Security and ERP (Enterprise Resource Planning)

SECURITY is one of the most important issues for an organization. Knowledge of enemy plans has been critical in influencing the course of human history.
March 26, 2010 - PRLog -- SECURITY is one of the most important issues for an organization. ( Knowledge of enemy plans has been critical in influencing the course of human history. In classical business operation, just as an governmental and military operations, there have long been security issues concerned with physical protection.
This physical protection could be of human access to buildings and information stored in critical rooms in much the way as banks are secured. With the advent of computer systems this security expanded to data.

Computer systems involve a new level of detailed complexity, providing many opportunities to obtain key competitive information. This is stored on computers and with the advent of networks, is in most cases accessible by networks. There are many threats to the security of information found on ERP systems. Threats across all three forms of access include theft, damage, copying, unauthorized access to information, natural disasters or accidents, sabotage, etc.

The traditional forms of physical spying can still be applied. This can include any forms of unauthorized access to information. The most common forms of security threats to ERP are those made possible because of computer technology, including invasive electronic entry through some form of tapping or hacking. In addition to these security risk faced by all computer systems, two aspects of security are critical to ERP. One aspect concerns the quality of data generated and housed on the ERP.

The other aspect is control over who can access data. One major benefit of a Web delivered system is the flexibility afforded to users through the ability to log on to the ERP system from any terminal. One difficulty is that providers use forms of caching to improve performance. There is a serious risk arising software designed to turn off caches once the need for them has gone. Another form of control is a log-in page showing only those applications that the user is authorized to view. A digital certificate sign-on can act as one security measure with log-on to a directory protocol permitting access to authorized ERP applications. The ability to maintain ERP security in a Web environment is mandatory, given that majority of ERP vendors are responding to demand to provide Web products.

For more information kindly visit:
OR Please Contact us at:

TMA House, 1st Floor,Road No 16, Plot No. 6,Wagle Industrial Estate,Thane (West) 400 604, Maharashtra,
Tel: +91 22 25827692/+91 22 25828775,
e-mail (enquiry):, e-mail (feedback)
Web site:

# # #

erp pandit is here to help you find a suitable ERP solution for your organization. Drop a few lines about your organization. You will be surprised by the right choice of the ERP solution that will offer 100 per cent satisfaction.
Source:Erp Pandit
Email:*** Email Verified
Phone:022 25827692
Zip:400 604
Tags:Erpsecurity, Erpimplmentation, Erp Application, Erpsystems, Erpsolution, Erp Software India, It Solutions Company, Software, IT
Industry:Computers, Software
Location:Thane - Maharashtra - India
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse

Like PRLog?
Click to Share