Fortifying Data Protection with NextLabs: Insights from Four Industry Leaders

870 results

  1. How to Identify What Sensitive Data is Leaking Out of Your SAP System

    Every day users extract potentially business-critical information (such as personally identifiable information [PII], financial and sales figures, new product specifications, and much more) from SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can…...…

  2. Protect Sensitive Data in Performance Management with Authorizations: Part 1

    During the objective setting and appraisal process, you need to protect sensitive personnel data. By using HR standard authorizations in combination with customizing settings that restrict appraisal document access, you will be able to set up a secure system in which only legitimate users can access sensitive data. You first need to understand the use…...…

  3. Protecting Sensitive Data Stored in Legacy Databases During Cloud Migration

    In today’s globalized economy, businesses are experiencing the rapid expansion of data while also trying to stay on top of the changes in data protection legislation. Especially in the process of digital transformation and migration to SAP S/4HANA, maintenance of legacy databases can become costly and complicate overall processes by increasing risks of exposure of…

  4. Protect Sensitive Data in Performance Management with Authorizations: Part 2

    You have the option in the Objective Setting and Appraisals (OSA) component to use structural authorizations to control access to appraisal documents. Two scenarios help you to understand the concept. Key Concept Structural authorizations for HR personnel data are used to grant authorizations based on objects and relationships in organizational structures. You assign structural authorizations…...…

  5. Protect Sensitive Data in Performance Management with Authorizations: Part 3

    During the objective setting and appraisal process, you need to protect sensitive personnel data. By using HR standard authorizations in combination with customizing settings that restrict appraisal document access, you are able to set up a secure system in which only legitimate users can access sensitive data. These customizing settings help you set up a…...…

  6. Prevent Users from Accessing Sensitive Data Using Authorization Restrictions

    Reading time: 11 mins

    Securing information within an SAP BW system is necessary, but it can be difficult because of the massive volumes of sensitive data that are stored in the system. Learn how to develop authorization restrictions for InfoObjects via transaction RSSM so end users can access only relevant data. Key Concept SAP BW has two types of authorization…...…

  7. Secure Data Masking for Sensitive Data

    Click Here to View the Session Deck Threats to data security are common, and while hackers and breaches create headlines, many organizations are at risk of data insecurity, specifically in non-productive or support systems. Included will be a short demonstration of Libelle DataMasking, a software solution to obfuscate sensitive data, as well as a Q&A…...…

  8. Support Regulatory Compliance Across Your SAP Landscape with SAP Data Privacy Integration

    While it is important for businesses to ensure data privacy to gain the trust of both customers and business partners, the protection of this data is critical for adhering to the regulations that countries are introducing at a growing rate, with more data privacy bills introduced in 2020 compared to 2019. These regulations — such…

  9. Monitor Sensitive Fields with R/3’s Dual Control Functionality

    The standard SAP dual control principle imposes segregation of duties for changes to sensitive fields while allowing changes to be made by one person to non-sensitive fields. Key Concept Dual control functionality forces changes made to sensitive fields in customer and vendor master records always to be checked by another authorized employee. Even if two…...…

  10. Putting Data Intelligence into Action with BigID

    Many large enterprises that are decades old have gone through numerous upgrades, mergers, migrations, and more – this leaves data scattered across different types of storage systems, mainframes, message systems, and more. A robust data management strategy is essential in helping these businesses operate efficiently and avoid any regulatory issues. To gain insight into how…