Results for

  • Blog
    September 24, 2020
    Perfecting the art of allocations is much like successfully splitting the check when friends dine together (Remember those days?) Read on to see why. When a business reports or plans profitability of its goods or services, it is vital to account for all aspects of costs associated to their production. This helps determine the value of certain programs and invest more in those that drive…
  • Blog
    September 22, 2020
    September is National Preparedness Month. This two-part blog details one possible solution to data management and recovery. To learn more about Protiviti's Business Continuity Management capabilities, click here.  One of the most critical functions that enterprise IT departments are responsible for, as part of their business continuity and disaster recovery planning…
  • Blog
    September 25, 2020
    In today’s technology world, it’s all about the “more” – technology needs are getting more complex and more expensive, which in turn is driving organizations to look for more effective solutions. Ultimately, more and more companies are turning to Application Managed Services (AMS) to manage their business intelligence platforms. In this complex environment, AMS is a relatively simple solution: a…
  • Blog
    August 27, 2020
    Security data nerds look forward to the annual release of the Verizon Data Breach Investigations Report (DBIR). The report contains a breakdown of the prior year’s security incidents and breaches and provides trending data that mature security programs can benchmark against. One of the surprises in this year’s report is that organizations are…
  • Blog
    August 12, 2020
    Modern Analytic Operating Models, DevOps and Data Literacy Initiatives for SAP Analytics This is the first of several posts that focus on improving data literacy, at a business line and enterprise scale, using technology in the SAP ecosystem.  A Chief Data Officer (CDO) or other senior analytics leadership role sits at the intersection of data processing, capture, storage, governance and…
  • Blog
    September 1, 2020
    The Domain Name System (DNS) is a critical internet service that enables the translation of accessible human names like www.protiviti.com to the IP Addresses hosting services. Collaboration and communication services like e-mail and instant messaging also rely upon the resolution services DNS provides. Over the past several years, the internet has experienced significant DNS hosting outages that…
  • Blog
    August 20, 2020
    We often see operations and development teams collaborate with each other to achieve service or product delivery goals aligned with business objectives. Often, they have different objectives in mind, with the development team focused on faster deployment of code and the operations team focused on effective service management or incident response process. To make production operations management…
  • Blog
    August 25, 2020
    For organizations in the oil and gas (O&G) industry, the combined impact of COVID-19 and erratic oil prices have made for an unprecedented roller coaster ride. Many oil and gas companies are finding it difficult to cope, and others are likely to be severely impaired for the foreseeable future. However, even in the worst of times, there are tools and strategies that can help an organization’s…
  • Blog
    July 27, 2020
    With the release of SAP BusinessObjects 4.3 in June, this summer is the perfect time for SAP customers to rethink their overall analytics strategy. SAP BusinessObjects (BOBJ) remains the most powerful enterprise reporting solution on the market. With the addition of SAP Analytics Cloud, customers can now create a hybrid solution that leverages the business logic of universes with the AI/ML-driven…
  • Blog
    October 19, 2020
    Attackers are continuously evolving their tool sets to keep ahead of defenders. In this blog, we highlight and discuss one major transition occurring in the attack and penetration space: the move from PowerShell to C# as an attack framework. The History PowerShell has been an asset to penetration testers for years. Unrestricted access to…
Loading...