Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Sort by: Relevance Date Filter Search Sort by RelevanceDate Order AscDesc Blog February 4, 2021 Build an Analytics Center of Excellence with the Support of AMS I am passionate about SAP, support, data, cloud and analytics and I’m fortunate enough to assist my clients in these areas and more. On the topic of analytics, I have had the opportunity to help develop an Analytics Center of Excellence (COE) for several global companies. While some organizations might call their COE an analytics hub or a BI Competency… Blog February 10, 2021 U.S. Government’s Focus on IoT Device Security Will Influence Private Sector Reports estimate more than 35 billion IoT devices will be deployed by the end of 2021. While these devices often provide great benefits and conveniences, they can also represent little-understood security exposures and risk. As the flood of these devices continue to connect to homes and businesses around the world, little is being done to ensure that consistent standards and controls are… Blog February 11, 2021 Why Choose a Cloud Installation with SAP BusinessObjects 4.3 The role of business intelligence and subsequently, analytics, has become more prominent in recent years and as such, the management of the infrastructure to support these platforms has become just as important. In June 2020, SAP released version 4.3 of BusinessObjects and in December of the same year, the first service pack was also released. The new release of 4.3 is known as the hybrid… Blog February 15, 2021 Technology for the Evolving Data Privacy Regulatory Landscape As technology continues to rapidly evolve, the regulatory landscape around the data that these tools collect and store becomes an evolution as well. CIOs and CISOs, who are at the forefront of this evolution, can expect to see continued challenges to their existing data privacy and security procedures as states across the U.S. and… Blog February 16, 2021 Smooth (and Secure) Operator: A Perspective on the Oldsmar Water Plant ICS Breach On February 5, 2021, the water treatment system for the city of Oldsmar, Florida was breached to such a degree that the sodium hydroxide level was briefly increased from the normal range of 100 parts per million (ppm) to 11,100 ppm — a level more suitable for household cleaners than for human consumption. While the FBI investigates the source and method of the attack, during a… Blog February 17, 2021 What to Know About Design-In Security and Controls for SAP S/4HANA (and What Auditors Care About) Having worked with different clients throughout the years, across industries and varying sizes, we notice there are many thematic “hot topics” and concerns that come in waves. Much of this has to do with evolving audit requirements, increased regulatory compliance and ensuring there is accountability, transparency, and… Blog February 22, 2021 The Power of People: Building a Future-Ready Workforce In January, our 2021 Tech Priorities blog series highlighted just some of the topics that are top of mind for CIOs and CISOs this year. In our conversations with Protiviti leaders, we learned that, in addition to being drivers of the tools that will keep their organizations’ secure, drive innovation, improve customer experience and drive revenue growth, these leaders are also faced with a… Blog February 24, 2021 Maximizing the SAP S/4HANA Investment Post Implementation Join our webinar series, Enabling Your Financial Transformation Journey Leveraging SAP Solutions. Register here. As more and more companies complete the initial move to SAP S/4HANA, we are starting to see some common challenges. Many have been focused on getting to the S/4HANA platform quickly. either through rapidly deployed greenfield implementations … Blog March 1, 2021 The Role Data Plays in an SAP S/4HANA Move: Key Steps to Sustaining Value Data quality and SAP S/4HANA migration (either through greenfield or brownfield implementation) seem to be distantly connected topics and hard to convince that they do depend on each other quite significantly. We don’t need to talk about the importance of the data in this blog, as that has already been discussed enough. With the increased… Blog March 2, 2021 Five Best Practices for Implementing Zero Trust The amount of new cybersecurity threats and vulnerabilities that organizations respond to grows every day. In many cases Zero Trust Networks (ZTN) are better equipped to tackle these challenges than traditional perimeter-based networks. Further, Zero Trust principles are becoming a critical part of the overall corporate strategy… Load More