Download PDF version Contact company

Logpoint announces the new release of Business-Critical Security (BCS) solution for SAP SuccessFactors, enabling real-time security and compliance monitoring of SAP SuccessFactors, which is a Human Capital Management (HCM) application.

Through log extraction, continuous monitoring and cross-correlation of data, BCS for SuccessFactors provide holistic, landscape-wide threat visibility in the Logpoint Converged SIEM platform or any other SIEM solution.

Cloud-Based product

SAP SuccessFactors store a wide range of personal data, from basic details like date of birth to potentially sensitive information such as religion, salary, pension schemes, social security numbers, or medical history. Protecting the confidentiality of employee information is essential to meet data privacy laws.

In the last two years, 79 percent of organizations have experienced identity-related breaches

In the last two years, 79 percent of organizations have experienced identity-related breaches, and 99 percent believe these could have been prevented.

Being a Cloud-based product raises a series of security challenges; employees working remotely using unsafe devices and networks, the fact that there are no fixed perimeters in the Cloud, and lack of visibility into the enclosed system,” says Sükrü Ilker Birakoglu, Logpoint Senior Director.

Distinguished potential risks

Sükrü Ilker Birakoglu adds, “Today, collecting and investigating the relevant security logs is impossible because they are dispersed throughout many reports and events. Up until now, SuccessFactors has been a black box.”

Integrating with the Logpoint Converged SIEM platform or other SIEM solutions, BCS for SuccessFactors provides an easy overview with a single pane of glass, allowing users to get complete threat visibility to improve their security response and effectively distinguish potential risks from critical vulnerabilities that could be exploited.

The solution also automatically identifies data integrity and compliance issues, easing the burden of complying with GDPR, CCPA, and other data privacy standards.

Role-Based permissions

BCS for SuccessFactors reads and collects the relevant SuccessFactors logs through SAP iRPA

As organizations migrate to SAP cloud solutions like SuccessFactors, they need to be mindful that they themselves are responsible for their own customer data and data security, authentication and authorizations, and to review security logs,” says Sükrü Ilker Birakoglu.

Sükrü Ilker Birakoglu adds, “We’re excited to offer the first and fully automated advanced SuccessFactors monitoring solution in the market, enabling our customers to be confident that compliance monitoring and data privacy is ensured.”

BCS for SuccessFactors

BCS for SuccessFactors reads and collects the relevant SuccessFactors logs through SAP iRPA (Intelligent Robotic Process Automation), a connector. The logs are subsequently fed into SIEM for analysis, cross-correlation, and continuous monitoring.

Tracking all authorizations, logins, access to sensitive data, misuse of privileges and more enables organizations to detect unauthorized downloads of sensitive data, changes to user roles, role-based permissions, alterations to proxy roles or assignments or DDoS attempts. 

BCS for SuccessFactors is easily deployed and configured, allowing a quick roll-out. On top of that, it works for every industry and integrates with any SIEM.

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...