security Articles - Perficient Blogs
Blog

Posts Tagged ‘security’

  • Topics
  • Industries
  • Partners

Explore

Topics

Industries

Partners

Security and Compliance in Microsoft Teams

Whether your company has 10 people or 10,000 people, security measures need to be in place to ensure a safe, secure, and compliant environment for your end users. Many companies will often be required to adhere to certain security regulations and compliance standards but rest assured Microsoft has your back.  Microsoft understands this need for […]

Read more

Microsoft Intelligent Security Solutions

Part 1 – Microsoft Secure Score 56 Security Actions You Can Take Today to Improve Your Security Posture Microsoft has been investing substantially in security and compliance since 2004, and today that investment protects all Microsoft products, but none more so than Office 365 and Azure. One shining culmination of that investment is Microsoft Secure […]

Read more

Healthcare Cloud Usage Grows Despite Doubts

The healthcare industry is leaning upon cloud more heavily, but there is still mistrust regarding its security, according to research presented at HIMSS 2019. The insights, shared by HIMSS Media’s Janet King at the conference, show contradictions around cloud in the industry. Security worries persist despite cloud usage growing. Here are the five key takeaways […]

Read more

Oracle Fusion SaaS Security with Oracle Analytics Cloud

The question that is often asked is: Can we leverage the same security we already have in Oracle Fusion SaaS (which includes users, duties, roles and security policies) to secure data in Oracle Analytics Cloud (OAC – an Oracle PaaS)? The answer is Yes. To understand better how this is possible, keep reading. This blog […]

Read more

How to Create an OAC Data Replication from Oracle SaaS?

Oracle Analytics Cloud offer several options when it comes to loading data from Oracle SaaS (such as Financials, HCM, Sales, etc…). Using OAC against Oracle SaaS has several advantages, and most importantly being able to perform analytics on data that is not part of the SaaS application. You may be familiar with using Data Sync […]

Read more

How to Integrate Oracle SaaS Data into Oracle Analytics Cloud?

Reporting on Oracle Fusion and non-Fusion SaaS Apps from Oracle Analytics Cloud (OAC) is a common solution to performing cross-functional reporting from one or more Cloud and non-Cloud applications. The BI capabilities within each of the transaction systems, whether Financials, HCM, Sales or other, are limited when it comes to integrated reporting with external data […]

Read more

Custom Data Connector for Power BI Using MicroStrategy

The MicroStrategy platform allows custom data connectors to access data from nearly any source, which includes Microsoft Power BI. In order to bring the best of both worlds together, Perficient’s MicroStrategy experts have developed a custom data connector to help Power BI users do just that. This custom connector integrates the two products and provides […]

Read more

Preparing for TLS 1.0/1.1 Deprecation and Why You Should Care

As you may have heard through the grape vine, TLS 1.0/1.1 will be deprecated starting October 31st, 2018. So what does that mean and why should you care? In this article we’ll discuss what this means for users of Lync/Skype for Business on-premises and Skype for Business Online and why TLS 1.2 will be mandatory going […]

Read more

4 Benefits of a Single Sign On in Healthcare

Wouldn’t it be nice if there was a single sign on (SSO) for your daily work routine? How many moments would be spent helping a patient, instead of staring at a screen trying to remember usernames or password credentials? Take a moment and consider this. How many applications, websites, and dashboards do you have to […]

Read more

IoMT and the Necessity for Cybersecurity

Cyber-security: a continuous mission to supervise, support, and evolve data protection. Healthcare providers remain aware and proactive in regards to cyber-attacks or malware that feature threats to patient records, and internal documents. By continuously remaining alert, healthcare organizations can confirm their IoMT networks are secure. What is Internet of Medical Things (IoMT)? IoMT features a […]

Read more

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.  Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials.  […]

Read more

Lightning Flow, Data Security, Summer ’18 Enhancements & More

Top Salesforce Updates You Need to Know Einstein, Lightning & More: What’s New in Salesforce Sales Cloud in Summer ’18 Top 5 Jaw-Dropping Salesforce Communities Summer ’18 Enhancements Why is Data Security Important to Me? Running an Integrated ABM Campaign in 5 Steps Connecting to Salesforce in Outlook Perficient’s Award-Winning Partnership with Salesforce What Organizations […]

Read more

Extreme Customer Experience Makeover

Digital innovation continues to disrupt industries at lightning speed. Today’s organizations are transforming their entire business – from strategy to operations, technology to culture – to better deliver value to their customers. In 2017, we compiled the top 10 trends leaders needed to know when it came to their digital transformation journey. In this 10-week […]

Read more

Salesforce Shield Platform Encryption: Keeping Data Safe

As mentioned in our intro blog, Salesforce Shield: Bringing Compliance to the Cloud, customer information security is critical to Salesforce’s success. In this blog, we’re going to take a look at another part of Salesforce Shield Platform Encryption. When regulations require more protection Your data is already very secure. But to meet the increasingly demanding […]

Read more

Maximo Application Data Import Export – Data Loading

In this first part of my Maximo Data Loading series, I will cover the Maximo Application Data Import Export functionality. This is great functionality that was introduced in version 7.5, and many today still do not utilize it’s functionality. This allows you to go into any Maximo application, and export data from a query or […]

Read more

Overcoming Challenges to Blockchain Adoption

Blockchain was 2017’s technology buzzword of the year, inspired by developments in cryptocurrencies and a desire for more secure transactions. Blockchain technology has the potential to transform enterprise business models through cost reduction and increased operational efficiency. Yet, there are challenges to adopting Blockchain, as it is a nascent technology. Some of these challenges include: […]

Read more

Maximo Public Query Best Practices – or How I Would Do It

It’s happened in more places and implementations than I can count. A client uses Maximo, and a user, we’ll call him Bob, comes up with some great and useful queries. The easiest way to share it? Make it PUBLIC! This is great that Bob can share the query with everyone that uses Maximo. And then […]

Read more

Analyzing the Collision Course of DevOps, AI, and Security

Technology consolidation is constant theme transforming industries. For example, personal computers have merged with tablets and mobile phones as consumers show their interest in computing power on the go. Even applications have gotten smaller, with traditional software replaced by lightweight applications. Logically speaking, the same is happening in the enterprise software world where DevOps, security, […]

Read more

Security in the Cloud with Office 365

Making the move to the cloud can be intimidating. There are many things to consider: What are the best practices? Who are the most knowledgeable vendors? Which is the best solution? But one consideration that should be at the forefront of all cloud migration decisions is security. Many organizations can be hesitant to make the […]

Read more

Identity Management in Office 365

Identity and authentication management is the most crucial component of any migration to Office 365. Office 365 uses the cloud-based user authentication service Azure Active Directory to manage users and offers three identity models: cloud-only, synchronized, and federated. It is important to carefully consider which identity model to use, as well as the cost and […]

Read more

Subscribe to the Weekly Blog Digest:

Sign Up