pathlock.com Open in urlscan Pro
141.193.213.20  Public Scan

Submitted URL: https://d2qbfs04.na1.hubspotlinks.com/Ctc/RJ+113/d2qbfS04/VWsPZb8z3qMyW66P5521x7Lr9W5QKV2t4Sf3VZN5SJSlJ5g2WDV3Zsc37CgPrMW60jfVl6fbnb3V...
Effective URL: https://pathlock.com/customer-story-how-pathlock-implemented-dynamic-data-masking-to-help-the-state-of-kansas-secure-...
Submission: On November 11 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

If you decline, your information won’t be tracked when you visit this website. A
single cookie will be used in your browser to remember your preference not to be
tracked.

Accept Decline
 * 
   Solutions
   * 
     Initiative
     * 
       ERP and Cloud Migrations
     * 
       Audit Readiness
     * 
       Finance Transformation
     * 
       Cross Application SOD
     * 
       Continuous Compliance
     * 
       Mergers and Acquisitions Integration
     * 
       User Access Reviews
   * 
     Role
     * 
       Application Owner
     * 
       Internal Audit
     * 
       Finance Leaders
     * 
       CISO and IT Security
   * 
     Technology
     * 
       SAP
     * 
       Oracle
     * 
       PeopleSoft
     * 
       Salesforce
     * 
       Workday
     * 
       Microsoft Dynamics 365
     * 
       More integrations…
   * 
     Regulatory
     * 
       Data Security Regulations
     * 
       Financial Regulations
 * 
   Capabilities
   * 
     Access Controls
     * 
       Access Analysis
     * 
       Access Certification
     * 
       Automated Role Design
     * 
       Provisioning
     * 
       Emergency Access Management
     * 
       Change Log
     * 
       Risk Quantification
     * 
       Enhanced Activity Tracking
     * 
       Data Masking
   * 
     Cybersecurity Controls
     * 
       Vulnerability Management
     * 
       Code Scanning
     * 
       Threat Detection and Response
 * 
   Resources
   * 
     Resources
     * 
       Learning
     * 
       Blog
     * 
       Integrations
   * 
     Marketing Resources
     * 
       Analyst Reports
     * 
       On-Demand Webinar
     * 
       Solution Briefs
     * 
       Data Sheet
     * 
       E-book
     * 
       Case Study
   * Featured resources
     
     Blog
     What CXOs Need To Know: Economic Recovery Is Not An End To Disruption
     Around the world, business leade...
     
     Blog
     Pathlock Named to Inc. 5000 List After Notable Expansion
     Flemington, New Jersey, ...
 * 
   Company
   * About Pathlock
     Helping the world’s largest enterprises and organizations secure their data
     from the inside out
   * Our Partners
     Partnering with success with the world's leading solution providers
   * Careers
     Join us on our mission
   * Featured Resources
     
     Blog
     Streamlining SOX Compliance and 404 Audits with Continuous Controls
     Monitoring (CCM)
     For many publicly trad...
     
     Blog
     Pathlock Named to Inc. 5000 List After Notable Expansion
     Flemington, New Jersey, ...
 * 
   Contact
 * 
   Innovation Series

Request a demo

 * 
   Solutions
   * 
     Initiative
     * 
       ERP and Cloud Migrations
     * 
       Audit Readiness
     * 
       Finance Transformation
     * 
       Cross Application SOD
     * 
       Continuous Compliance
     * 
       Mergers and Acquisitions Integration
     * 
       User Access Reviews
   * 
     Role
     * 
       Application Owner
     * 
       Internal Audit
     * 
       Finance Leaders
     * 
       CISO and IT Security
   * 
     Technology
     * 
       SAP
     * 
       Oracle
     * 
       PeopleSoft
     * 
       Salesforce
     * 
       Workday
     * 
       Microsoft Dynamics 365
     * 
       More integrations…
   * 
     Regulatory
     * 
       Data Security Regulations
     * 
       Financial Regulations
 * 
   Capabilities
   * 
     Access Controls
     * 
       Access Analysis
     * 
       Access Certification
     * 
       Automated Role Design
     * 
       Provisioning
     * 
       Emergency Access Management
     * 
       Change Log
     * 
       Risk Quantification
     * 
       Enhanced Activity Tracking
     * 
       Data Masking
   * 
     Cybersecurity Controls
     * 
       Vulnerability Management
     * 
       Code Scanning
     * 
       Threat Detection and Response
 * 
   Resources
   * 
     Resources
     * 
       Learning
     * 
       Blog
     * 
       Integrations
   * 
     Marketing Resources
     * 
       Analyst Reports
     * 
       On-Demand Webinar
     * 
       Solution Briefs
     * 
       Data Sheet
     * 
       E-book
     * 
       Case Study
   * Featured resources
     
     Blog
     What CXOs Need To Know: Economic Recovery Is Not An End To Disruption
     Around the world, business leade...
     
     Blog
     Pathlock Named to Inc. 5000 List After Notable Expansion
     Flemington, New Jersey, ...
 * 
   Company
   * About Pathlock
     Helping the world’s largest enterprises and organizations secure their data
     from the inside out
   * Our Partners
     Partnering with success with the world's leading solution providers
   * Careers
     Join us on our mission
   * Featured Resources
     
     Blog
     Streamlining SOX Compliance and 404 Audits with Continuous Controls
     Monitoring (CCM)
     For many publicly trad...
     
     Blog
     Pathlock Named to Inc. 5000 List After Notable Expansion
     Flemington, New Jersey, ...
 * 
   Contact
 * 
   Innovation Series

 * 
 * 
 * 

September 22, 2022


[CUSTOMER STORY] HOW PATHLOCK IMPLEMENTED DYNAMIC DATA MASKING TO HELP THE STATE
OF KANSAS SECURE SENSITIVE PEOPLESOFT FSCM DATA

Esha Panda

Like most state governments, the State of Kansas wanted employees and
non-employees to access PeopleSoft self-service within and outside the corporate
network. They encountered a common challenge: How do they roll out PeopleSoft
self-service to a massive audience while still protecting their data and
addressing compliance risks? To fortify their PeopleSoft environment and secure
remote access and their data, the State approached Pathlock for their dynamic
data masking tools.

Related Reading: Download the Protect PeopleSoft FSCM Data & Streamline Risk
Management solution brief.


REQUIREMENTS FOR DYNAMIC DATA MASKING

Over a two-year period, the State expanded access to PeopleSoft from 12,000 to
all 50,000 state employees, including contractors, truck drivers, police
officers, and state police medical contractors who would be using iPads and
various mobile and remote workstations.

However, they did not have any third-party data masking tool for their
production or non-production environment. Additionally, the masking capability
in their existing PeopleSoft environment presented the following challenges –

 * Masking was incomplete
 * It offered no flexibility
 * The feature only worked on select delivered pages

The native masking functionality was not working sufficiently for their HCM and
FSCM power users. In addition, as their roles were getting more complex, access
control became a critical requirement that out-of-the-box PeopleSoft features
could not fulfill.


THE STATE OF KANSAS ENHANCED PEOPLESOFT SECURITY WITH DYNAMIC DATA MASKING

The State deployed MFA capabilities, contextual data masking, and dynamic access
controls to fill the security gaps in access control and usage. The State also
used the Pathlock Security Platform to improve remote access control, manage
risk exposure, and increase the visibility of user activity in their FSCM and
HCM pillars.

Following the implementation of Pathlock’s Dynamic Data Masking tools and
capabilities, the State of Kansas is now able to achieve the following –

 * Leverage existing static data masking to challenge users to reconfirm
   identity at a page level
 * Location-based security to protect access to certain pages for users outside
   the State’s network
 * Better visibility into the activities of privileged users while allowing them
   to access sensitive data to perform their roles efficiently


PATHLOCK IS A KEY ENABLER FOR PEOPLESOFT FSCM DATA SECURITY & COMPLIANCE

Pathlock’s PeopleSoft customer base includes multiple organizations in the
government sector like the State of Kansas looking for a single platform to
strengthen remote access management, data security, and compliance, including:

 * Native SAML/ADFS Compatibility And PeopleSoft MFA Integration: Integrating
   single sign-on and multi-factor authentication natively with PeopleSoft and
   your identity provider improves security and convenience. Integrated MFA also
   enables step-up authentication, so users can be forced to re-authenticate
   when accessing highly sensitive transactions.
 * Contextual Access Control For Greater Security: Reduce the attack surface
   with dynamic data masking tools that take into account the contextual
   variables of a user’s access and define privileges in real time. Implement
   least privilege to limit access to modules/transactions, dynamically mask
   sensitive data, enforce step-up MFA, and more.
 * Real-Time Analytics For Improved Response Times: Enhanced PeopleSoft logging
   capabilities capture all user activity at the field, page, and component
   levels and combine them with contextual user data. Real-time visualized
   dashboards allow you to quickly spot suspicious activity and drill down to
   root out issues.

Contact our PeopleSoft experts today to learn how the Pathlock Security Platform
can help you establish a dynamic data masking solution.

Customer Profile: The State of Kansas administrative office comprises over 100
state agencies to provide exceptional community, family, health, education,
security, transportation, and more services to the citizens of Kansas.

Table of contents
 * Requirements For Dynamic Data Masking
 * The State Of Kansas Enhanced PeopleSoft Security With Dynamic Data Masking
 * Pathlock Is A Key Enabler For PeopleSoft FSCM Data Security & Compliance

Share


Featured articles
October 21, 2022 Migrating to S/4HANA: How Automation Can Simpli...

Roles are the foundation of SAP access, and any organizatio...

Shiv Sujir

October 13, 2022 How to Enhance SAP Role-based Access Controls

For a long time, access to SAP applications has been govern...

Shiv Sujir

October 12, 2022 Boost the Efficiency of Your PeopleSoft User Pr...

An organization's user base is never static. As employees a...

Esha Panda

September 29, 2022 How Pathlock Enhances SAP GRC With Cross-Applic...

What Is SAP GRC? SAP Governance, Risk, and Compliance (S...

Shiv Sujir
Pathlock is revolutionizing the way enterprises secure their sensitive financial
and customer data.
Request a demo
Our Awards

 * 
 * 
 * 

Solutions

Initiative

ERP and Cloud Migrations Audit Readiness Finance Transformation Cross
Application SOD Continuous Compliance Mergers and Acquisitions Integration

Role

Application Owner Internal Audit Finance Leaders CISO and IT Security

Technology

SAP Oracle Workday Salesforce

Regulatory

Data Security Regulations Financial Regulations

Capabilities

Access Controls

Risk Quantification Automated Role Design Provisioning Emergency Access
Management Data Masking Access Analysis Access Certification Change Log Enhanced
Activity Tracking

Cybersecurity Controls

Vulnerability Management Code Scanning Threat Detection and Response

Resources

About Us Blog Marketing Resources Integrations

Company

About Us Why Pathlock Partners Careers
Contact

support@pathlockstg.com

US Headquarters

+1 469.906.2100
8111 Lyndon B Johnson Fwy, Dallas, TX 75251

INDIA Headquarters

Lohia Jain IT Park, A Wing,
Survey #150, Paud Road,
Kothrud, Pune 411038

Copyright 2022 © Pathlock. All rights reserved.
 * Privacy Policy
 * Cookie policy

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media.

Privacy policy Accept
×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences