Results for

Sort by:
  • Blog
    August 17, 2022
    The use of Internet of Things (IoT)-connected sensors and devices in the manufacturing sector is exploding as manufacturing processes transform and we get closer to realizing the value and promise of Industry 4.0. The question is, are connected devices becoming a runaway train of unchecked data charges? Sensors, robots, security cameras and other IoT devices on the factory floor are helping…
  • Blog
    August 23, 2022
    The last decade has seen a very rapid modernization in every industry and all industries now rely heavily on technology for their operations. During the COVID-19 pandemic, industries faced increased pressure to grow and change, and with the help of technology, they were able to scale and pivot to new business models. Organizations also faced extreme competition and pressure to deliver quality…
  • Blog
    August 24, 2022
    SAP Analytics Cloud contains a robust method by which content can be transferred among systems. Historically, content could only be transferred using a local file system on export. The same file would then be used to import into the destination system. The SAP Analytics Cloud promotion management procedure has been updated to include a cloud-based transport system called the content network,…
  • Blog
    August 30, 2022
    Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM), formerly Dynamics 365 Finance and Operations (D365 F&O), offers numerous features that help companies achieve operational excellence and create a friendlier customer experience. Based on our work with clients, we have developed these fast five tips and tricks to achieve a more user-friendly interface in D365.…
  • Blog
    September 6, 2022
    Encryption is a topic that many people easily recognize the importance of, but often fail to appreciate the complexity around it. And complexity only increases when enterprises shift to a cloud environment because cloud services options are expanding at an exponential rate. To provide a bit of clarity, we’ll break down what encryption is, describe the different methods of encryption, and explore…
  • Blog
    September 7, 2022
    One of the first questions an organization seeks to answer in risk management is, “What are our most critical risks?” The answer to this question lays the foundation for management to respond with appropriate capabilities for managing these risks. So, what are the risks currently facing your organization? Every year, Protiviti (in partnership with North Carolina State University’s ERM initiative…
  • Blog
    September 8, 2022
    Like many companies undergoing a digital transformation, Protiviti’s experts recently assisted a national financial services company struggling with error-prone financial planning and analysis (FP&A) processes. These processes were mostly rooted in Excel, focused on allocations and reporting, and had received limited investment in innovative technology compared with profit-generating…
  • Blog
    September 13, 2022
    The “endless aisle” concept isn’t new, but it’s definitely the future for many supply chain operators. This retail strategy enables customers at a physical store to virtually browse and order any products that are either out of stock or not sold in-store and have them shipped to the store or their home. A fulfillment center or another nearby retail location that has the item in stock fills their…
  • Blog
    October 29, 2018
    Security in a Multicloud Environment Multicloud strategies are often adopted with benefits such as enhanced reliability, access to vendor-specific solutions and the ability to avoid vendor lock-in in mind. These anticipated benefits of engaging with multiple cloud providers also create challenges in scaling and maintaining security and compliance across diverse environments. Three of the most…
  • Blog
    September 14, 2022
    An SAP BW/4HANA migration is a significant investment for any organization. With several migration options available, selecting the right one will reduce project risk, streamline the timeline and can even eliminate long-standing technical debt. This client case study frames the considerations that led to a successful methodology selection and upgrade. Our client had a mission-critical environment…
Loading...