Insight Search

Sort by:
  • Blogs

    February 23, 2024
    Workday’s object-oriented architecture and robust reporting engine enables financial and human capital data management and analysis within a single platform, unlocking possibilities for powerful new insights. To a new user, the complexity can feel daunting—so where to start? Let’s take a closer look at how to quickly get up to speed, access some of the most valuable standard (out-of-the-box)…
  • Client Story

    June 30, 2023
    A $1 billion educational services holding company that operates in the U.S., Australia and New Zealand needed to transform its finance operations. The organisation, which operates numerous higher-education institutions and provides a workplace educational benefits administration solution, enrolled more than 100,000 students in its universities and served 50,000 workplace learners in 2021, growing…
  • Blogs

    November 21, 2022
    by Rich Cohen, Managing Director and Fractional In-house Counsel Today’s societal, investor and regulator expectations and the exponential advancement of data and technology are creating significant pressures, demands and opportunities for General Counsel (GC) and their legal departments. Increasingly, they are being called upon to do more, expanding their focus to areas that…
  • Blogs

    March 31, 2022
    ISO 27002 contains details of controls required to be certified under the ISO 27001 standard. With the ever changing security threat landscape and the need to protect information assets, the International Organisation for Standardisation (ISO) has introduced several changes to the 27002 set of controls. These changes have been published in the latest version of the ISO 27002:2022 standard…
  • Blogs

    May 3, 2024
    A well-thought-out Fiori spaces and pages approach establishes a foundation for a user-friendly and scalable design that supports a least-privilege access model. When incorporated with security best practices, spaces and pages provide an intuitive experience within the Fiori launchpad in alignment with a business user’s tasks and responsibilities. As SAP S/4HANA users increasingly transition to…
  • Blogs

    July 13, 2022
    Congratulations! Your organisation recently made the decision to move forward with selecting SAP S/4HANA, and you will either be leaving an old ERP or a previous version of SAP ECC behind — a great strategic move but only the first in many more decisions to come on the SAP ERP journey that lies ahead. The SAP solution portfolio includes numerous components that can be deployed in many ways. To…
  • Client Story

    February 17, 2021
    As internal audit organisations look for effective ways to perform their work in a more agile manner, including how to leverage methodologies, data and technology to add value and become strategic advisers to their business partners, many are finding that the use of robotic process automation (RPA) checks a lot of boxes.RPA integration into internal audit functions is expanding and improving…
  • Client Story

    May 26, 2023
    A global specialty insurance organisation had been growing rapidly through a roll-up strategy to position itself for an initial public offering (IPO). The acquisitions created multiple underwriting and policy management processes and systems that were hindering operational efficiency. Executive leadership understood that to achieve the highest equity valuation possible it would need to…
  • Blogs

    December 16, 2022
    Protiviti was very pleased to announce its exclusive partnership with Microsoft as the launch of the new Microsoft Supply Chain Platform was unveiled. As a platform that integrates the value chain beyond an enterprise’s four walls, the Microsoft Supply Chain Platform enables collaborations with upstream and downstream partners to deliver transparency and orchestrate the…
  • Blogs

    February 23, 2024
    In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely…
Loading...