×
[searchandfilter taxonomies="search"]

2014 HEUG member survey

By Chris Heller • February 3, 2015

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Shelley Nelson Joins GreyHeller as Vice President of Services

By Chris Heller • January 29, 2015
Shelley Nelson

Shelley Nelson,
Vice President of Services

San Ramon, California – January 28, 2015 – GreyHeller, LLC, provider of the leading security and modernization software for legacy ERP systems, today announced the appointment of Shelley Nelson as Vice President of Services. Shelley will have worldwide responsibility for customer implementation projects and support and will serve as a member of GreyHeller’s senior leadership team. Shelley will report to Larry Grey, President, GreyHeller.

“We are pleased to welcome Shelley to GreyHeller and look forward to Shelley’s delivering 100% customer success and satisfaction,” said Larry. “I’ve worked with Shelley in the past. Her 20-plus years of experience make her ideal to lead all of our customer-facing initiatives.”

“I am excited to be a part of an organization that is totally focused on making their customers successful,” Shelley said. “Joining GreyHeller is a fantastic opportunity and I am excited to help the company grow to its full potential.”

Previously, Shelley launched Services for Lisam America which grew to 90 customers. Prior to Lisam, she served as Vice President, Global Support for TomorrowNow where she achieved top 10% worldwide IT-industry customer satisfaction and 98% customer reference rating (TNS Global rating). Before joining TomorrowNow, Shelley spent 6 years at PeopleSoft leading Financials systems implementations and as a Financials systems developer.

About GreyHeller

GreyHeller’s award winning software modernizes and secures legacy ERP systems. ERP Firewall protects ERP sensitive data from cyber criminals. PeopleMobileÒ modernizes and mobilizes legacy ERP platforms, giving customers an option to costly system replacement. GreyHeller’s products are used by nearly 100 customers worldwide across all industries.

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

CYBERSECURITY PRIORITIES SHIFT TO INSIDER THREATS

By Chris Heller • January 7, 2015

The Sony breach – and virally every other recent high profile breach – has finally driven home what GreyHeller has been saying for some time – that the insider threat vector is as dangerous as the perimeter threat vector.

This survey of Federal IT managers in both civilian and defense sectors supports our view: Survey Cybersecurity priorities-shift insider threats

Security concerns from the survey:

  • Cyber hygiene
  • Phishing
  • Malware
  • Spam tactics

Interestingly, data breaches and cyber espionage were further down the list. Really??!! We couldn’t agree less – data breach (leakage, unintentional disclosure, spillage) – is as serious a threat vector as any.

Finding ways to mitigate and remediate after a breach have got to be on the top of any organization’s cybersecurity priority list.

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Cybersecurity Tipping Point? Absolutely.

By Chris Heller • January 6, 2015

We’ve been talking about this tipping point for some time now.

Supporting our view…

  • The Cybersecurity Tipping Point – from TechCrunch
    1. Assume you are always under attack
    2. Security must be dynamic and software-defined
    3. Information sharing is critical to security

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

GreyHeller January Security Webinar Series

By Chris Heller • January 6, 2015

January 5, 2015 – San Ramon, CA – GreyHeller today announced an Insider Threat Security Webinar Series focused on helping organizations protect their ERP sensitive data from malicious and inadvertent insider threats.

The Insider Threat Series will use recent, high profile breaches at Sony and higher education institutions as examples of what could have been done to prevent insider threat attacks.

“Cyber security priorities have shifted in recent years to insider threats as the top attack vector,” said Greg Wendt, GreyHeller’s Executive Director of Security Solutions. “These types of breaches can be mitigated with rigorous ERP system Credentials Management, strict employee training and implementing two-factor authentication, logging and analytics.”

The Insider Threat Security Webinar Series is part of GreyHeller’s commitment to educate users of major ERP systems on how to fight cyber crime and prevent their organizations from becoming the next news headline.

GreyHeller will deep dive into:

  • Two-Factor Authentication
  • REN-ISEC Recommendations for HCM
  • Logging and Analysis
  • Data Masking
  • Location Based Security

Each webinar is an hour long and begins at 11:00am PST. For more information and to register, click here.

Insider Threat Security Webinar Series

About GreyHeller

GreyHeller’s software solutions help nearly 100 global organizations secure their ERP sensitive data from cyber crime. For more information about GreyHeller, please visit www.greyheller.com.

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

January 2015 Security Webinar

By Chris Heller • December 31, 2014
Join us for a Series of Informative and Timely Security Webinars hosted by Larry Grey, President, and Greg Wendt, Executive Director, Security Solutions & Services.

Examine Proven Steps to Protect your Organization from Cyber Attack.
No organization is safe from cyber attack Whether the threat vector is a phishing attack or privileged user compromise, there are proven steps you can take to protect your PeopleSoft sensitive data.
This webinar series will examine recent security breaches at major commercial organizations and higher education institutions and what could have been done to protect against these attack.
Larry and Greg willdeep dive into: Two - Factor Authentication, REN-ISEC Recommendations for HCM, Logging & Analysis, Data Masking, Location - Based Security
January 7th – Secure PeopleSoft – Higher Ed
+
Universities are being targeted by cyber criminals who have learned that student, faculty and employee self-service systems contain as much sensitive information as do banks and retailers. Learn how GreyHeller can help your institution detect and/or prevent breaches to your PeopleSoft systems. We will examine the following Use Cases:
Admissions
Financial Aid
Custom applications: health forms and
legal documents
Faculty Access to info: Grades and Rosters

Click to Register

January 14th – Secure PeopleSoft – Human Resources
+
PeopleSoft HCM customers are being targeted by cyber criminals who have learned that employee self-service systems contain as much sensitive information as do banks and retailers. Learn how GreyHeller can help protect your HR sensitive data. We will examine the following Use Cases:
Employee Self-Service
SSN; Direct Deposit; Benefits;
Personal Information; etc.
Manager Self-Service
Approvals; Workflow

Click to Register

January 21st – GreyHeller and Duo: Delivering Two-Factor Authentication
+
This co-sponsored webinar will demonstrate how GreyHeller and Duo Security have partnered to bring rigorous two-factor authentication to PeopleSoft systems. This demo-intensive session will show how to implement and manage an effective 2FA system for all PeopleSoft systems, including HCM and Campus Solutions. We will discuss best practices to provisioning and managing users.

Click to Register

We look forward to you and your team joining us in any or all of our series of timely security seminars. If you have any questions contact or email Kelly Jones at (925) 415-5127 or [email protected].
GreyHeller

Join us for a Series of Informative and Timely Security Webinars hosted by Larry Grey, President, and Greg Wendt, Executive Director, Security Solutions & Services.

Examine Proven Steps to Protect your Organization from Cyber Attack.
No organization is safe from cyber attack Whether the threat vector is a phishing attack or privileged user compromise, there are proven steps you can take to protect your PeopleSoft sensitive data.
This webinar series will examine recent security breaches at major commercial organizations and higher education institutions and what could have been done to protect against these attack.
Larry and Greg willdeep dive into: Two - Factor Authentication, REN-ISEC Recommendations for HCM, Logging & Analysis, Data Masking, Location - Based Security
January 7th – Secure PeopleSoft – Higher Ed
+
Universities are being targeted by cyber criminals who have learned that student, faculty and employee self-service systems contain as much sensitive information as do banks and retailers. Learn how GreyHeller can help your institution detect and/or prevent breaches to your PeopleSoft systems. We will examine the following Use Cases:
Admissions
Financial Aid
Custom applications: health forms and
legal documents
Faculty Access to info: Grades and Rosters

Click to Register

January 14th – Secure PeopleSoft – Human Resources
+
PeopleSoft HCM customers are being targeted by cyber criminals who have learned that employee self-service systems contain as much sensitive information as do banks and retailers. Learn how GreyHeller can help protect your HR sensitive data. We will examine the following Use Cases:
Employee Self-Service
SSN; Direct Deposit; Benefits;
Personal Information; etc.
Manager Self-Service
Approvals; Workflow

Click to Register

January 21st – GreyHeller and Duo: Delivering Two-Factor Authentication
+
This co-sponsored webinar will demonstrate how GreyHeller and Duo Security have partnered to bring rigorous two-factor authentication to PeopleSoft systems. This demo-intensive session will show how to implement and manage an effective 2FA system for all PeopleSoft systems, including HCM and Campus Solutions. We will discuss best practices to provisioning and managing users.

Click to Register

We look forward to you and your team joining us in any or all of our series of timely security seminars. If you have any questions contact or email Kelly Jones at (925) 415-5127 or [email protected].
GreyHeller

-->

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Top Breaches of 2014 – Infographic

By Chris Heller • December 30, 2014
DBT TopBreaches 123014

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

The Upside to Breach Fatigue

By Chris Heller • December 22, 2014

Smart consumers – pounded by the relentless onslaught of breaches affecting them directly (my household had new credit cards issued because of the Target and Home Depot breaches) – will eventually demand transparency from their vendors on their security protocols.

If that happens, smart vendors will ‘sell” their security profile as a benefit to their customers. ‘Do business with us. We’ll keep you safe.’ 

Boeing is arguably the dominant manufacturer of civilian aircraft in the world. But this was not always the case. Coming out of WWII, Douglas Aircraft dominated. Boeing’s very clever consumer targeted marketing campaigns helped make Boeing what it is today. (One of their campaign slogans was ‘If it ain’t Boeing, I ain’t going.’) Boeing’s customers were airlines, not consumers; but by selling to consumers Boeing created a reason for airlines to buy from them – the safety and comfort of their customers.

Boeing 1960's Ad

Fast forward to now, _______ (retailer name, fill in the blank) could re-establish its consumer trust with a security focused marketing campaign that has nothing to do with the products it sells and everything to do with understanding consumers want their vendors to prove they are focused on their digital safety.

Eventually, there will be a Security version of the UL (Underwriters Labs) or Good Housekeeping Seal of Approval. Consumer Reports might grade organizations on their Security protocols.

The Upside of Breach Fatigue.

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Breach fatigue

By Chris Heller • December 18, 2014

I heard a term yesterday that frightened me – Breach Fatigue (being in the Security business can make one paranoid).

As a leader in Security technology solutions for ERP, we’ve talked to thousands of organizations about their Security protocols. Many get it and are fully committed to implementing technology and best practices to protect from internal and external breach.

I said ‘many’….unfortunately, I can’t say ‘most.’

A consistent position we observe at organizations purportedly interested in adopting new technology can be characterized as – complacent. Earlier this year we met with a large higher education institution’s Associate CIO who told us – I’m paraphrasing – “we’re going to get hacked no matter what so why should we spend lots of money when it won’t stop the inevitable.”

Wow! Textbook on how to snatch defeat from the jaws of victory.

While there’s lots of press and gnashing of teeth over well-publicized breaches, we still don’t see widespread adoption of Two-Factor Authentication and/or Logging for ERP, two amazingly simple and cost effective technologies to implement and manage.

Breach fatigue will serve to distract people. The movie ‘The Interview’ was pulled from release. At what cost? Does anybody really care? 500+ million digital identities have been compromised. FBI Director Comey warned there are 2 types of companies in the US – those that have been breached and those that don’t know they’ve been breached.

Breach fatigue. Complacency. Frightening.

Put the Appsian Security Platform to the Test

Schedule Your Demonstration and see how the Appsian Security Platform can be tailored to your organization’s unique objectives

Request a Demo

Start your free demo

"Learn how you can reduce risk with rapid threat protection, audit response and access control. All from a single, comprehensive platform"

Trusted by hundreds of leading brands