Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Research Guide October 21, 2021 Us primary and replicate without global Us primary and replicate without global Blog September 29, 2020 Cybersecurity Threats: Gain Visibility to Detect Events with Microsoft Azure Sentinel Organizations spend significant time and resources determining the safest way to transition to, or maintain, a cloud environment. However, given the impact over the last six months from the COVID-19 pandemic, active phishing websites have increased by 350 percent affecting both organizations and individuals who have been hacked or have fallen for phone pleas for medical supplies, donations and… Blog October 12, 2020 Establishing Foundational Cloud Governance Organizations are struggling with how to structure their cybersecurity and risk management programs in cloud environments. They are failing to understand the frameworks and resources available to them to securely configure and audit their cloud footprints. In some cases, organizations are moving to the cloud with architectures that fail to adapt to the paradigms of cloud computing… Blog October 13, 2020 Enrich SAP Analytics Cloud with Microsoft’s Excel Plug-In As a relatively new SAP analytics tool, the features SAP Analytics Cloud (SAC) offers are ever-evolving to benefit the end user. Earlier this year, SAP introduced an Excel add-in that allows companies to integrate their SAC analytic and planning models with Excel and explore data insights in the familiar spreadsheet tool. In this blog, we’ll look at how this new plug-in works and explain why it… Blog October 14, 2020 Four Common Mistakes in Cloud Environments In our previous blog, Establishing Foundational Cloud Governance, we outlined the modern technology operating environment and governance structure mistakes organizations make while using a hybrid-cloud environment. This blog looks at a few other mistakes that organizations are likely to make. The Number One Mistake: Failure to Automate An organization… Blog October 15, 2020 The Power of Hybrid Analytics As part of a typical business intelligence program, organizations are bound to take advantage of multiple systems. One system may provide exceptional reporting capabilities. Another may provide best-in-class dashboarding. Yet another may provide outstanding predictive abilities. The challenge is understanding where and how to access multiple systems in a business intelligence landscape. This is… Blog October 16, 2020 Podcast: Gone Phishing - Elaborate Scams Are on the Rise. Are You Smart Enough to Recognize Them? During cybersecurity awareness month, we are showcasing several podcasts on security and privacy issues. In this podcast, I share a personal experience with, and an in-depth analysis of, a sophisticated phishing scam. How can companies protect themselves against increasingly elaborate phishing attempts and other malicious actions? Listen to the story here. Blog October 19, 2020 Penetration Testers Tool Kit: A Transition from PowerShell to C# Attackers are continuously evolving their tool sets to keep ahead of defenders. In this blog, we highlight and discuss one major transition occurring in the attack and penetration space: the move from PowerShell to C# as an attack framework. The History PowerShell has been an asset to penetration testers for years. Unrestricted access to… Blog October 20, 2020 As Organizations Transform, the Role of the Project Manager Is Changing Project management as a function is undergoing rapid and profound transformation, and organizations are reconsidering the value project managers (PMs) can bring to their programs and projects. Over the course of a series of blogs, Protiviti will explore the evolution of the project management function from an administrative role to a transformation agent, along with the impacts to organizations… Blog October 21, 2020 Governing SAP Applications with Cloud Identity Access Governance Previously, we wrote about Cloud Identity Access Governance (IAG) based on the latest news coming out of a recent SAPinsider event. In this post, we would like to provide an update on the solution and clarify two editions we think are important to understand. Integrations There has been renewed focus by SAP to continue to innovate and integrate their suite of enterprise applications. Earlier this… Load More