Securing SAP HR Data Beyond
HCM Authorizations
A presentation by
HR documents contain confidential
information including:
•  Social Security Numbers
•  Drivers License Numbers
•  Date of Birth
•  Bank details
•  Payroll
HR documents contain confidential
information including:
•  Social Security Numbers
•  Drivers License Numbers
•  Date of Birth
•  Bank details
•  Payroll
This information needs to be highly protected
HR Data is Constantly on the Move
4	
  
HR Data is exported from SAP
–  Reporting
–  Data crunching
–  Analysis
Cloud & Mobility
–  Explosion of cloud services
and providers
–  BYOD: are you losing track of
your data?
Not only that but…
•  Companies are required to abide by compliance
regulations, such as:
–  HIPAA
–  SOX
–  Safe Harbor
What is SAP HR
•  Human Resources Management Software
–  On premise and cloud solutions
–  Recruit, hire, fire talent
–  Local laws and regulation compliance
–  Standardize payroll
–  Manage attendance, schedules, and vacation time
–  Support core business operations
The Landscape
•  SAP’s HCM Module
–  Data is stored on-premise
–  Accessible by everyone with access to the server
•  Success Factors
–  Data is stored in the cloud
–  Data can be shared and manipulated by anyone –
no tracking
•  Hybrid
–  Data is stored both on-premise and in the cloud
–  Data moves between the two with no protection
7	
  
The Landscape
•  SAP’s HCM Module
–  Data is stored on-premise
–  Accessible by everyone with access to the server
•  Success Factors
–  Data is stored in the cloud
–  Data can be shared and manipulated by anyone –
no tracking
•  Hybrid
–  Data is stored both on-premise and in the cloud
–  Data moves between the two with no protection
8	
  
The Landscape
•  SAP’s HCM Module
–  Data is stored on-premise
–  Accessible by everyone with access to the server
•  Success Factors
–  Data is stored in the cloud
–  Data can be shared and manipulated by anyone –
no tracking
•  Hybrid
–  Data is stored both on-premise and in the cloud
–  Data moves between the two with no protection
9	
  
SAP HR Security
•  3 main security features
–  Infotypes
–  Structural Authorizations
–  Personnel Number Restrictions
Infotypes
•  Units containing master data in SAP HR
•  Used in recording employee data, payroll data, and
administrative data
•  Creates fields and groups them together and enables
time-dependent storage
•  Infotype restrictions are extremely important since
master data is the core of HR data and needs to be
restricted.
Structural Authorizations
•  The data a user can access can be restricted by using
either
–  Enterprise Structure: Groups/Departments, Codes,
Individual user files
–  Organizational Structure: Common areas, overall use of
the system
•  Structural authorizations allow restrictions to be
configured on the organizational structure.
Personnel Number Restrictions
•  Users can be restricted using the authorization object
P_PERNR to only accessing infotypes regarding their
own personal data
–  For example: checking your own hours or schedule
–  Known as ESS (Employee Self Service)
•  Personnel Number Restrictions can allow HR admin to
access employee data while preventing them from
viewing their own
–  For example: Remove the capability to change own hours
worked
Data needs to be protected inside &
outside of company walls
SafeNet. (2014, April 17). First Quarter Recap 2014. Retrieved May 19, 2014, from Breach Level Index:
www.breachlevelindex.com
	
  
Look Familiar?
Much of this
information is
commonly found
amongst HR
data
2010	
  Javelin	
  Strategy	
  and	
  Research	
  
How it is used
More often then
not, the information
is used in millions
of identity fraud
incidents
How did they get the data?
Unprotected
data and
unsecure data
movement
leaves PII
(Personally
Identifiable
Information)
vulnerable
Extend Protection Beyond
Boundaries of SAP
Data is protected when it is stored in SAP
Extend Protection Beyond
Boundaries of SAP
Once the data leaves SAP, it no longer has the protection
Extend Protection Beyond
Boundaries of SAP
Employees
Employees use the
information in everyday
job-related activities
Extend Protection Beyond
Boundaries of SAP
Employees
File Server
They store the
information in various
locations
Extend Protection Beyond
Boundaries of SAP
Employees
File Server
Employees can also upload sensitive data to
cloud platforms for collaboration, without
regards to security.
Extend Protection Beyond
Boundaries of SAP
Partner
Employees
File Server
The data can be shared with partners
Extend Protection Beyond
Boundaries of SAP
Competitor
Partner
Employees
File Server
And also forwarded to competitors
Extend Protection Beyond
Boundaries of SAP
Competitor
Partner
Employees
File Server
ALL	
  HAPPENING	
  WITHOUT	
  PROTECTION	
  
HR Data Needs Protection
EVERY
WHERE
IT
GOES!
Protecting SAP NetWeaver
Protect data inside of SAP
–  Roles & Authorizations
•  Check HCM Authorizations in new and existing roles
•  Review PLOG in existing roles
•  Restrict OTYPE
•  Check P_ABAP in existing roles
Extend protection to data leaving SAP
–  Authorizations need to be extended to wherever the data
goes
28	
  
Traditional Security Solutions
Network
•  Network
–  Data Loss Prevention (DLP)
–  Firewalls
–  Virtual Private Network (VPN)
	
  
Traditional Security Solutions
Network
Storage
•  Network
–  Data Loss Prevention (DLP)
–  Firewalls
–  Virtual Private Network (VPN)
•  Storage
–  Full Disk Encryption (FDE)
–  Database Encryption	
  
Traditional Security Solutions
•  Network
–  Data Loss Prevention (DLP)
–  Firewalls
–  Virtual Private Network (VPN)
•  Storage
–  Full Disk Encryption (FDE)
–  Database Encryption
•  File
–  Pretty Good Privacy (PGP)
–  Information Rights
Management (IRM)
Network
Storage
File
Latest	
  technologies	
  apply	
  protecCon	
  at	
  the	
  file/data	
  
level,	
  which	
  results	
  in	
  persistent	
  security	
  no	
  maLer	
  
where	
  the	
  file	
  travels	
  to	
  	
  
Rights Management (RMS) are offerings from Microsoft
that help keep an organizations information
Microsoft is the leader in the file/
data centric protection
SECURE
Rights Management (RMS) are offerings from Microsoft
that help keep an organizations information
Microsoft is the leader in the file/
data centric protection
Data-centric protection
Protection is applied directly to the data and documents
	
  
Data-centric protection
Protection is applied directly to the data and documents
	
  
Wherever the data is moved
	
  
Data-centric protection
Protection is applied directly to the data and documents
	
  
Wherever the data is moved
	
  
THE PROTECTION STAYS WITH IT
	
  
HR and Other Documents are
Protected
•  At a single location
On	
  premise	
  
HR and Other Documents are
Protected
•  Inside and outside the
organization
•  At a single location
Partner	
  
On	
  premise	
  
Shared	
  
HR and Other Documents are
Protected
•  Inside and outside the
organization
•  At a single location
u  And when moving amongst various locations
Partner	
  
On	
  premise	
  
Shared	
  
CollaboraCon	
  
Fine-grained control
•  Content owners can define who can
–  Open the document
–  Edit the contents
–  Print the document
–  Forward to anyone, internal or external
–  Take other actions with the information
Can RMS data-centric protection be
extended to SAP HR data?
Halocore for SAP NetWeaver
•  Innovative: Enforces RMS protection on all data leaving SAP
•  Secure: Determines what users are authorized to access sensitive data
•  Customizable: Offers fine-tuned control over who can do what with
information (view, edit, print, forward, etc.)
•  Flexible: Works for any file type
•  Powerful: Protection persists beyond SAP, including mobile platforms
Auditing Capabilities –
Customizing your view
Auditing Capabilities –
The Log File
FOR MORE INFORMATION
Click the link below to learn how Halocore for SAP NetWeaver can
protect your confidential HR information, no matter where it goes.
Not Sure Where to Start?
•  Download FREE audit tool for SAP to monitor HR and
other sensitive data movement
•  Monitor the activities surrounding your information
–  Track, record and classify data movement
–  Identify who accesses it
–  From where they access it (IP address & terminal)
–  Where they send it to
–  Extract data for analysis
DOWNLOAD FREE
AUDIT TOOL NOW
Click HERE
PRESENTATION BY
Tweet us @secude
Contact us info@secude.com

More Related Content

PPT
Organizational Management-SAP HR
PPT
SAP BI 7 security concepts
PPTX
Operational Data Vault
PPT
Sap Hr Presentation 08052002
PPTX
Data Protection Officer Dashboard | GDPR
PDF
SAP HCM - Organization Management end user presentation
DOCX
03. Business Information Requirements Template
DOCX
SAP Security important Questions
Organizational Management-SAP HR
SAP BI 7 security concepts
Operational Data Vault
Sap Hr Presentation 08052002
Data Protection Officer Dashboard | GDPR
SAP HCM - Organization Management end user presentation
03. Business Information Requirements Template
SAP Security important Questions

What's hot (20)

PDF
Company Orientation Process PowerPoint Presentation Slides
PPTX
SAP HR AND HCM Interview questions
PPTX
SuccessFactors Employee Central
PDF
Data visualization in a Nutshell
PPTX
SAP Data Services
PPTX
SAP Governance,Risk and Compliance
PDF
SAP S4HANA FIORI Overview for SAP FICO Module
PPTX
Data Vault and DW2.0
PDF
Sapwebinar2 how 2transition2s4hanagetyourdatacleanandkeepitclean1569951002523
PDF
Digital Core Transformation - SAP S/4HANA
PDF
Sap audit programs_and_ic_qs
PDF
Steps to build SAP SuccessFactors support model
DOC
Authorisation Concept In SAP | http://sapdocs.info
PPTX
SAP GRC AC 10.1 - ARM Workflows
PDF
Building an Effective & Extensible Data & Analytics Operating Model
PPTX
SAP Success Factors Online Training
PDF
ISO 27001_2022 Standard_Presentation.pdf
PPT
SAP grc
PPT
Succesfactors Concepts
Company Orientation Process PowerPoint Presentation Slides
SAP HR AND HCM Interview questions
SuccessFactors Employee Central
Data visualization in a Nutshell
SAP Data Services
SAP Governance,Risk and Compliance
SAP S4HANA FIORI Overview for SAP FICO Module
Data Vault and DW2.0
Sapwebinar2 how 2transition2s4hanagetyourdatacleanandkeepitclean1569951002523
Digital Core Transformation - SAP S/4HANA
Sap audit programs_and_ic_qs
Steps to build SAP SuccessFactors support model
Authorisation Concept In SAP | http://sapdocs.info
SAP GRC AC 10.1 - ARM Workflows
Building an Effective & Extensible Data & Analytics Operating Model
SAP Success Factors Online Training
ISO 27001_2022 Standard_Presentation.pdf
SAP grc
Succesfactors Concepts
Ad

Viewers also liked (20)

PDF
SAP SECURITY GRC
PPTX
SAP HCM authorisations: streamline processes and improve HR data security
PDF
Practical guide for sap security
PPT
SAP HCM Structural Authorization Overview Presentation
PPT
Sap Security Workshop
PDF
Introduction to SAP Security
PPTX
Sap grc process control 10.0
PDF
SAP GRC 10 Access Control
PPT
PDF
Pivotal Role of HR in Cybersecurity
PDF
Etkin Yetki Yönetimi - SAP GRC Access Control
PPT
HR Outsourced Services
PDF
WEBINAR - A New Era in HR Security for SAP
PPT
Hans Henseler - Intelligent data analysis for improving public security - Da...
PDF
Smarter Application and Data Security in PeopleSoft
PPTX
SAP HANA SPS08 Security
PPT
People soft profile management 9 1
PPTX
Security in HR... How secure are your files, really?
PPTX
Unit 6 Privacy and Data Protection 8 hr
PDF
SAP Governance, Risk and Compliance (GRC)
SAP SECURITY GRC
SAP HCM authorisations: streamline processes and improve HR data security
Practical guide for sap security
SAP HCM Structural Authorization Overview Presentation
Sap Security Workshop
Introduction to SAP Security
Sap grc process control 10.0
SAP GRC 10 Access Control
Pivotal Role of HR in Cybersecurity
Etkin Yetki Yönetimi - SAP GRC Access Control
HR Outsourced Services
WEBINAR - A New Era in HR Security for SAP
Hans Henseler - Intelligent data analysis for improving public security - Da...
Smarter Application and Data Security in PeopleSoft
SAP HANA SPS08 Security
People soft profile management 9 1
Security in HR... How secure are your files, really?
Unit 6 Privacy and Data Protection 8 hr
SAP Governance, Risk and Compliance (GRC)
Ad

Similar to HR Security in SAP: Securing Data Beyond HCM Authorizations (20)

PPTX
Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons Learned
PPTX
Deep dive into Microsoft Purview Data Loss Prevention
PPT
Unit_5 grid and cloud comuting security.pt
PPTX
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
PPTX
Securing your Cloud Deployment
PDF
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
PDF
Data Governance for Data Lakes
PPTX
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
PPTX
Data Loss Prevention in O365
PDF
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
PDF
Distributed Data Across Cloud and On-Premises: Opportunities and Challenges
PDF
Application Architectures with Hadoop
PDF
Application Architectures with Hadoop | Data Day Texas 2015
PPTX
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
PDF
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
PPTX
Architecting Applications with Hadoop
PPTX
Breakdown of Microsoft Purview Solutions
PPTX
HSPUG presentation - Advanced Data Governance
PDF
GDPR/CCPA Compliance and Data Governance in Hadoop
PPTX
Fuse Analytics - HR & Payroll Cloud Transformation Pitfalls, Lessons Learned
Deep dive into Microsoft Purview Data Loss Prevention
Unit_5 grid and cloud comuting security.pt
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Securing your Cloud Deployment
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
Data Governance for Data Lakes
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
Data Loss Prevention in O365
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Distributed Data Across Cloud and On-Premises: Opportunities and Challenges
Application Architectures with Hadoop
Application Architectures with Hadoop | Data Day Texas 2015
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Introducing Trillium DQ for Big Data: Powerful Profiling and Data Quality for...
Architecting Applications with Hadoop
Breakdown of Microsoft Purview Solutions
HSPUG presentation - Advanced Data Governance
GDPR/CCPA Compliance and Data Governance in Hadoop

More from UL Transaction Security (8)

PPTX
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
PPTX
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
PPTX
BREACHED: Data Centric Security for SAP
PDF
Perimeter Security is Failing
PPTX
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
PDF
BYOD Webinar for SAP: Securing Data in a Mobile World
PDF
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
PPTX
What's New in Microsoft Rights Management Services
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
BREACHED: Data Centric Security for SAP
Perimeter Security is Failing
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
BYOD Webinar for SAP: Securing Data in a Mobile World
Mobility & BYOD: Leveraging Best Practices and Latest Technologies for Compre...
What's New in Microsoft Rights Management Services

Recently uploaded (20)

PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PPTX
How to Odoo 19 Installation on Ubuntu - CandidRoot
DOC
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PPTX
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
PDF
Wondershare Recoverit Full Crack New Version (Latest 2025)
PPTX
most interesting chapter in the world ppt
PPTX
Lecture 5 Software Requirement Engineering
PPTX
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PDF
Workplace Software and Skills - OpenStax
PDF
Type Class Derivation in Scala 3 - Jose Luis Pintado Barbero
PPTX
Computer Software - Technology and Livelihood Education
PDF
iTop VPN Crack Latest Version Full Key 2025
PPTX
GSA Content Generator Crack (2025 Latest)
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
CCleaner 6.39.11548 Crack 2025 License Key
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
How to Odoo 19 Installation on Ubuntu - CandidRoot
UTEP毕业证学历认证,宾夕法尼亚克拉里恩大学毕业证未毕业
Topaz Photo AI Crack New Download (Latest 2025)
4Seller: The All-in-One Multi-Channel E-Commerce Management Platform for Glob...
Wondershare Recoverit Full Crack New Version (Latest 2025)
most interesting chapter in the world ppt
Lecture 5 Software Requirement Engineering
MLforCyber_MLDataSetsandFeatures_Presentation.pptx
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
BoxLang Dynamic AWS Lambda - Japan Edition
Workplace Software and Skills - OpenStax
Type Class Derivation in Scala 3 - Jose Luis Pintado Barbero
Computer Software - Technology and Livelihood Education
iTop VPN Crack Latest Version Full Key 2025
GSA Content Generator Crack (2025 Latest)
How to Use SharePoint as an ISO-Compliant Document Management System

HR Security in SAP: Securing Data Beyond HCM Authorizations

  • 1. Securing SAP HR Data Beyond HCM Authorizations A presentation by
  • 2. HR documents contain confidential information including: •  Social Security Numbers •  Drivers License Numbers •  Date of Birth •  Bank details •  Payroll
  • 3. HR documents contain confidential information including: •  Social Security Numbers •  Drivers License Numbers •  Date of Birth •  Bank details •  Payroll This information needs to be highly protected
  • 4. HR Data is Constantly on the Move 4   HR Data is exported from SAP –  Reporting –  Data crunching –  Analysis Cloud & Mobility –  Explosion of cloud services and providers –  BYOD: are you losing track of your data?
  • 5. Not only that but… •  Companies are required to abide by compliance regulations, such as: –  HIPAA –  SOX –  Safe Harbor
  • 6. What is SAP HR •  Human Resources Management Software –  On premise and cloud solutions –  Recruit, hire, fire talent –  Local laws and regulation compliance –  Standardize payroll –  Manage attendance, schedules, and vacation time –  Support core business operations
  • 7. The Landscape •  SAP’s HCM Module –  Data is stored on-premise –  Accessible by everyone with access to the server •  Success Factors –  Data is stored in the cloud –  Data can be shared and manipulated by anyone – no tracking •  Hybrid –  Data is stored both on-premise and in the cloud –  Data moves between the two with no protection 7  
  • 8. The Landscape •  SAP’s HCM Module –  Data is stored on-premise –  Accessible by everyone with access to the server •  Success Factors –  Data is stored in the cloud –  Data can be shared and manipulated by anyone – no tracking •  Hybrid –  Data is stored both on-premise and in the cloud –  Data moves between the two with no protection 8  
  • 9. The Landscape •  SAP’s HCM Module –  Data is stored on-premise –  Accessible by everyone with access to the server •  Success Factors –  Data is stored in the cloud –  Data can be shared and manipulated by anyone – no tracking •  Hybrid –  Data is stored both on-premise and in the cloud –  Data moves between the two with no protection 9  
  • 10. SAP HR Security •  3 main security features –  Infotypes –  Structural Authorizations –  Personnel Number Restrictions
  • 11. Infotypes •  Units containing master data in SAP HR •  Used in recording employee data, payroll data, and administrative data •  Creates fields and groups them together and enables time-dependent storage •  Infotype restrictions are extremely important since master data is the core of HR data and needs to be restricted.
  • 12. Structural Authorizations •  The data a user can access can be restricted by using either –  Enterprise Structure: Groups/Departments, Codes, Individual user files –  Organizational Structure: Common areas, overall use of the system •  Structural authorizations allow restrictions to be configured on the organizational structure.
  • 13. Personnel Number Restrictions •  Users can be restricted using the authorization object P_PERNR to only accessing infotypes regarding their own personal data –  For example: checking your own hours or schedule –  Known as ESS (Employee Self Service) •  Personnel Number Restrictions can allow HR admin to access employee data while preventing them from viewing their own –  For example: Remove the capability to change own hours worked
  • 14. Data needs to be protected inside & outside of company walls SafeNet. (2014, April 17). First Quarter Recap 2014. Retrieved May 19, 2014, from Breach Level Index: www.breachlevelindex.com  
  • 15. Look Familiar? Much of this information is commonly found amongst HR data 2010  Javelin  Strategy  and  Research  
  • 16. How it is used More often then not, the information is used in millions of identity fraud incidents
  • 17. How did they get the data? Unprotected data and unsecure data movement leaves PII (Personally Identifiable Information) vulnerable
  • 18. Extend Protection Beyond Boundaries of SAP Data is protected when it is stored in SAP
  • 19. Extend Protection Beyond Boundaries of SAP Once the data leaves SAP, it no longer has the protection
  • 20. Extend Protection Beyond Boundaries of SAP Employees Employees use the information in everyday job-related activities
  • 21. Extend Protection Beyond Boundaries of SAP Employees File Server They store the information in various locations
  • 22. Extend Protection Beyond Boundaries of SAP Employees File Server Employees can also upload sensitive data to cloud platforms for collaboration, without regards to security.
  • 23. Extend Protection Beyond Boundaries of SAP Partner Employees File Server The data can be shared with partners
  • 24. Extend Protection Beyond Boundaries of SAP Competitor Partner Employees File Server And also forwarded to competitors
  • 25. Extend Protection Beyond Boundaries of SAP Competitor Partner Employees File Server ALL  HAPPENING  WITHOUT  PROTECTION  
  • 26. HR Data Needs Protection
  • 28. Protecting SAP NetWeaver Protect data inside of SAP –  Roles & Authorizations •  Check HCM Authorizations in new and existing roles •  Review PLOG in existing roles •  Restrict OTYPE •  Check P_ABAP in existing roles Extend protection to data leaving SAP –  Authorizations need to be extended to wherever the data goes 28  
  • 29. Traditional Security Solutions Network •  Network –  Data Loss Prevention (DLP) –  Firewalls –  Virtual Private Network (VPN)  
  • 30. Traditional Security Solutions Network Storage •  Network –  Data Loss Prevention (DLP) –  Firewalls –  Virtual Private Network (VPN) •  Storage –  Full Disk Encryption (FDE) –  Database Encryption  
  • 31. Traditional Security Solutions •  Network –  Data Loss Prevention (DLP) –  Firewalls –  Virtual Private Network (VPN) •  Storage –  Full Disk Encryption (FDE) –  Database Encryption •  File –  Pretty Good Privacy (PGP) –  Information Rights Management (IRM) Network Storage File Latest  technologies  apply  protecCon  at  the  file/data   level,  which  results  in  persistent  security  no  maLer   where  the  file  travels  to    
  • 32. Rights Management (RMS) are offerings from Microsoft that help keep an organizations information Microsoft is the leader in the file/ data centric protection
  • 33. SECURE Rights Management (RMS) are offerings from Microsoft that help keep an organizations information Microsoft is the leader in the file/ data centric protection
  • 34. Data-centric protection Protection is applied directly to the data and documents  
  • 35. Data-centric protection Protection is applied directly to the data and documents   Wherever the data is moved  
  • 36. Data-centric protection Protection is applied directly to the data and documents   Wherever the data is moved   THE PROTECTION STAYS WITH IT  
  • 37. HR and Other Documents are Protected •  At a single location On  premise  
  • 38. HR and Other Documents are Protected •  Inside and outside the organization •  At a single location Partner   On  premise   Shared  
  • 39. HR and Other Documents are Protected •  Inside and outside the organization •  At a single location u  And when moving amongst various locations Partner   On  premise   Shared   CollaboraCon  
  • 40. Fine-grained control •  Content owners can define who can –  Open the document –  Edit the contents –  Print the document –  Forward to anyone, internal or external –  Take other actions with the information
  • 41. Can RMS data-centric protection be extended to SAP HR data?
  • 42. Halocore for SAP NetWeaver •  Innovative: Enforces RMS protection on all data leaving SAP •  Secure: Determines what users are authorized to access sensitive data •  Customizable: Offers fine-tuned control over who can do what with information (view, edit, print, forward, etc.) •  Flexible: Works for any file type •  Powerful: Protection persists beyond SAP, including mobile platforms
  • 45. FOR MORE INFORMATION Click the link below to learn how Halocore for SAP NetWeaver can protect your confidential HR information, no matter where it goes.
  • 46. Not Sure Where to Start? •  Download FREE audit tool for SAP to monitor HR and other sensitive data movement •  Monitor the activities surrounding your information –  Track, record and classify data movement –  Identify who accesses it –  From where they access it (IP address & terminal) –  Where they send it to –  Extract data for analysis
  • 47. DOWNLOAD FREE AUDIT TOOL NOW Click HERE
  • 48. PRESENTATION BY Tweet us @secude Contact us info@secude.com