According to a report from the Information Commissioner (ICO), data breaches are up 75% in two years. Research from the Identity Theft Resource Center also state that the number of breaches at U.S. businesses, government agencies, and more topped 1,300 last year, versus less than 200 in 2005.
Compromised credentials, unauthorized data sharing, and privilege abuse have caused some of the most severe data breaches across the globe. Organizations have always prioritized traditional network security; however, threats are increasingly becoming user-centric, originating at the application level.
In today’s security environments (governed by mobile devices, remote connectivity, and web-facing applications) identity has become the new network perimeter. The first line of defense is no longer a network firewall – it’s now your end users.
Modern threats have evolved to exploit these new weaknesses and unfortunately many organizations have lagged behind.
A Look at ERP Breaches, Inside and Out
Appsian has compiled a whitepaper using several recent cases where alarming data breaches impacted prominent global organizations. Addressing the top internal and external threat vectors, these breaches highlight the need for critical security features that can prevent the loss of PII, allow for faster detection and response, and aid in maintaining regulatory compliance.
In this whitepaper we explore a number of headline-grabbing breaches and highlight concerns from the perspective of preventing breaches, protecting data, and fast-tracking remediation and response tasks.
Download the Whitepaper HERE.
PeopleSoft Application Security
PeopleSoft applications are the core of an organization’s financial, personnel and corporate operations. The amount of PII across these applications makes them a crucial part of your organization’s security strategy. With evolving threats, the security stature of ERP applications needs to evolve too. But, despite robust security features, out-of-the-box PeopleSoft applications are not prepared to tackle modern security threats and regulatory compliance.