Results for

  • Blog
    June 15, 2020
    Hospitality Company Moves to SAP on Azure to Manage Internal Data In an earlier blog, we shared a system architect’s view of a recent re-platforming project. In this post, Protiviti Managing Director Don Loden reviews the business decisions that drove this important client project. Making the decision to move a data platform from an external vendor to an in-house solution and do it in a…
  • Blog
    June 8, 2023
    The big picture: Financial reports released by the world’s largest mobile carriers in the first quarter show significant growth in fixed wireless access (FWA) customers – the clearest signal yet that 5G, which allows homes and businesses to connect to the internet through radio frequencies instead of cables, is gaining serious momentum. A number of factors are enabling FWA’s growth, including…
  • Blog
    June 18, 2020
    Growing demand for intelligent, available and accurate data is fueling organizations as they implement digital transformation activities. Whether moving to the cloud, supporting new innovations or preparing for a move to SAP® S/4HANA, the need and pressure for change is immense. And, while digital transformation projects are key drivers for growth, they also create and expose organizations to…
  • Blog
    June 18, 2020
    Join us for our Practical Guide to SAP Security Webinar Series Business-critical applications such as SAP are at the core of your business activities and many organizations depend on SAP to run their daily business. To protect your SAP landscape against various cyber threats, prevention, detection and response capabilities are essential. This practical guide to SAP Security gives you insights…
  • Blog
    October 24, 2023
    In a recent blog, we introduced the drivers for cloud migration, the strategies and the most common types of cloud migrations available to organizations. Today, we take a closer look at what drives a successful cloud migration and think beyond the 7Rs of migration to embrace a transformative approach to modern cloud migrations. Whether migrating through lift and shift (rehost) or through…
  • Blog
    October 25, 2023
    The big picture: Smart devices have become ubiquitous throughout society, providing greater convenience and efficiency to consumers and businesses. Unfortunately, the occurrence of criminals exploiting device vulnerabilities to steal data, install ransomware and stage costly cyber attacks has become equally pervasive. Why it matters: Cyber attacks can have severe consequences for…
  • Blog
    October 25, 2023
    The big picture: The rapid emergence of environmental, social and governance (ESG) mandates from around the globe is requiring companies to collect, organize and report new types of data in new ways; many are not ready. Why it matters: Manufacturing and distribution (M&D) companies are behind other industries in their data management capabilities, and they need to catch up – fast. The…
  • Blog
    October 23, 2023
    A key point: Cyber criminals are finding success exploiting vulnerabilities in outsourcing arrangements due in large part to the “blind faith” complacency with which many businesses manage third-party vendor relationships. As guardians of the enterprise, business leaders should ask themselves these critical questions when considering a third-party vendor arrangement: Is our organization entering…
  • Blog
    September 11, 2017
  • Blog
    October 18, 2023
    What’s new: The annual budget process can be more than just a routine financial exercise. Why it matters: Setting strategic direction, allocating resources and establishing goals for the upcoming year can elevate the process to one that can be leveraged to guide financial and strategic decisions and allow an organization to adapt to a continuously changing landscape. Go deeper. Annual…
Loading...