﻿<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0">
<channel>
<title>123ArticleOnline.com: Abdul Saleem</title><link>https://www.123articleonline.com/rss/author/281210/abdul-saleem</link><description>Articles written by Abdul Saleem from 123ArticleOnline.com</description><language>en-us</language><copyright>Copyright (c) 123ArticleOnline.com All rights reserved.</copyright>
<item>
<title>3 Easy Steps to Resolve a Row-level Security Issue in PeopleSoft</title>
<link>https://www.123articleonline.com/articles/1234088/3-easy-steps-to-resolve-a-row-level-security-issue-in-peoplesoft</link>
<description>PeopleSoft data security is critically important. While resolving issues related to row-level security in PeopleSoft, many consultants generally prefer using SQL queries if they need to find out all the users who have access to a particular employee&#39;s data in PeopleSoft. However, there is an alternate method of doing this through an inquiry page in Pure Internet Architecture (PIA).</description>
</item>

<item>
<title>A Comprehensive Insight Into SAP Security</title>
<link>https://www.123articleonline.com/articles/1232026/a-comprehensive-insight-into-sap-security</link>
<description>A crucial component of the SAP framework, SAP security determines, within the SAP landscape, what data and processes can be accessed by users. It combines several distinct components of cybersecurity, ranging from access control to security at the level of application to data protection. SAP security services are focused on keeping the device and its information (and, ultimately, your business) secure from a wide range of security threats while doing as little as possible to disrupt business operations. Users are normally only given adequate access to do their job.</description>
</item>

<item>
<title>ABAC vs. RBAC: Understanding Access Control</title>
<link>https://www.123articleonline.com/articles/1227411/abac-vs-rbac-understanding-access-control</link>
<description>Attribute-Based Access Control

Attribute-based access control (ABAC) leverages attributes assigned to an individual resource to decide who can access what. Such characteristics can refer to the team and role of the individual employee within a business, as well as environmental attributes, such as the device used to access a resource and IP address.</description>
</item>

<item>
<title>Access Governance Is Critical For Preventing Phishing Attacks</title>
<link>https://www.123articleonline.com/articles/1237966/access-governance-is-critical-for-preventing-phishing-attacks</link>
<description>There has been quite an upsurge in instances of phishing attacks during the past few months. Cybercriminals, exploiting people&#39;s COVID-19 fears, are engaging in phishing and social engineering aimed at stealing user credentials to business applications and VPNs.</description>
</item>

<item>
<title>Adopting The Zero-Trust Security Model: Key Considerations</title>
<link>https://www.123articleonline.com/articles/1231702/adopting-the-zero-trust-security-model-key-considerations</link>
<description>Over the last few years, companies and customers have become increasingly dependent on digital technologies as more and more businesses migrate to the cloud and the adoption of Internet of Things (IoT) devices continues to grow. Big technology and digitalization have compelled clients to share their personal data at an unprecedented rate. Consequently, the number of organizations gathering data has increased significantly. Data is now a strategic tool for businesses and cybercriminals alike.</description>
</item>

<item>
<title>An Insight Into Security Requirements For 2021</title>
<link>https://www.123articleonline.com/articles/1224438/an-insight-into-security-requirements-for-2021</link>
<description>Among the consequences of the global pandemic in 2020, significant shifts in where and how people work and rapid contributions to corporate digital transformation have been prominent. The blind spots these shifts created were taken advantage of by cyber attackers.</description>
</item>

<item>
<title>An Insight Into The Features Of End-To-End Identity And Access Management Systems</title>
<link>https://www.123articleonline.com/articles/1217914/an-insight-into-the-features-of-end-to-end-identity-and-access-management-systems</link>
<description>With the cyber threat landscape changing rapidly and instances of data breaches on the rise, enterprises are more prone than ever to phishing, ransomware, and other forms of cyber-attacks. No person, apparatus, or workplace can go unprotected. The zero-trust principle calls for the implementation of innovations in risk-based multi-factor authentication and the security of user identities in a converged access environment. It drives the need to broaden applications on a scale to accommodate them</description>
</item>

<item>
<title>An Overview of Access Control Models</title>
<link>https://www.123articleonline.com/articles/1209996/an-overview-of-access-control-models</link>
<description>The latest data security solutions enable organizations to employ an RBAC-ABAC hybrid approach for efficient access control and management. This ensures comprehensive data security.</description>
</item>

<item>
<title>An Overview Of SAP SoD Risk Management</title>
<link>https://www.123articleonline.com/articles/1217274/an-overview-of-sap-sod-risk-management</link>
<description>For day-to-day management of business operations, large companies that require ERP need segregation of duties (SoD) for sure. SoD is intended to prevent a single person from performing several duties that may lead to a breach of law and is often used to prevent fraud. Regulations on compliance, such as Sarbanes Oxley (SOX), enable companies to reduce the risks associated with SAP SoD.</description>
</item>

<item>
<title>An Overview of Single Sign-On Security Risks</title>
<link>https://www.123articleonline.com/articles/1229030/an-overview-of-single-sign-on-security-risks</link>
<description>Single Sign-On (SSO) is an authentication mechanism/system that allows a user to access several applications using one set of login credentials, such as a name and password. Single Sign-On (SSO) solutions eliminate the need for users to remember a special, complicated password for each program and network they access, replacing it with a single logon that enables several systems and applications to be accessed.</description>
</item>

<item>
<title>An Overview Of The Emerging Cybersecurity Threats</title>
<link>https://www.123articleonline.com/articles/1215109/an-overview-of-the-emerging-cybersecurity-threats</link>
<description>Organizations across the globe were pressured to introduce a work-from-anywhere system due to the COVID-19 pandemic. This has become the modern way of doing business, with workers accessing cloud services, remote systems, and collaboration tools from home and public networks, and not just through a VPN&#39;s protection. This rapid transformation presents organizations with a host of safety concerns. Some of the most notable threats to cybersecurity are outlined here.</description>
</item>

<item>
<title>Attribute-Based Access Control: Preparing For Implementation</title>
<link>https://www.123articleonline.com/articles/1214044/attribute-based-access-control-preparing-for-implementation</link>
<description>Security is one of the pressing issues across enterprises worldwide. With an ever-increasing number of cyber-attacks being attempted every day coupled with the growing number of connected devices, it is understandable why it is vital for every company to maintain the best possible security measures in a layered approach.</description>
</item>

<item>
<title>Attribute-Based Access Control: Tips For Efficient Implementation</title>
<link>https://www.123articleonline.com/articles/1224827/attribute-based-access-control-tips-for-efficient-implementation</link>
<description>For organizations worldwide, data protection is one of the biggest challenges. With ever-growing cyber-attack incidents and the rising number of connected devices, it is understandable why it is critical for any business to maintain the best possible security posture.</description>
</item>

<item>
<title>Common Issues With ERP System Security And Strategies To Overcome Them</title>
<link>https://www.123articleonline.com/articles/1231137/common-issues-with-erp-system-security-and-strategies-to-overcome-them</link>
<description>Important advances in ERP systems have occurred in recent years. Modern systems, including human resources, distribution, stock management, and so on, can now automate nearly all business processes. That&#39;s why many companies are currently preferring ERP systems. The benefit of all-in-one solutions such as ERP systems is that they reduce the efforts required to preserve data integrity and ensure that daily operations of various software applications are compatible and functional. However, as with any robust system spanning such a broad spectrum, there will, of course, be some bugs that are necessary to keep a watch on.</description>
</item>

<item>
<title>Cyber Threats And The Future Of Remote Work</title>
<link>https://www.123articleonline.com/articles/1211754/cyber-threats-and-the-future-of-remote-work</link>
<description>Many enterprises all across the globe have streamlined and optimized their operations over the past few months in order to improve business continuity and resilience. One of these improvements is the adoption of remote work policies since workers have moved to work from home indefinitely. And even after the pandemic, it seems that remote work may actually become the new standard for most of these organizations</description>
</item>

<item>
<title>Data Loss Prevention Objectives and Some Recent Trends</title>
<link>https://www.123articleonline.com/articles/1209994/data-loss-prevention-objectives-and-some-recent-trends</link>
<description>Data loss prevention (DLP) refers to a collection of methods and procedures used to ensure that sensitive data is not misused, lost, or accessed by unauthorized users. Sensitive information is categorized by DLP software as regulated, confidential, and business-critical. It identifies violations of policies specified by or within a predefined policy set by organizations typically guided by regulatory compliance such as HIPAA, PCI-DSS, or GDPR. Once these violations are observed, DLP enforces remediation with warnings, encryption, and other preventive measures. Data loss Prevention apps and tools monitor and control endpoint processes, filter data streams on corporate networks, and track data in the cloud to protect data in motion, at rest, and in use.</description>
</item>

<item>
<title>Data Masking in Non-production and Test Environments in SAP</title>
<link>https://www.123articleonline.com/articles/1235170/data-masking-in-non-production-and-test-environments-in-sap</link>
<description>Security attacks and personal and company data breaches represent one of the most critical risks to organizations. Recently, with more government and industry controls on companies being put in place, there is a greater tendency to infringe data protection regulations without understanding the consequences.</description>
</item>

<item>
<title>Data Privacy: Why It Should Be a Priority for Businesses?</title>
<link>https://www.123articleonline.com/articles/1198494/data-privacy-why-it-should-be-a-priority-for-businesses</link>
<description>In today&#39;s digital economy, data is an incredibly vital asset for businesses. They have been collecting, processing, storing, and deleting data like never before. Against this backdrop, data privacy and data security have assumed huge significance</description>
</item>

<item>
<title>Data Security and Compliance:</title>
<link>https://www.123articleonline.com/articles/1228545/data-security-and-compliance</link>
<description>Access control refers to a significant responsibility of the IT departments and concerns the data security of organizations. It outlines a range of ways to track who has access to your company&#39;s resources. Access controls allow you to remain compatible and comply with various industry standards and regulations. They also arm you with greater control over your network, documents, website, or other sensitive systems or resources.</description>
</item>

<item>
<title>Data Security Standards and Some Best Practices</title>
<link>https://www.123articleonline.com/articles/1204563/data-security-standards-and-some-best-practices</link>
<description>Data security is one of the most prominent concerns of modern enterprises. Owing to its importance, many data privacy laws have been enacted in many countries across the globe; many more are in the offing. These laws, comprehensive in nature, set the standards for enterprises in terms of ensuring data protection.</description>
</item>

<item>
<title>Delivering Single Sign-On: The Three Patterns</title>
<link>https://www.123articleonline.com/articles/1216041/delivering-single-sign-on-the-three-patterns</link>
<description>You understand the integration choices when you are trying to deliver SSO for an application, looking at the various design trends. Basically, there are only three distinct trends.</description>
</item>

<item>
<title>Effective Steps To Improve Cybersecurity</title>
<link>https://www.123articleonline.com/articles/1212250/effective-steps-to-improve-cybersecurity</link>
<description>To ensure that you have achieved the desired balance, reconsider any tradeoffs you have made between tighter protection and greater ease-of-use.</description>
</item>

<item>
<title>Effective Ways of Modernizing Access to PeopleSoft Applications</title>
<link>https://www.123articleonline.com/articles/1195563/effective-ways-of-modernizing-access-to-peoplesoft-applications</link>
<description>Your investment in an ERP plan delivers significant ROI over its lifespan. The best way to ensure your users stay productive is to extend remote access and allow mobile transactions. With an elaborate suite of access controls and fine-grained security features, Appsian helps organizations secure their ERP data. Appsian is the only solution that installs natively into your Peoplesoft Application server and offers contextual access controls, better logging, and analytics</description>
</item>

<item>
<title>Effective Ways to Make ERP Compliance Audits Affordable and Faster</title>
<link>https://www.123articleonline.com/articles/1194610/effective-ways-to-make-erp-compliance-audits-affordable-and-faster</link>
<description>The ERP audit techniques with Appsian can now suit the time and resource allocation needed by current and future data privacy regulations. And because these strategies can be easily integrated into conventional ERP systems that can (at one time) be considered an audit responsibility, you can extend the life of your legacy ERP system - thus maximizing your ROI and not being forced into costly and resource-draining projects</description>
</item>

<item>
<title>Ensuring ERP Data Security Some Easy And Practical Steps</title>
<link>https://www.123articleonline.com/articles/1216925/ensuring-erp-data-security-some-easy-and-practical-steps</link>
<description>Every ERP consumer should have role-based access defined for all datasets. It is also important to divide such access into at least three categories: read-only, export-permitted, and full access, including editing.</description>
</item>

<item>
<title>Enterprise Single Sign-On Improving Usability And Productivity</title>
<link>https://www.123articleonline.com/articles/1216058/enterprise-single-sign-on-improving-usability-and-productivity</link>
<description>Enterprise Single Sign-On (SSO) refers to the simplicity of employees signing in with a single set of credentials only once to access all business software, websites, and data for which they have permission. SSO solves the key issues of the company by providing improved security and compliance, enhanced employee satisfaction and usability, and lower IT costs.</description>
</item>

<item>
<title>ERP System Implementation: Critical Factors To Consider</title>
<link>https://www.123articleonline.com/articles/1226725/erp-system-implementation-critical-factors-to-consider</link>
<description>Without a doubt, enterprise resource planning (ERP) programs are a must for today&#39;s enterprises because of their various advantages. But it is important to know the downsides of the software to ensure that to go for ERP is the best step for your company. The key ERP disadvantages that clients can face are as follows:</description>
</item>

<item>
<title>Establish Enterprise Governance Risk And Compliance In PeopleSoft</title>
<link>https://www.123articleonline.com/articles/1238191/establish-enterprise-governance-risk-and-compliance-in-peoplesoft</link>
<description>As data regulations broaden in scope and cyber threats become sophisticated, companies need to update their security posture to monitor risk factors and comply with new regulations. Risk management and compliance management are two vital components of the security posture of a company. If not well-established, they may lead to catastrophic data breaches, huge fines, legal consequences, etc. Although cybercrime and data breaches are at an all-time high, new rules on data protection have implemented strict guidelines for collecting and using sensitive data.</description>
</item>

<item>
<title>Few Tips for Quick Access to PeopleSoft</title>
<link>https://www.123articleonline.com/articles/1204433/few-tips-for-quick-access-to-peoplesoft</link>
<description>Few Tips for Quick Access to PeopleSoft
1: Identity and Access Management
2: Identity Provider Authentication (IdP)
3: Multi-Factor Authentication (MFA)
4: Avoid Exfiltration of Unauthorized Data
5: Data Access Visibility</description>
</item>

<item>
<title>How does Appsian work with SAP GRC access control</title>
<link>https://www.123articleonline.com/articles/1236339/how-does-appsian-work-with-sap-grc-access-control</link>
<description>One of our product demo attendees at the SAPinsider 2020 virtual conference experience wanted to know how Appsian functions with SAP GRC Access Control. We get this query often as professionals associated with SAP security and system explore ways to add attribute-based access controls (ABAC) to native SAP role-based access controls (RBAC) to streamline and improve access policy management and compliance. At times, there is uncertainty as to whether ABAC enhances or replaces their RBAC. Let&#39;s try to understand how Appsian&#39;s ABAC functions with SAP GRC Access Control and enhances SAP GRC security.</description>
</item>

<item>
<title>How Enhanced Visibility Leads to Effective Compliance Management</title>
<link>https://www.123articleonline.com/articles/1205363/how-enhanced-visibility-leads-to-effective-compliance-management</link>
<description>In ERP systems, data visibility is an especially acute challenge because they store sensitive business data, such as financial information, intellectual property, or bank account details. They&#39;re often the last piece to be updated in the digital infrastructure.</description>
</item>

<item>
<title>How to Ensure Effective SAP Business Policy Management</title>
<link>https://www.123articleonline.com/articles/1205344/how-to-ensure-effective-sap-business-policy-management</link>
<description>As access rules rise in complexity, SAP&#39;s role-based authorization model (RBAC) is reaching its limits. A &#34;role-explosion&#34; has been developed by introducing complexity and overhead to role management through one-off role derivations. And it requires unscalable customizations to enforce access controls, down to a field-value level, beyond the role of a user.</description>
</item>

<item>
<title>How to Implement Segregation of Duties (SoD) in SAP</title>
<link>https://www.123articleonline.com/articles/1205120/how-to-implement-segregation-of-duties-sod-in-sap</link>
<description>One of the main facets of SAP ERP applications is SoD. To maintain a competitive advantage, organizations should invest in ERP data security solutions that arm them with greater visibility and control, along with improved ease.</description>
</item>

<item>
<title>How to Make ERP Compliance Audits Affordable and Faster</title>
<link>https://www.123articleonline.com/articles/1186153/how-to-make-erp-compliance-audits-affordable-and-faster</link>
<description>Whether you are exploring ERP security solutions or looking to expand access to users! schedule your consultation with Appsian that would love the opportunity to discuss your project goals and objectives.</description>
</item>

<item>
<title>How to Streamline the SAP Exemption Process Using Attribute-based Access Controls?</title>
<link>https://www.123articleonline.com/articles/1235744/how-to-streamline-the-sap-exemption-process-using-attribute-based-access-controls</link>
<description>Secure, compliant, and effective business processes are critical for organizations. In SAP, segregation of duties (SAP SOD) is the key that ensures the same</description>
</item>

<item>
<title>How to take care of ERP data security when moving to the cloud</title>
<link>https://www.123articleonline.com/articles/1236016/how-to-take-care-of-erp-data-security-when-moving-to-the-cloud</link>
<description>Apply known as the &#39;crown jewels&#39; of a company, ERP data is the key to the most valuable information about companies, storing and transacting data related to inventory, customers, budgets, sales, payroll, etc.</description>
</item>

<item>
<title>Identity And Access Management System: Features And Advantages</title>
<link>https://www.123articleonline.com/articles/1216755/identity-and-access-management-system-features-and-advantages</link>
<description>The rising threat environment is leaving businesses more vulnerable than ever to phishing, ransomware, and other forms of cyberattacks. No person, device, or workplace can go unprotected. The Zero Trust concept calls for new developments in risk-based multi-factor authentication to be incorporated and user identities to be protected in a converged access environment and drives the need to extend applications to handle them on a scale.</description>
</item>

<item>
<title>Identity and Access Management: Some Challenges</title>
<link>https://www.123articleonline.com/articles/1223964/identity-and-access-management-some-challenges</link>
<description>In today&#39;s digital age, there are more apps that are cloud-based, more resources, more devices, and more users. 94 percent of Chief Information Officers agreed in a recent survey that the technology stack will be more complex in the future, with more apps, data, devices, and transactions.</description>
</item>

<item>
<title>Identity Management and Access Control: An Overview</title>
<link>https://www.123articleonline.com/articles/1202796/identity-management-and-access-control-an-overview</link>
<description>Identity management and access control refer to the process of controlling access to business resources to keep networks and data secure. As a critical component of your security infrastructure, before providing them the correct level of access to workplace systems and information, it can help verify the identity of users. Although individuals can interchangeably use the terms identity management, authentication, and access control, each of these individually acts as separate layers for enterprise security processes.</description>
</item>

<item>
<title>Identity Providers: How Do They Work?</title>
<link>https://www.123articleonline.com/articles/1227545/identity-providers-how-do-they-work</link>
<description>Identity providers (IdPs) store and maintain the digital identities of users for digital and cloud-hosted applications. Using username-password combinations and other variables, an IdP can verify user identities, or it can send a list of user identities to be verified by another service provider such as Single Sign-On solutions.</description>
</item>

<item>
<title>Implementing ERP Some Data Security Tips</title>
<link>https://www.123articleonline.com/articles/1214610/implementing-erp-some-data-security-tips</link>
<description>Since they interact with other internet-connected devices, IoT devices may be vulnerable to cyber-attacks. In fact, for hackers who want access to multiple data sources, IoT devices are prime targets.</description>
</item>

<item>
<title>Implementing Single Sign-On: Some Challenges</title>
<link>https://www.123articleonline.com/articles/1226900/implementing-single-sign-on-some-challenges</link>
<description>SSO software can be applied to both the organization&#39;s internal processes, giving employees better access to corporate services and customer-facing platforms, i.e., various applications, portals, or websites provided to customers by the company and requiring registration and login.</description>
</item>

<item>
<title>Improve Usability And Efficiency With Enterprise Single Sign-On</title>
<link>https://www.123articleonline.com/articles/1227912/improve-usability-and-efficiency-with-enterprise-single-sign-on</link>
<description>Enterprise Single Sign-On (SSO) makes possible the convenience of employees logging in only once to access all company applications, websites, and data that they have approval for with a single set of credentials. By offering better security and compliance, improved employee satisfaction and usability, and lower IT costs, SSO addresses enterprises&#39; key issues.</description>
</item>

<item>
<title>Improving Cybersecurity: Some Strategic Steps</title>
<link>https://www.123articleonline.com/articles/1230142/improving-cybersecurity-some-strategic-steps</link>
<description>In this digital age, the demarcating line between &#39;online&#39; and &#39;offline&#39; is increasingly getting blurred. Ubiquitous networking has made possible many great things, but we are also seeing the drawback now: from anywhere on the globe, we can be found and attacked by malefactors. When it comes to your responsibilities as a security professional, four things stand out:</description>
</item>

<item>
<title>Improving Cybersecurity: Some Strategies</title>
<link>https://www.123articleonline.com/articles/1211349/improving-cybersecurity-some-strategies</link>
<description>Organizations should make cybersecurity a part of the overall business strategy. This involves inculcating a security-first mentality to ensure that protection is ingrained in organizational culture.</description>
</item>

<item>
<title>Improving SAP Access Policy Management: Some Practical Insights</title>
<link>https://www.123articleonline.com/articles/1230349/improving-sap-access-policy-management-some-practical-insights</link>
<description>The past year was a particularly difficult one for companies worldwide. It entailed a phase of intense turmoil and drastic changes. Employees were either laid off or required to take on larger duties. Also, the transition&#39;s magnitude has been massive. A large proportion of the workforce now works remotely. These adjustments must be reflected in the ERP system of organizations and areas such as SAP Access Policy Management.</description>
</item>

<item>
<title>Insider Threats In A Gig Economy: Some Perspectives</title>
<link>https://www.123articleonline.com/articles/1233295/insider-threats-in-a-gig-economy-some-perspectives</link>
<description>Temporary, flexible positions are commonplace in a gig economy, and firms these days prefer to hire freelancers and independent contractors/consultants instead of full-time workers. More employers have relied on non-employee staff this year than ever before. For 2020, forecasts had placed the number of U.S. gig economy employees at 43 percent. This increased dependency on freelancers and third-party employees implies new risks of insider attacks.</description>
</item>

<item>
<title>Integrating Modern Data Security Measures into PeopleSoft</title>
<link>https://www.123articleonline.com/articles/1234286/integrating-modern-data-security-measures-into-peoplesoft</link>
<description>The demand for safe, reliable, robust, and scalable connectivity and agile business systems is higher than ever. People want the latest knowledge always accessible across all systems and devices. The same applies equally well to business systems also. It&#39;s high time connectivity, and integration are seen as strategic parameters of business applications ecosystems.</description>
</item>

<item>
<title>Is a VPN good Enough to Maintain ERP Data Security?</title>
<link>https://www.123articleonline.com/articles/1185934/is-a-vpn-good-enough-to-maintain-erp-data-security</link>
<description>With remote access demands, VPN vendors undoubtedly have their moment. That&#39;s 100% warranted, but organizations should be prepared for the avalanche of bad actors scanning these services, scrutinizing vulnerabilities.</description>
</item>

<item>
<title>Key Dimensions Of Ensuring ERP Data Security</title>
<link>https://www.123articleonline.com/articles/1220415/key-dimensions-of-ensuring-erp-data-security</link>
<description>When attacks on business data grow more complex, the security features of legacy ERP applications are not able to keep up. Initially designed for easy access to data and business processes, Legacy ERP applications have created wide enforcement and security gaps that can lead to disastrous data breaches and millions lost to business policy violations. Outlined here are some approaches to meet the data security challenges successfully.</description>
</item>
</channel>
</rss>
