Partly Cloudy with a Chance of Compliance

Partly Cloudy with a Chance of Compliance

As advisors to our 100+ private equity clients who use M&A activity to provide positive returns to their investors, WMP helps establish platforms, processes, and technology that can enable rapid EBITDA growth. Within the world of M&A, carve-outs and divestitures are some of the most complex situations when it comes to quickly getting the newly acquired business on the right track...

Read More

What You Need to Know about Identity Access Management

Identity and access management – the process of ensuring the right people have the right access to information – should be a key component of any organization’s security infrastructure. A sound IAM approach will not only help protect your sensitive data, it will also save you time and money. However, implementation challenges such as business system complexities, lack of defined user roles and...

Read More

The Evolution of Traditional Authentication

Early this month, Microsoft officially announced that they have released another preview feature for their Azure IaaS solution stack, Azure Active Directory Domain Services.  This is a clear evolution of the way traditional Microsoft AD administrators install/configure/manage legacy Active Directory.  Although there are currently some limitations that I’ll talk about later, this is an exciting...

Read More

Performance Services: A combined distributed and centralized service desk can lead to better customer service

Businesses choose to outsource IT services for many reasons that range from quality to cost to focus.   The Performance Services (“managed services”) team at West Monroe Partners helps clients by outsourcing applications and infrastructure management.   A key component of our offering is our Service Desk which is our face to our client’s employees and in some cases, our client’s...

Read More

FFIEC and NIST: A Comparison of Two Prevalent New Compliance Frameworks

The Federal Financial Institutions Examination Council’s (FFIEC) has recently stepped into its role as the leading voice in cybersecurity-related banking regulation, bringing examiners and technology experts from all member agencies together with the expectation that the banking industry will be a leader in cybersecurity maturity and readiness. In the five years since the passing of...

Read More

Bringing Azure Automation to Your On-Premises Environment

Microsoft’s Azure Preview Portal offers a number of additional automation features as compared to the standard management portal. The most interesting to me of these Preview Portal features is the ability to provision Hybrid Runbook Workers (“HRW”) that allow your automation tasks to span both Azure and on-premises systems. For some environments, Azure Automation could even be a replacement...

Read More

How Business and IT Benefit From A Network Monitoring System

Network Monitoring Systems (NMS) are powerful platforms that can deliver monitoring services at many levels if implemented correctly – potentially providing a competitive edge. IT and business leadership often expect to get some sort of silver-bullet when implementing these platforms that will enable uninterrupted service and performance to its end users and customers, alike.…

Read More

How to Delete a Message from All Mailboxes in your Exchange 2010 or Exchange 2013 Organization

Let’s face it: IT fire drills happen. Nobody likes them and everybody tries to prevent them, but yet you’ve found this blog post because you have an urgent need to delete a message from every mailbox in your organization. Maybe there’s a virus infestation, maybe a disgruntled employee sent an inappropriate email to everyone, or maybe HR accidently sent around some social...

Read More

Business System Complexities and What To Do About It

Business System Complexities and What To Do About It Business systems are complex, only becoming more complex, and as such the management of the associated identities has spiraled out-of-control for many Enterprise organizations.  Additionally, it is increasingly more challenging to protect the type of devices that access Enterprise data.  Over the years, this has culminated in business unit...

Read More

The Right Port in a Storm

Imagine if you will, you are the captain of a ship. (I’m from Baltimore, land of tall ships.  Please pardon my nautical references.)   You have been commissioned to deliver goods and passengers from point A to point B.  You are uncertain where point B is but you have 16 years of experience sailing this ship and you earned your title of Captain. …

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons