cabramson@greenlightcorp.com

/Greenlight Technologies
­
cabramson@greenlightcorp.com'

About Greenlight Technologies

This author has not yet filled in any details.
So far Greenlight Technologies has created 86 blog entries.

Heading to GRC2017? Don’t miss these sessions!

By |February 20th, 2017|Access Violation Management|

Heading to GRC2017? Don't miss these sessions! Our close collaboration with SAPinsider this year has made it possible to extend a special registration discount off the on-site registration price: Register now and save $300 by clicking here. Don't forget to join us for these special sessions during the event: Panel discussion: Customers of SAP Access [...]

Comments Off on Heading to GRC2017? Don’t miss these sessions!

How Much Did the Verizon Breach Cost?

By |February 16th, 2017|Cyber Governance|

How Much Did the Verizon Breach Cost? As Verizon was in the process of closing the $4.83 billion deal to acquire Yahoo, news hit about the largest data breach ever. Rumors were swirling that Verizon may pull out of the deal but now comes word that they have agreed to a price cut of $250 [...]

Comments Off on How Much Did the Verizon Breach Cost?

Understand the Financial Exposure of Access Risks

By |February 14th, 2017|Access Violation Management|

Understand the Financial Exposure of Access Risks Managing the access that business users have to enterprise applications is a balancing act. Granting too much access leaves organizations exposed to higher risk, but granting too little prevents people from doing their jobs and slows business momentum. Organizations need insight into the financial impacts of access risk [...]

Comments Off on Understand the Financial Exposure of Access Risks

Top 5 Cybersecurity Breaches in January

By |February 9th, 2017|Cyber Governance|

Top 5 Cybersecurity Breaches in January Despite all of the security steps companies are taking, hackers are still finding their way in to an organization’s crown jewel assets. Here are the top 5 breaches reported in January. U.S. Cellular: This breach hasn’t been verified but it has been reported that a hacker is selling a [...]

Comments Off on Top 5 Cybersecurity Breaches in January

On-demand Webinar: How Leading CISOs Are Tackling 2017 – LTM Research Enterprise Cybersecurity Survey Results

By |February 6th, 2017|Cyber Governance|

On-demand Webinar: How Leading CISOs Are Tackling 2017 - LTM Research Enterprise Cybersecurity Survey Results Should you be more concerned about internal threats? How often are systems breached? Do you need to be more focused on protecting your crown jewel assets? What impact does a breach have on an organization? Are you vulnerable due to [...]

Comments Off on On-demand Webinar: How Leading CISOs Are Tackling 2017 – LTM Research Enterprise Cybersecurity Survey Results

SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation

By |February 2nd, 2017|Access Violation Management|

SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation As organizations are transforming their business with SAP S/4HANA, they’re reinventing business processes and eliminating redundancies to focus more on exceptions and critical tasks, ultimately resulting in better decision making. But a key consideration must be the impact on financial controls [...]

Comments Off on SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation

Uncover the Financial Exposure of Access Risks

By |January 31st, 2017|Access Violation Management|

Uncover the Financial Exposure of Access Risks It’s a balancing act managing everyone’s access to your enterprise applications. Too much access leaves your company exposed to higher risk. Too little access keeps your people from doing their jobs efficiently. And safeguards are required for whatever access risk remains. Safeguards that are often highly manual, time [...]

Comments Off on Uncover the Financial Exposure of Access Risks

Upcoming Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

By |January 26th, 2017|Access Violation Management|

Upcoming Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move to S/4HANA? Join us on February 23rd for a special webinar to learn firsthand how Jabil Circuit achieves compliance despite [...]

Comments Off on Upcoming Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

Protect Your Crown Jewel Assets with Cisco Identity Services Engine and Greenlight Security Risk Analytics Integration

By |January 20th, 2017|Cyber Governance|

Protect Your Crown Jewel Assets with Cisco Identity Services Engine and Greenlight Security Risk Analytics Integration With billions on the line, it is critical for you to know when your crown jewels are vulnerable. The last thing you need is to be blindsided by a data breach when the warning signs were all around you. [...]

Comments Off on Protect Your Crown Jewel Assets with Cisco Identity Services Engine and Greenlight Security Risk Analytics Integration

Greenlight Technologies Adds New Customers in the Automotive, Financial Services, Life Sciences, IT Services, and Manufacturing Industries

By |January 19th, 2017|Enterprise Solutions|

Greenlight Technologies Adds New Customers in the Automotive, Financial Services, Life Sciences, IT Services, and Manufacturing Industries Continues Growth in Fourth Quarter Flemington, NJ (January 19, 2017) – Greenlight Technologies, a pioneering leader in risk analytics and regulatory compliance solutions, announced continued growth in its fourth quarter, adding marquee accounts in the automotive, financial services, [...]

Comments Off on Greenlight Technologies Adds New Customers in the Automotive, Financial Services, Life Sciences, IT Services, and Manufacturing Industries