CSI tools Facebook CSI tools Twitter CSI tools LinkedIn CSI tools Instagram
  • Home
  • Newsroom
    • Awards
    • Events
    • Press Releases
    • Publications
  • Software
    • By Solution
      1. Access Risk Management
      2. Access Request Management
      3. Privileged Access Management
      4. Access Role Management
      5. SAP License Audit
      6. Mass User Maintenance
    • Tools
      1. CSI Authorization Auditor
      2. CSI Automated Request Engine
      3. CSI Emergency Request
      4. CSI Role Build & Manage
      5. CSI Mass User Maintenance
      6. CSI Integrate & Collaborate
    • Pathlock
    • Legacy Tools
    • Pathlock Cloud: The Successor of CSI tools
  • Customer Center
  • Community
    • CSI tools Forum
    • Meta's Blog
    • Tech Updates
    • Training
  • About
    • Contact
    • Jobs
    • Partners
      • Become a Partner
    • References
    • Testimonials
    • Sustainability
  • Login
  • You are here:  
  • Home
  • CSI Accelerator Release Notes
  • Meta's Blog

The Power of Workflow

Details
Last Updated: Wednesday, 07 July 2021 11:10
Published: Wednesday, 04 August 2021 13:11

The Power of Workflow

Workflow makes life easier: it helps streamlining and automate tasks, minimize rooms for error and will increase efficiency. In processes where multiple persons are involved, like the user provisioning process, implementing a workflow can enhance the efficiency of the whole team.

Read more ...

The NIST framework for SAP Access Security

Details
Last Updated: Wednesday, 07 July 2021 11:08
Published: Monday, 21 October 2019 16:46

The NIST Framework explained

The Framework enables all organizations - regardless of size, degree of cybersecurity risk, location (in or outside US) or cybersecurity sophistication - to apply the principles and best practices of risk management to improve the cybersecurity. This can be done by assembling predefined and best-practice standards, guidelines, and practices.

The NIST Framework is a risk-based approach and consists of three parts: The Framework Core, the Framework Profile, and the Framework Implementation Tiers.

Read more ...

Who has access to your business critical and sensitive SAP data?

Details
Last Updated: Friday, 15 November 2019 15:48
Published: Wednesday, 04 September 2019 16:43

 CSI SAPAccessControl Banner2 v02

Read more ...

What are the pros and cons of converting authorization fields to organizational levels?

Details
Last Updated: Thursday, 05 September 2019 11:56
Published: Wednesday, 14 August 2019 14:27

If business requires, it's possible in SAP to promote non-organizational authorization fields to organizational fields. This can be done using PFCG_ORGFIELD_CREATE. However, upon use it is possible that you receive the message that the program has become obsolete. To counter this, SAP has delivered a new transaction: SUPO/SUPO_SEL (see note 2625102). Once done in DEV, you will need to do this in QAS and PROD, and do the field conversion as well because the conversion is NOT transportable.

Read more ...

Security risks of Robotic Processing Automation (RPA) in SAP

Details
Last Updated: Tuesday, 04 December 2018 13:32
Published: Tuesday, 04 December 2018 13:01

Nowadays we see an increase in Robotic Processing Automation (RPA). RPA is based on executing automated scripts, by software bots. So, RPA can operate in place of a human being and therefore save time and costs.

RPA in SAP comes with risks for data leakage and fraud of the business critical and sensitive data, therefore governance and security is of great importance. This blog gives insight into these security risks and how to tackle them.

Read more ...

Subcategories

Blog
Article Count:
22

Page 1 of 5

  • Start
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
  • End

Get in touch

Pathlock Benelux
Support Direct
Link to the support portal https://support.pathlock.com

To gain access to the new support portal, please contact us at customersupport@pathlock.com

Tel. +32 16 308 008

Address
Kempische Steenweg 303/200
B-3500 Hasselt, Belgium

Via phone
Tel: +32 16 308 000

Last Updates

  • Pathlock Cloud: The Successor of CSI tools
  • Pathlock named Market Leader for Zero Trust by Cyber Defense Magazine

Solutions

  • SoD and Risk analysis - CSI Authorization Auditor
  • Compliant Provisioning - CSI Automated Request Engine
  • Emergency Access Management - CSI Emergency Request
  • Compliant Role and Mass User Management - CSI Role Build & Manage
  • Extract SAP data - CSI Data Xtractor
  • CSI Integrate & Collaborate

©1997-2025 Pathlock Benelux. All rights reserved. - Privacy Policy  - Cookie Policy - Code of Ethical Conduct - Sitemap