Posts

Showing posts from August, 2020

SAP HANA's Dynamic Data Masking: The Smarter Way

Image
  SAP HANA - a high-performance in-memory database - accelerates data-driven, real-time decision-making and practice. It supports all workloads with the most extensive advanced analytics on multi-model data, both on-premise and in the cloud. SAP HANA offers a robust security system to help safeguard your data. Apart from the authentication/single sign-on, user/role and authorization management, audit logging, and encryption functionality that already existed, SAP HANA also offers native dynamic data masking functionality. Authorization is the primary means of controlling access. The privilege framework of SAP HANA is based on standard SQL privileges allowing for fine-granular control, with extensions for different use cases such as dashboards or reporting. Roles allow for efficient separation of duties. The functionality of native data masking alters how data appears in views without modifying the underlying data. Since the underlying data remains unchanged, calculations on the masked

Multi-Factor Authentication: 4 Easy Tips to Get the Most Out of It

Image
  Many enterprises think of multi-factor authentication (MFA) as an issue that was solved years ago and which now requires only routine maintenance. Keeping in mind the current scenario worldwide, it is high time the critical role of MFA security solutions in organizations was reexamined. The technology environment was completely different when most organizations first introduced MFA technology. There were only one or two major technology providers, and they offered expensive hardware-based solutions that were unwieldy to use. Today we have hundreds of vendors that deliver versatile and user-friendly solutions running as mobile apps and in many other convenient formats also. Designed for an Older Technology Environment Many organizations are still operating MFA security solutions deployments built around the constraints of yesteryears, rather than today's versatility. These obsolete MFA strategies use the technology to safeguard remote access for workers and highly sensitive info