SECUDE

Displaying 1-14 of 14 results

  • White Papers // Sep 2009

    Smart Enterprise Single Sign-on

    What is needed is an Enterprise Single Sign-On (E-SSO) solution that allows end-users to securely authenticate once and then access their desktop and their enterprise applications. And that is able to support all administrative and operational tasks required to efficiently use such a solution in an enterprise environment. This white...

    Provided By SECUDE

  • White Papers // Jun 2009

    Creating a Javascript Modal Dialog Window Within an SAP Identity Center 7.0 Workflow Task

    SAP's workflow tasks, within Identity Center 7.0, tend to have a very rigid and plain structure. There's no simple way to break up a task into a wizard type interface, or a task with multiple steps. None of the tasks are user-friendly or aesthetically pleasing. This paper explains how to...

    Provided By SECUDE

  • White Papers // Jun 2009

    Already Working or Still Authenticating Again, Again, and Again?: Smart Enterprise Single Sign-On

    Authentication with username and passwords can be reduced to this provocative and simple quote. When ones factor in security, the explosion in passwords to access sensitive company data and IT systems is actually reducing security. This means that the application of a Single Sign-On solution allows for greater security and...

    Provided By SECUDE

  • White Papers // May 2009

    Protecting Digital Assets

    Full Disk Encryption (FDE) is the safest way to protect digital assets, including both those of company as well as customers. If mobile devices such as laptops are stolen, FDE protects the information stored on them while also protecting a corporation's most valued asset: its intellectual property. By encrypting the...

    Provided By SECUDE

  • White Papers // May 2009

    How to Improve Business Results Through Secure Single Sign-On for SAP

    This whitepaper shows how to improve company's business results by improving user and IT productivity, and by avoiding this specific IT security risk within SAP environment. One will get insights into the security situation around communication in distributed SAP environments, one will get an overview of Secure Network Communications (SNC),...

    Provided By SECUDE

  • White Papers // May 2009

    Secure Folder

    This paper describes the functions of Secure Folder and its associated components. It is also intended to provide an overview of the features and performance characteristics of this product. Sensitive information, such as research, financial, customer and personal data, must only be accessible to certain work groups and project teams....

    Provided By SECUDE

  • White Papers // May 2009

    Automated Vulnerability Assessments for SAP NetWeaver: Protecting Your Business Processes and ReducingAudit Costs

    Many successful companies rely on SAP business solutions to automate and manage their business processes, making the SAP systems the central IT solution to store company-critical information and to drive business activity. For many businesses, a problem with the stability of the SAP environment or a leak of company-confidential data...

    Provided By SECUDE

  • White Papers // May 2009

    Cost-Effective Compliance With FDA Regulations for Your SAP Applications

    Pharmaceutical companies operate in one of the most highly-regulated industries in the world. As most companies sell to a global market they have to manage compliance with an increasing set of regulations around the world - most importantly the FDA regulations, such as FDA 21 CFR Part 11, if the...

    Provided By SECUDE

  • White Papers // May 2009

    How Secure Is a Password?: IT Security Attitudes in the USA Versus Europe and Asia

    The US customer is mostly concerned with productivity issues than with security. The US user wants to achieve a fast boot up of the PC and ease-of-use of any tools and not be slowed down due to encryption processes. In Europe the initial concern of management is to maintain security...

    Provided By SECUDE

  • White Papers // May 2009

    Secude Global Consulting Unified Selection Model

    Information Technology managers face a wide array of choices irrespective of current economic conditions: Which project to fund? Which technology to deploy? Secude Global Consulting has developed a selection model that uses the strengths of system 1 (intuition) and system 2 (rational) thinking while attempting to reduce their weaknesses, all...

    Provided By SECUDE

  • White Papers // Apr 2009

    Latent Vulnerabilities in Custom ABAP Code

    The growth of SAP since its founding in 1972 has made it the dominant ERP solution provider. Few companies can use SAP "As Is," and therefore must customize it to their business processes. With few exceptions, much of the custom ABAP code has never been subjected to rigorous code audits....

    Provided By SECUDE

  • White Papers // Apr 2009

    Achieving Compliance Through Transaction-Based Re-Authentication

    Enterprises which operate under strict regulations, have implemented exacting security policies or may have a strong need to confirm and trace sensitive business transactions in detail. Examples include release of a high value purchase order, pre-paid expenses, invoices, signing off on a drug quality control check or confirming participation in...

    Provided By SECUDE

  • White Papers // Mar 2009

    Is Accepting SOD Violations in Security Roles Ever Justified?

    An important policy issue with strong corporate governance implications in SAP-enabled enterprises is whether to permit the design of security roles containing embedded Segregation of Duties (SOD) violations. SAP best practice clearly recommends against it, and most companies prohibit the practice, believing it signals a lack of control. This paper...

    Provided By SECUDE

  • White Papers // Aug 2008

    Strategies for Creating an Authoritative Store

    Creation of an Authoritative Store is a key component of an Identity Management Infrastructure. The Authoritative Store can be created using a number of different strategies. The determination of the best strategy is by a thorough analysis of sources, database resources, available data synchronization tools and the IAM tools in...

    Provided By SECUDE

  • White Papers // May 2009

    Protecting Digital Assets

    Full Disk Encryption (FDE) is the safest way to protect digital assets, including both those of company as well as customers. If mobile devices such as laptops are stolen, FDE protects the information stored on them while also protecting a corporation's most valued asset: its intellectual property. By encrypting the...

    Provided By SECUDE

  • White Papers // May 2009

    How to Improve Business Results Through Secure Single Sign-On for SAP

    This whitepaper shows how to improve company's business results by improving user and IT productivity, and by avoiding this specific IT security risk within SAP environment. One will get insights into the security situation around communication in distributed SAP environments, one will get an overview of Secure Network Communications (SNC),...

    Provided By SECUDE

  • White Papers // May 2009

    Secure Folder

    This paper describes the functions of Secure Folder and its associated components. It is also intended to provide an overview of the features and performance characteristics of this product. Sensitive information, such as research, financial, customer and personal data, must only be accessible to certain work groups and project teams....

    Provided By SECUDE

  • White Papers // Mar 2009

    Is Accepting SOD Violations in Security Roles Ever Justified?

    An important policy issue with strong corporate governance implications in SAP-enabled enterprises is whether to permit the design of security roles containing embedded Segregation of Duties (SOD) violations. SAP best practice clearly recommends against it, and most companies prohibit the practice, believing it signals a lack of control. This paper...

    Provided By SECUDE

  • White Papers // Apr 2009

    Latent Vulnerabilities in Custom ABAP Code

    The growth of SAP since its founding in 1972 has made it the dominant ERP solution provider. Few companies can use SAP "As Is," and therefore must customize it to their business processes. With few exceptions, much of the custom ABAP code has never been subjected to rigorous code audits....

    Provided By SECUDE

  • White Papers // Jun 2009

    Already Working or Still Authenticating Again, Again, and Again?: Smart Enterprise Single Sign-On

    Authentication with username and passwords can be reduced to this provocative and simple quote. When ones factor in security, the explosion in passwords to access sensitive company data and IT systems is actually reducing security. This means that the application of a Single Sign-On solution allows for greater security and...

    Provided By SECUDE

  • White Papers // Sep 2009

    Smart Enterprise Single Sign-on

    What is needed is an Enterprise Single Sign-On (E-SSO) solution that allows end-users to securely authenticate once and then access their desktop and their enterprise applications. And that is able to support all administrative and operational tasks required to efficiently use such a solution in an enterprise environment. This white...

    Provided By SECUDE

  • White Papers // Aug 2008

    Strategies for Creating an Authoritative Store

    Creation of an Authoritative Store is a key component of an Identity Management Infrastructure. The Authoritative Store can be created using a number of different strategies. The determination of the best strategy is by a thorough analysis of sources, database resources, available data synchronization tools and the IAM tools in...

    Provided By SECUDE

  • White Papers // May 2009

    Secude Global Consulting Unified Selection Model

    Information Technology managers face a wide array of choices irrespective of current economic conditions: Which project to fund? Which technology to deploy? Secude Global Consulting has developed a selection model that uses the strengths of system 1 (intuition) and system 2 (rational) thinking while attempting to reduce their weaknesses, all...

    Provided By SECUDE

  • White Papers // Jun 2009

    Creating a Javascript Modal Dialog Window Within an SAP Identity Center 7.0 Workflow Task

    SAP's workflow tasks, within Identity Center 7.0, tend to have a very rigid and plain structure. There's no simple way to break up a task into a wizard type interface, or a task with multiple steps. None of the tasks are user-friendly or aesthetically pleasing. This paper explains how to...

    Provided By SECUDE

  • White Papers // May 2009

    Automated Vulnerability Assessments for SAP NetWeaver: Protecting Your Business Processes and ReducingAudit Costs

    Many successful companies rely on SAP business solutions to automate and manage their business processes, making the SAP systems the central IT solution to store company-critical information and to drive business activity. For many businesses, a problem with the stability of the SAP environment or a leak of company-confidential data...

    Provided By SECUDE

  • White Papers // Apr 2009

    Achieving Compliance Through Transaction-Based Re-Authentication

    Enterprises which operate under strict regulations, have implemented exacting security policies or may have a strong need to confirm and trace sensitive business transactions in detail. Examples include release of a high value purchase order, pre-paid expenses, invoices, signing off on a drug quality control check or confirming participation in...

    Provided By SECUDE

  • White Papers // May 2009

    Cost-Effective Compliance With FDA Regulations for Your SAP Applications

    Pharmaceutical companies operate in one of the most highly-regulated industries in the world. As most companies sell to a global market they have to manage compliance with an increasing set of regulations around the world - most importantly the FDA regulations, such as FDA 21 CFR Part 11, if the...

    Provided By SECUDE

  • White Papers // May 2009

    How Secure Is a Password?: IT Security Attitudes in the USA Versus Europe and Asia

    The US customer is mostly concerned with productivity issues than with security. The US user wants to achieve a fast boot up of the PC and ease-of-use of any tools and not be slowed down due to encryption processes. In Europe the initial concern of management is to maintain security...

    Provided By SECUDE