CATEGORY

Security and Risk

ERP Attacks Are On The Rise: Protect Against Insider Threats and External Attacks Across Business Critical Systems

Organizations rely heavily on Enterprise Resource Planning (ERP) systems and applications to power their businesses, manage critical processes (product lifecycle management, customer relationship management, supply chain management, etc.) and ensure a continuous, open flow of…

The History, Evolution and Opportunity: System for Cross Identity Management (SCIM) Server Technologies

The History and Evolution Development on the System for Cross Identity Management (SCIM) specifications has been an ongoing effort with contributions from industry experts across every aspect of security. Originally, SCIM technology was created to…

The Power of Integrating Privileged Access Security and Identity Governance

Privileged access across the enterprise continues to increase exponentially, and it’s not hard to see why. Interconnectivity, cloud and mobile-first strategies have enabled a distributed enterprise, in which more people work from home, on the…

Protecting Critical Business Systems: Five SAP Use Cases Protected by CyberArk

In November, we wrote a blog about the “7 types of privileged accounts you should know” to highlight potential privilege-related security risks. Today, we are spotlighting  five powerful user accounts frequently found in SAP environments….

Maximize Your Investments in Identity Governance and Privileged Access Security with CyberArk and SailPoint

Privileged access security is too often implemented independently from an identity governance solution, which can create siloes, inefficiencies and prevent full visibility across an identity’s user access lifecycle. To enhance the reliability and flexibility of…