy have always been important, but the desire to execute has become more crucial as sensitive data is digitized and shared online.

鈥淒ata is the new oil,鈥 according to in 2006. In 2017, said, 鈥淒ata is the currency of the digital age.鈥 The world has recognized the value of data in how people do business in the 21st century.

More than 400,000 companies are using 麻豆原创 to run their business where often their most important data is processed.

Last year was one of privacy compliance, where many organizations were fined enormous amounts due to lack of data privacy processes and governance. This led to data protection and privacy regulations being constantly updated to suit the ever-changing threat landscape and required controls. Therefore, it is expected that these updates be implemented in 2022 and beyond.

麻豆原创 has been working on innovative options to protect its customers鈥 鈥渃rown jewel鈥 — not just from external threats but those closest to it, such as employees, business partners, and other users who have privileges to access sensitive information.

, data is worth a significant amount when stolen and sold on the black market or abused for money or any malicious intent. Industries and governments have therefore put in place regulatory and legal compliance requirements to help ensure that such sensitive information is not misused to cost companies their business or economies worldwide. The growing concerns and possible repercussions for neglecting to safeguard such data can lead to incidents where recovery is difficult.

A best practice for companies to proactively address data protection is to help employees avoid inadvertent data breaches. 麻豆原创 addresses this with UI data protection masking and UI data protection logging packages developed by the Customer Innovation & Maintenance organization at 麻豆原创.

鈥淲ith the increase in remote workers, companies are challenged with securing sensitive data while allowing employees to access information and execute business processes seamlessly,” said Thomas Ruhl, head of Product Management for Customer Innovation & Maintenance at 麻豆原创. “This is only one example of the growing data protection needs of our customers. That鈥檚 why we created the new UI data protection masking and UI data protection logging software, which enables them to safeguard their data using dynamic rules that can address complex business scenarios.鈥

Proven 麻豆原创 Solutions Help Customers with Data Protection

UI data protection masking and UI data protection logging empower businesses to have control over which data, if deemed sensitive, should remain visible for a user to fulfill his or her job. It keeps an audit trail of user access and analyses it, helping eliminate the need to micromanage.

UI data protection masking and UI data protection logging target insider threats — be they intentional or unintentional. Rules can be set to obfuscate or reveal specific data to users according to nominated authorization levels.

The process of masking happens on the server side but only at the user interface layer and does not impact the application or data base layers. Masking is commonly used in concealing data such as personally identifiable information (PII), HR, financials, intellectual property, customer information, trade secrets, and anything that can be subject to harmful intent or mistake, thereby putting the business at significant risk.

UI logging is the ability to gather audit logs, allowing tracking and tracing of the journey of the data, including users who accessed them. It is synonymous to leaving a fingerprint at every turn. This is ideal for audit and investigative processes.

UI masking and UI logging also help address regulatory compliance requirements such as General Data Protection Regulation (GDPR). It may be EU-centric, but the regulation affects anyone or any entity outside of the EU who accesses, processes, or stores data of EU natural persons. More and more geographies are enacting similar legislation, often based on a similar direction as GDPR, such as the California Consumer Privacy Act (CCPA). Taking steps to be compliant will incur the least effort and cost as opposed to being fined for a significant amount., GDPR fines totaled US$63 million in its first year.

A use case that is becoming increasingly popular is data access by employees from separate entities, such as demergers, sharing the same application instance. This is when attribute-based authorization is relevant and less cumbersome without the need to modify the application nor provide an additional instance.

Here are questions that can help identify whether UI data protection masking and UI data protection logging are relevant to your business:

  • Does your organization use 麻豆原创?
  • Is sensitive information such as PII, trade secrets, IP, and business plans processed in 麻豆原创?
  • Is the sensitive information valuable enough to be protected?
  • Are there any data protection and privacy compliance requirements?
  • Is your organization鈥檚 business in the process of merging/demerging?
  • Do you find the static role-based authorization model insufficient?
  • Would a dynamic approach that offered better granularity be more appropriate?
  • Do you require a facility to investigate, spot data breaches, and ascertain who is responsible?

If the answer is yes to point one and to any of the following questions thereafter, then 麻豆原创 would suggest:

  • Discovering what UI data protection masking and UI data protection logging for 麻豆原创 can do from the .
  • Contacting your 麻豆原创 account manager to arrange an initial discovery call with the product team or 麻豆原创 experts.
  • Planning the next steps together with the 麻豆原创 team, such as solution value for your business case, solution demo, and more.
]]>
麻豆原创 Launches Real-Time Cloud-Based Enterprise Threat Detection Solution for 麻豆原创 Applications as Managed Service /2021/07/sap-enterprise-threat-detection-cloud-based-managed-service/ Thu, 15 Jul 2021 12:15:53 +0000 /?p=186741 The significant increase in cyber threats around the world 鈥 exacerbated by the COVID-19 pandemic in 2020 鈥 has intensified the need for organizations to go beyond preventive measures. Higher standards around real-time monitoring, threat detection, and rapid response are required to safeguard businesses.

This is why 麻豆原创 is releasing 麻豆原创 Enterprise Threat Detection, a real-time cloud-based tailored for 麻豆原创 applications and delivered as a 100% managed service by 麻豆原创 on 麻豆原创 Business Technology Platform. This cloud offering uniquely combines leading software with 24/7 麻豆原创 managed security services by 麻豆原创 experts.

The solution and service aim to support companies in detecting cyber-attacks in real time by continuously collecting, correlating, and analyzing anomalous and suspicious events across the 麻豆原创 system landscape before serious damage occurs.

Why Is 麻豆原创 Releasing This Service for Customers Now?

Many companies are currently switching to the cloud or to 麻豆原创 S/4HANA. This transformation is an opportunity to enhance companies鈥 security measures and to protect such investments. Security is no longer a trivial subject and therefore cannot be neglected. Failing to make it a top priority means taking high risks and possibly facing hefty consequences when audited.

Cyber-attacks against businesses are in the news weekly. However, little technical detail is shared about the layers of the IT landscape being attacked. Since 麻豆原创 applications often contain the most valuable data and run the most critical business processes across the enterprise, they are increasingly becoming a target for external and internal fraudsters.

Attacks can have serious consequences, such as loss of trust and intellectual property, huge fines, business interruption, revenue leakage, misstatement of financial records, among many other damages.

While general security teams guard the walls, perpetrators 鈥 internals or externals 鈥 are making their way to the companies鈥 crown jewels through the application layer鈥檚 backdoors.

What Is the Objective of the Cloud Edition of 麻豆原创 Enterprise Threat Detection?

The logic and the structure of enterprise resource planning (ERP) systems are very different from the ones on the network or operating system layer. 麻豆原创 applications have been developed to support end-to-end processes, so there is a huge amount of controls that must be managed and monitored.

Imagine the ERP system as an office building in a city (the internet) with thousands of criminals. All windows and doors are locked and bolted. Are we 100% sure that we are safe? Unfortunately not, because:

  • Thieves and perpetrators always find new ways to break in and this is not going to stop. It is a continuous act of offense and defense from the attacker and the defender improving their methods and strategies to succeed.
  • The best lock is futile if (internal) attackers are already in the house. More so, an alarm system will not necessarily protect your home if it fails to activate. Hence, there is a high exposure to risk.

In both scenarios, the objective is to detect such cases in real time to raise alerts faster with 麻豆原创 customers, leveraging the managed service of 麻豆原创 Enterprise Threat Detection, cloud edition.

24/7 Monitoring as a Managed Service

The managed service for 麻豆原创 Enterprise Threat Detection includes monitoring of customers鈥 entire ERP landscape 24/7 by 麻豆原创 experts, and risk-based, prioritized alerting. In addition, a monthly report is issued summarizing all suspicious activities detected as well as the details of how they were carried out.

While this offers effective protection that covers most auditors’ requirements, some companies may want additional support and flexibility. The extended version provides companies the option for extended services and enhanced service level agreements, such as prompt reaction to abnormalities and/or forensic analysis over a specified number of months, and more flexibility in creating and updating detection rules.

鈥淪ecurity is a top priority for 麻豆原创. We know some of our customers don鈥檛 have in-house security operations centers to monitor and protect their mission-critical applications from ever-growing cybersecurity threats鈥, said Thomas Ruhl, head of Product Management for Customer Innovation and Maintenance at 麻豆原创. 鈥淭hat鈥檚 why we released 麻豆原创 Enterprise Threat Detection, cloud edition: a solution that bundles powerful software and a managed service by 麻豆原创 security experts to defend against cyber-attacks and safeguard their business.鈥

Customers interested in learning more can contact their 麻豆原创 Account Executive to organize a session to better understand the complete offering or email CIM_Communications@sap.com.

]]>