Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog September 9, 2020 Research, Build, Break, Tinker: Developing a Thermal Sensor Solution The COVID-19 pandemic has upended much of our world’s traditional operations. The challenges brought about have forced organizations to quickly adapt to new ways of doing business in order to keep essential services running, while simultaneously developing plans to bring schools, offices, restaurants and more back online. The disruption brought on by COVID-19 has given us an opportunity to bring… Blog September 10, 2020 Is Software Defined Perimeter the Best Method for Adopting a Zero Trust Strategy? Enterprise networks have been described as being like an egg, with a hard shell on the outside and soft on the inside. There have been heated dialogues between security professionals that treat the "insiders" as trusted and anything outside the network as a threat. However, this thought process began to change after the introduction of Zero… Blog September 14, 2020 Source Code Repositories and Mishandled Secrets As the DevOps revolution continues to sweep across the IT landscape, source code repositories have become a prominent resource for most organizations. They provide a centralized place to track, document and collaborate on changes to applications and are a critical component of modern continuous integration/continuous delivery (CI/CD) workflows. The automation of the technology stack necessary to… Blog September 16, 2020 CISOs: Security Program Reassessment in a Dynamic World Changing Times Time has certainly altered my perspective, but I think we can all agree the world has changed incredibly in just the last few months. The good news is that, while many of us have been through significant changes or challenges in our past, we have always found a way… Blog September 17, 2020 4 Ways to Effectively Design and Configure Workday Security Given the size and complexity of most organizations, effectively managing user access to Workday can be challenging. Defining adequate security policies and requirements will enable a clean security role design with few or no unmitigated risks of which the organization is not aware. It is important to have a well-designed and strong security architecture within Workday to ensure smooth business… Blog September 22, 2020 The Resilience Benefits of a Backup-as-a-Service Solution – Part 1 September is National Preparedness Month. This two-part blog details one possible solution to data management and recovery. To learn more about Protiviti's Business Continuity Management capabilities, click here. One of the most critical functions that enterprise IT departments are responsible for, as part of their business continuity and disaster recovery planning… Blog September 23, 2020 The Resilience Benefits of a Backup-as-a-Service Solution – Part 2 September is National Preparedness Month. This two-part blog details one possible solution to data management and recovery. Part 1 can be found here. To learn more about Protiviti's Business Continuity Management capabilities, click here. BaaS and Disaster Recovery Planning Disaster Recovery (DR) planning has two primary elements: recover the … Blog September 24, 2020 The Art of Allocations – A Key Benefit of SAP Analytics Cloud Perfecting the art of allocations is much like successfully splitting the check when friends dine together (Remember those days?) Read on to see why. When a business reports or plans profitability of its goods or services, it is vital to account for all aspects of costs associated to their production. This helps determine the value of certain programs and invest more in those that drive… Blog September 25, 2020 Making the Most of the More: How Application Managed Services Makes a Business Intelligence Platform More Effective In today’s technology world, it’s all about the “more” – technology needs are getting more complex and more expensive, which in turn is driving organizations to look for more effective solutions. Ultimately, more and more companies are turning to Application Managed Services (AMS) to manage their business intelligence platforms. In this complex environment, AMS is a relatively simple solution: a… Blog September 28, 2020 The End of EU-U.S. Privacy Shield On July 16, 2020, the European Court of Justice (CJEU) issued a landmark ruling in case C-311/18 - Data Protection Commissioner v Facebook Ireland and Maximillian Schrems (more commonly referred to as Schrems II). The court found that U.S. national intelligence laws (FISA 702 and Executive Order 12333) provide inadequate privacy protection for EU… Load More