Results for

Sort by:
  • Blog
    August 29, 2023
    Sustainability often starts in the supply chain. Without an effective sustainability program within the sourcing and procurement and supply chain functions, the rest of the environmental, social and corporate governance (ESG) footprint can quickly disintegrate. Why it matters: To maintain competitiveness, organizations must build a diversified and resilient supply base that embeds sustainability…
  • Blog
    August 23, 2023
    Two key questions: The evolution of back-office operations has been extensive and well-established. However, the evolution of front-office functions like sales and marketing has yet to shift dramatically in manufacturing organizations. Where is the science? Why do revenue-generating functions lag so far behind their more data- and analytics-driven counterparts in the back office? Why it matters…
  • Blog
    April 25, 2018
    These days, the hot analogy in the analytics industry is that “data is the new oil.” Like oil, data must be found, extracted, refined and distributed. More companies are investing heavily in cutting-edge technologies like machine learning, artificial intelligence and big data processing to help them harvest, groom and apply data to the correct use case for maximum value. So why, then, in the…
  • Blog
    August 29, 2023
    The hybridization of the workforce and subsequent challenges within the IAM world have resulted in many organizations beginning (or reimagining) their journey toward building a mature identity program. As mentioned in our previous post, Emerging Trends in IAM: Simplified Engineering, Protiviti has observed several new trends in the IAM space. This series evaluates those key trends that…
  • Blog
    August 31, 2023
    What are the hallmarks of a “relevant” internal audit function? And how can chief audit executives (CAEs) know that the business views their team as both insightful and value-adding? The profiles of leading internal audit organizations featured in Protiviti’s latest edition of Internal Auditing Around the World® help to answer these questions. They also underscore just how much the…
  • Blog
    May 2, 2018
    Although SAP HANA products have been around for some time, they continue to evolve, and we continue to find that many clients remain unsure of how to best unlock the potential of HANA solutions within their organizations. Most know that HANA is SAP’s high-powered, in-memory column and row store database. Yet many overlook the fact that SAP HANA is much more than a really quick database. It offers…
  • Blog
    September 13, 2023
    As organizations increasingly embrace cloud-based technologies to enhance productivity and efficiency, understanding the dynamic relationship between Microsoft Azure and Microsoft 365 becomes crucial for maximizing their potential. With the power of Microsoft Azure and Microsoft 365, organizations are gaining agility and driving innovation, but what is the difference between the two? When rolling…
  • Blog
    September 14, 2023
    A well-thought-out Fiori spaces and pages approach establishes a foundation for a user-friendly and scalable design that supports a least-privilege access model. When incorporated with security best practices, spaces and pages provide an intuitive experience within the Fiori launchpad in alignment with a business user’s tasks and responsibilities. As SAP S/4HANA users increasingly…
  • Blog
    September 19, 2023
    The hybridization of the workforce and subsequent challenges within the IAM world has resulted in many organizations beginning (or reimagining) their journey toward building a mature identity program. As mentioned in our previous posts, Emerging Trends in IAM: Simplified Engineering and Using the Sunlit Approach to Simplify RBAC, Protiviti has observed several new trends in the IAM space. This…
  • Blog
    September 20, 2023
    In a world where headlines are dominated by the latest breach, organizations cannot afford to rely solely on reactive security measures, lest they become the next headline. The threats entities face have become more sophisticated and more prevalent than ever before. Organizations across all industries are constantly under attack as malicious actors work to gain access to sensitive data and…
Loading...