Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog January 17, 2019 Managing Bots: IAM Challenges with RPA Like many new technologies, robotic process automation (RPA) is disrupting traditional solutions and introducing different risks related to its use. Bots act differently from other traditional software and services because they leverage the same interfaces as a human user, but they are inherently not human. A bot’s access needs to be managed and there are several factors to consider. Bots bring… Blog February 12, 2019 Comparing the Canadian Guidelines of Meaningful Consent to GDPR The implementation of the European Union’s General Data Protection Regulation (GDPR) in 2018 drove a ripple effect around the world as organizations were forced to take a close look at their processes to protect personal data of their global customers. Of course, obtaining an individual’s consent to use their personal data has always been important, but the GDPR requirements tightened the… Blog February 14, 2019 Resolved: Develop a Proactive Security Strategy for 2019 and Beyond In January each year, many of us (myself included) typically take time to reflect on the year that was, and the things we want to improve upon in the coming 12 months. Like many, I made some 2019 resolutions that will help me in both my personal and professional life. I’ve often wondered, if we can make personal and professional resolutions to improve ourselves, can we also make resolutions to… Blog February 25, 2019 SAP BI Platform Security Best Practices: Access Rights and Custom Access Levels This is the first in a series of blogs about security in the SAP BI Platform. The SAP BI Platform comes with a set of five default access levels: View Schedule View on Demand Full Control (owner) Full Control However, there are many situations where these either give too much access or not enough for a given situation. While it is possible to use an access level to assign security… Blog February 26, 2019 A Client’s Perspective: Getting the Right Organizational Buy-In to Build a Data-Driven Enterprise Developing an organizational culture that recognizes and respects the value of using data to drive business is a concept most clients hope to embrace. Great in theory but in reality, most companies are spread across the success spectrum, with few finding just the right mix of factors enabling them to accomplish amazing things. National Vision, a long-time Protiviti client, is widely recognized… Blog February 28, 2019 Ring, Ring: Protecting Telephone-Based Payment Card Data Integrated Services Digital Networks (ISDN) and Public Switched Telephone Networks (PSTN) are no longer the primary transmission path for basic voice or telephone signaling. In fact, according to statistics within a 2018 report released by the Federal Communication Commission (FCC), the use of Voice over IP (VoIP) solutions has dominated the US market since 2016. Due to this changing technology… Blog March 6, 2019 Oracle ERP Cloud Users Take Note – Oracle’s Fusion (Cloud) 2018 Q4 SOC1 Issued with Auditor Opinion By now it is common knowledge that the 2018 Q4 System and Organizational Controls 1 (SOC 1) Type 2 issued for Oracle’s Cloud services came with a qualified opinion. In short, Oracle’s external auditor identified control deviations during their scheduled audit efforts which focused on the April 1 to September 30, 2018 timeframe. But what does that translate to for organizations who opted for… Blog March 20, 2019 Questions Swirl as California Department of Justice Prepares for CCPA What is important to the business community with the advent of the California Consumer Privacy Act (CCPA), which goes into effect on January 1, 2020? At a recent California Consumer Privacy Act rulemaking workshop held by the California Department of Justice (DOJ), the constant refrain from attendees was for the California Attorney General to offer clarity and guidance on the anticipated impact… Blog March 26, 2019 Keeping Pace with CCPA Developments Every week seems to introduce new developments with the California Consumer Privacy Act (CCPA) either from consumer concerns, business compliance and/or how the California Attorney General (AG) will handle enforcement. One notion is clear; companies must have an operationalized privacy program in place to demonstrate compliance. Doing nothing will give rise to risks of litigation and enforcement… Blog March 29, 2019 What’s Your SAP BI Strategy: BW on HANA, BW/4HANA or SAP HANA Enterprise? With the evolution of SAP HANA, Business Warehouse (BW) has undergone significant transformation. The addition of SAP HANA as the database layer enables better integration, vastly improved performance and better business outcomes. Companies that implemented BW before HANA and haven’t upgraded may experience challenges such as additional persistent layers, complex reconciliation issues, longer… Load More