Security

Enterprise Resource Planning (ERP) significantly bolsters IT security by providing a centralized and integrated approach to safeguarding critical information. ERP systems incorporate robust security features, such as user access controls, encryption, and authentication protocols, ensuring the confidentiality and integrity of sensitive data. Through continuous monitoring and audit trails, ERP enhances visibility into system activities, aiding in the early detection of potential security threats. ERP’s role extends to compliance management, assisting organizations in adhering to regulatory requirements and industry standards. By consolidating data across various business processes, ERP strengthens security measures, minimizing vulnerabilities and offering a comprehensive defense against cyber threats. This integrated approach to IT security fortifies organizations, promoting resilience and protecting against evolving cyber risks.

Mimecast Incydr defends ERPs against Gen AI data risks
Security for innovation: Mimecast Incydr’s defense against DeepSeek and other Gen AI data risks
The rapid growth of generative AI tools like DeepSeek presents significant data security risks for organizations, necessitating enhanced protective measures such as Mimecast's Incydr platform to safeguard intellectual property while promoting safe and effective AI adoption.
SAP security
de Novo Solutions steels cybersecurity for Oracle, ServiceNow ecosystem
de Novo Solutions has successfully achieved re-accreditation of the Cyber Essentials Plus certification, underscoring its commitment to robust cybersecurity and data protection across its operations in the Finance, Procurement, HR, and Payroll sectors amidst rising cyber threats.
Deep Instinct
Deep Instinct blocks zero-day attacks in real time for NetApp and Amazon FSx
Deep Instinct's DSX for Cloud – Amazon FSx NetApp employs advanced AI-driven technology to deliver comprehensive, real-time security against zero-day attacks, ensuring data integrity and operational efficiency for organizations managing hybrid environments.
NTT DATA Okta cybersecurity certification
NTT DATA earns Okta Workforce Identity Cloud Service Specialization in Japan
NTT DATA's Japan operations have achieved the Okta 'Workforce Identity Cloud Service Delivery Specialization,' affirming its expertise in cybersecurity and commitment to enhancing identity and access management services amidst increasing cyber threats.
Cohesity fortifies cyber event response service 
AI-powered data security platform company Cohesity this month announced it has expanded the Cohesity Cyber Event Response Team (CERT) service to include partnerships with a number of incident response (IR) vendors.  The team says that by partnering with IR vendors...
Mimecast Incydr defends ERPs against Gen AI data risks
Accenture expands generative AI-powered cybersecurity services to enhance client resilience
Accenture has launched an enhanced suite of generative AI-powered cybersecurity services to help organizations strengthen their defenses against evolving cyber threats, emphasizing a tailored and proactive approach to tackle industry-specific vulnerabilities.
A man and a woman tapping at a tablet while standing in a glass surrounded office | third-party support
Three common security mistakes in NetSuite
This article highlights common mistakes in configuring NetSuite security, such as over-extending the Administrator role, misunderstanding global permissions, and ignoring configuration settings, while providing best practices to mitigate risks and enhance security.
Image of cybersecurity
Identity security for business applications
The article emphasizes the critical need for robust identity security in business applications to protect sensitive data, highlighting challenges like managing excessive permissions, credential management, and the risks of overprovisioned access, while advocating for integrated Identity Governance and Administration solutions to streamline access management and mitigate these risks.
Maintain continuous user security after the sunsetting of Oracle GRC
As Oracle prepares to end GRC support by May 2025, companies must evaluate their options, including continuing with limited support, shifting to manual processes, or adopting third-party solutions like Fastpath's GRC module, to maintain effective internal controls and compliance.
Close up and blurry image of a laptop that's mostly closed in a dark room | Spinnaker support
How third-party support can provide cybersecurity flexibility
Third-party support specialists like Spinnaker Support offer businesses enhanced software support, including cybersecurity solutions like Spinnaker Shield, which can help organizations manage compliance, security, and legacy technology without being tied to vendor-imposed restrictions.
A green metal gate locked with a brass padlock |
Cybersecurity services are jumping on the AI progress train
As companies increasingly adopt AI technologies for cybersecurity, a recent Capgemini report reveals that while GenAI enhances threat response and detection, it also introduces new risks, prompting firms like Accenture and Dell to bolster their security offerings amid rising cyber threats.
Mimecast Incydr defends ERPs against Gen AI data risks
How to maintain security standards while running legacy systems
Organizations using SAP systems must be proactive about cybersecurity as they transition to unsupported software versions, and partnering with third-party support like Spinnaker and Trend Micro can provide cost-effective security solutions that ensure legacy systems remain protected against cyber threats.
photo of a phone lying on a yellow background with a white lock sign and purple background on the screen | SUSE AI platform for privacy and security
SUSE launches AI platform to ensure customers’ privacy
SUSE has unveiled SUSE AI, a cloud-native platform designed to support the deployment of privacy-focused GenAI applications while ensuring security, compliance and full control for enterprises in regulated industries.
Ransomware
Staying cyber-careful with a security operations center
Protect your business from ransomware attacks with advanced cyber security measures with companies like Codestone.
The FlowDown Episode 3: Behind the Outages – Frontline Strategies for Surviving Global Disruptions
Episode Three focuses on "Behind the Outages: Frontline Strategies for Surviving Global Disruptions?" and the role of Service Operations, where our host and Inetum's own Managing Consultant, Jack Williamson, is joined by ServiceNow's Senior Technical Solutions Consultant, Dominic Colson as well as Inetum's own (ex-clientside) Managing Consultant, Michael Morgan-Lee (MML); to break it down and to share bite-size nuggets of wisdom from all sides.
A darkened room with a man with big headphones sitting at 3 computer screens | Delinea
Data protection in a modern enterprise environment requires a dynamic approach
By having a clearer view and a tighter grip on exactly where privilege is provided throughout an organization, firms can significantly and efficiently improve their enterprise security and protection.
disruptions
Behind the outages: frontline strategies for surviving global disruptions
In ‘The Flowdown’, Inetum and ServiceNow came together to discuss the challenges organizations face during IT disruptions.
Webinar – Why Business Application Security is Central to Your Security Posture
In today’s world of interconnected systems and users from inside and outside organizations, it is more important than ever to secure resources and have a strong security posture to mitigate external and internal threats to systems and data.
Black and white close up of a hand trying to pick an old combination lock | Delinea internal
Data breach culprits could be hiding under a firm’s nose
Most ERP platforms will already have in-built cloud security, or be compatible with most security modules available. Protecting resources from external threats can be a simple process. However, how many firms have measures against internal threats?
CloudCare
The road to CloudCare in the wake of the CrowdStrike outage
Codestone, an IT solutions provider, is an example of a company offering a solution, with its managed service called CloudCare.
Nextworld
Nextworld offers a modern Enterprise Applications Platform that delivers the agility, speed, and intelligence required for businesses to thrive in the digital era. The days of cementing business processes to a single point in time are gone. Nextworld fast tracks...
Fastpath, now part of Delinea
Fastpath, now part of Delinea, is a cloud-based platform that seamlessly integrates identity governance and GRC into one sophisticated yet easy-to-use solution. Effortlessly automate, control, and monitor access – from applications down to individual data records to dramatically reduce risk...
Identity Security Spotlight – Delinea acquires Fastpath
Delinea's acquisition of IGA vendor Fastpath is analyzed by Veza's CEO and CMO, highlighting key lessons and future expectations for 2024.
Image of cybersecurity
Find The Right Tools To Help With SAP Controls
The article emphasizes that using efficient tools like Fastpath for SAP controls is essential for effective ERP management, allowing businesses to automate processes, enhance self-reliance, and proactively manage access and compliance issues.
Okta announces Okta AI and its support for passwordless authentication/ cybersecurity
SAP Controls Series: Get SAP Under Control
The article discusses the complexities and risks associated with SAP access controls, highlighting issues such as improper provisioning, role bleed, and the challenges of managing user access, while emphasizing the need for regular reviews and clear policies to mitigate these risks.
Codestone
We make digital transformation work. We’ll guide your journey in a way that creates competitive advantage through enhanced efficiency, better customer experiences and happier, more productive colleagues.
Is Your Company Cybersecure? Looking into the Key Threats Facing the Financial Services Industry Today
Cybersecurity is not a fresh topic by any means. But even though it’s not new, it’s still important. In fact, recent government reports have shown that 32% of UK businesses were hit by an attack in the previous 12-month period, rising to 59% for medium-sized businesses and 69% for large businesses.