Results for

Sort by:
  • Blog
    September 19, 2022
    In eight short years, the eighth-graders graduating this spring will be the newest hires joining our workplaces. Right now, we are facing the greatest talent struggle of our lifetime, but we are not taking the necessary measures to prevent a similar crisis down the road. Technology infuses every business function, but it’s changing fast. Artificial intelligence might be the technology of the…
  • Blog
    September 20, 2022
    Over the last five years, organizations have been increasing their security spend, while the average time to detect a breach has increased. Similarly, in working with organizations, our teams have not found any correlation between increased maturity of cybersecurity programs with deeper adoption of leading cybersecurity frameworks and the time it took to breach an organization. Today, 90% of data…
  • Blog
    September 22, 2022
    In this two-part blog (see Part 1 here), we discuss how to support customers’ enterprise data warehouse through DWC. In today’s business environment, many companies are seeking to realize the benefits of moving to the cloud. As SAP customers seek to bring on-premises technologies to the cloud, one of the existing enterprise data warehouses, SAP Business Warehouse (SAP BW), often comes into…
  • Blog
    September 26, 2022
    For probably the umpteenth time, we use the term 'garbage in, garbage out' when we summarize problems with data quality. It has indeed become a cliché. Various industry studies have uncovered the high cost of bad data, and it's estimated that poor data quality costs organizations an average of $12 million yearly. Data teams waste 40% of their time troubleshooting data downtime, even at mature…
  • Blog
    September 27, 2022
    Any organization that uses hardware and software, which means every corporation, today is facing an increasing risk to its cyber supply chain — and it is only going to get worse before it gets better. The SolarWinds attack in 2020 highlighted the cyber supply chain vulnerability as it was the first attack that had both a regional and global impact. Since then, bad actors have found success…
  • Blog
    August 2, 2022
    With organizations transitioning to unlock the full potential of S/4HANA and SAP cloud solutions, GRC functionalities and operations also need to be updated. For example, updating the Segregation of Duties (SoD) ruleset to support S/4HANA transactions including Fiori apps; or to run risk analysis on HANA database users. While an implementation or upgrade project would typically include the…
  • Blog
    August 24, 2022
    SAP Analytics Cloud contains a robust method by which content can be transferred among systems. Historically, content could only be transferred using a local file system on export. The same file would then be used to import into the destination system. The SAP Analytics Cloud promotion management procedure has been updated to include a cloud-based transport system called the content network,…
  • Blog
    November 1, 2018
    At a time when cyber/information security risk looms large on the minds of directors and executives, quantitative risk assessments are gaining traction as a way to understand and measure that risk. While the need to measure this risk grows, most organizations are still at a low level of maturity regarding the proper use of risk terminology and risk modeling. Getting support and, more importantly…
  • Blog
    September 7, 2022
    Like many companies undergoing a digital transformation, Protiviti’s experts recently assisted a national financial services company struggling with error-prone Financial Planning and Analysis (FP&A) processes. These processes were mostly rooted in Excel, focused on allocations and reporting, and had received limited investment in innovative technology compared with profit-generating…
  • Blog
    September 14, 2022
    An SAP BW/4HANA migration is a significant investment for any organization. With several migration options available, selecting the right one will reduce project risk, streamline the timeline and can even eliminate long-standing technical debt. This client case study frames the considerations that led to a successful methodology selection and upgrade. Our client had a mission-critical…
Loading...