Insight Search

Sort by:
  • Whitepaper

    July 27, 2022
    Robotic process automation (RPA) was first used to execute predetermined, rules-based tasks twenty or so years ago. Since then, RPA has functioned as a virtual workforce for businesses, which benefit from its power to collect data, execute processes rapidly and unerringly, and facilitate higher levels of quality — while enhancing customer satisfaction.We’ve previously addressed at length the …
  • Podcast Transcript

    November 25, 2022
    Using cardinality constraints for portfolio optimisation opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk.  Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimisation with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform…
  • Newsletter

    April 13, 2023
    As a term in business, “agile” is typically used to refer to a project management methodology, especially for software development. But there is a different, more strategic connotation of agility that merits close attention by boards as markets evolve.
  • Newsletter

    August 23, 2023
    Über generative KI ist schon viel geschrieben worden, dass es wie ein ständiges Gerücht wirkt, das sowohl Verwunderung als auch Angst auslöst. Aber das Nutzenversprechen ist verlockend.
  • Client Story

    June 16, 2023
    A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment.
  • Client Story

    June 16, 2023
    A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could…
  • Whitepaper

    September 14, 2020
    Was tun Sie, um Ihr Unternehmen vor digitalen Bedrohungen zu schützen? In unserer gemeinsamen Online Roadshow mit der TÜV SÜD Sec-IT gewähren wir Ihnen exklusive Einblicke in gängige Methoden und Top-Themenfelder der Informationssicherheit. Mit innovativen Lösungsansätzen nehmen wir Bezug auf die aktuelle Krisensituation, die Bedrohung durch Cyberangriffe und rechtliche Anforderungen.
  • Whitepaper

    June 20, 2017
    Die Nutzung individueller Datenverarbeitungs-Anwendungen mit Excel, Access, Crystal Reports o.ä. kann negative Auswirkungen auf die Vertraulichkeit, Integrität, Verfügbarkeit sowie Nachvollziehbarkeit wichtiger Daten haben. Wir helfen Ihnen dabei geeignete Maßnahmen und Kontrollmechanismen zu definieren und zu implementieren.
  • Client Story

    April 18, 2024
    Das Unternehmen ist führend in der Bereitstellung von Kundendienstleistungen für Triebwerks- und Kompressormärkte und genießt das Vertrauen von Kernkraftwerken, dem US-Militär sowie öffentlichen und privaten Stromerzeugern in aller Welt.
  • Podcast Transcript

    March 28, 2023
    Over the past year, as one crypto organisation after another has been beset by fraud or declared bankruptcy, countless headlines have surfaced warning of the death of the crypto industry. Yet the damage has been largely contained. The developments have raised many questions about digital assets, cryptocurrency and blockchain technology as well as regulation and other factors that may help the…
Loading...