Schedule Demo

Search

Why Jabil Selected SAP Access Violation Management by Pathlock

Hear from Jabil, a Fortune 200 global manufacturing services company, how they quantified and identified true Segregation of Duties. View this video to understand first hand about their selection process, implementation, lessons learned, and key successes they have realized with SAP Access Violation Management by Pathlock. Click here to learn more about SAP Access Violation…

Are Your Cash Flow Improvements Sustainable? Get More Out of Your Balance Sheet

Cash from operations is the lifeblood of organizations and many companies continue to make improvements to managing their overall working capital. But when examined closely, large companies’ working capital performance is often not as stellar as their balance sheets suggest. This false sense of progress could result in financial executives facing a liquidity bind when…

When SIEM Data Is Not Enough

Security breaches are costly. Just ask Target, Equifax and dozens of other large organizations who have experienced data breaches in the past few years. To improve the ability to detect and respond to security incidents, companies are implementing more mature cyber security processes to defend their cyber landscape and to satisfy compliance requirements. As a…

Gain the Next Mile of Improvements in Working Capital, Inventory and Customer Satisfaction Measurements

In a growing economy, competition and the emergence of digital business models are compelling companies to improve both their physical and financial supply chain (for a definition of financial supply chain, please refer to this article). However, they are facing many chronic (and by no means trivial) issues in their financial and supply chain operations,…

Better Balancing of Risks and Opportunities

A recent McKinsey article speaks of the everyday challenge of controlling working capital: “A thousand everyday decisions can dramatically increase the cash needed to run a large business”. It seems that even though working capital is a priority to many companies (as discussed in my recent article at Finance Executives International), and has been so…

Packets and Logs Working Together

For cyber awareness and threat discovery, a combination of identity, network, device and application level solutions provide the most complete coverage. In detecting, responding and remediating threats, packet analysis and log analysis are often the go-to tools for security and SIEM teams. Packet captures provide network level insight enabling security teams to do deep-dive forensics…

Leverage Machine Learning to improve your Order-to-Cash Process

Many organizations are not able to induce their customers to pay on time. Their Days Sales Outstanding (DSO) is suffering and actually increasing, as revenue grows. A popular action is to give discounts to late paying customers or worse, to undergo tougher tacks. Working capital and margin therefore continue to suffer. For organizations that have…

Running Out of Improvement Ideas for Procure-to-Pay?

For organizations with a high volume of procure-to-pay transactions in multiple geographic locations and a complex network of suppliers, some are running out of ideas for improving Days Payable Outstanding (DPO) and other efficiencies. They have seek external help and developed better reports. But they find themselves approaching the limit of creditor stretching. As PWC…

The Top P2P Segregation of Duties Violations

According to the Association of Certified Fraud Examiners’ Report to the Nations on Occupation Fraud and Abuse, “the most prominent organizational weakness that contributed to the frauds in our study was a lack of internal controls, which was cited in 29.3% of cases, followed by an override of existing internal controls, which contributed to just…