Isolating the Cardholder Data Environment with Network Segmentation

Isolating the Cardholder Data Environment with Network Segmentation

In a recent post, we discussed many of the challenges with attesting to PCI DSS compliance, including a description of some of the factors that are often overlooked when defining the cardholder data environment (CDE). See “Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS)” from our recent series of blogs on PCI DSS-related topics for more information. …

Read More
Partly Cloudy with a Chance of Compliance

Partly Cloudy with a Chance of Compliance

As advisors to our 100+ private equity clients who use M&A activity to provide positive returns to their investors, WMP helps establish platforms, processes, and technology that can enable rapid EBITDA growth. Within the world of M&A, carve-outs and divestitures are some of the most complex situations when it comes to quickly getting the newly acquired business on the right track...

Read More
Planning Your ERP Implementation? Do Not Overlook the “Seamless” Integrations!

Planning Your ERP Implementation? Do Not Overlook the “Seamless” Integrations!

Is your company gearing up for an ERP system implementation? If so, have the system integrations been thoroughly scoped and planned? Planning and building integrations is not typically as “seamless”, “easy”, and “automated” as the product marketing brochures make it out to be and could delay or add unexpected cost to your ERP system implementation.…

Read More

Leveraging Open Source Technology to Deliver eBooks in Rwanda

Earlier this year I was privileged to work with the ‘Library For All‘ non-profit team out of New York to deliver a secure reader application to families all across Rwanda. I have built Learning Management Systems (LMS) for institutions around the world over the course of my career, but this particular project gave me a deeper appreciation for the reach you can achieve with mobile...

Read More

What You Need to Know about Identity Access Management

Identity and access management – the process of ensuring the right people have the right access to information – should be a key component of any organization’s security infrastructure. A sound IAM approach will not only help protect your sensitive data, it will also save you time and money. However, implementation challenges such as business system complexities, lack of defined user roles and...

Read More

Data for Good: Tackling the Open Data Movement

Last month, I had the opportunity to attend O’Reilly’s Strata Conference as a representative of West Monroe’s Advanced Analytics team. Strata focuses on trends in Big Data and Analytics, two of the hottest topics in the technology world today. At Strata, I was exposed to emerging Big Data architectures and design patterns, and had the chance to meet passionate and influential technologists in...

Read More

Hyperconverged Integrated Systems, Simply

  The traditional data center infrastructure is comprised of discrete realms (compute, storage, network, etc.) each with discrete appliances (servers, SANs, switches). As a result of the inherent dissimilarities found in traditional infrastructure builds, you end up with equally dissimilar management interfaces even within a particular realm. For example, EMC and NetApp SANs, or Dell and...

Read More

How to Create a Copy of a Production Instance in Dynamics CRM Online

Many of our clients have recently expressed the need to update their Sandbox instance to match the data in their Production instance.  Having the same data represented in both environments and in sync is crucial to consultants, developers, and clients alike.  Working in our client’s production instances is typically not a best practice, so we often design and test in sandbox before moving into...

Read More

Forcelandia: A Salesforce Developers Mini-Dreamforce

The Portland Salesforce Developer Group recently hosted the first (of what I hope are many to come) Forcelandia event on July 23rd. This event exceeded all my expectations and felt more like a hands-on mini-Dreamforce event rather than a Salesforce Developer Group Meetup. The event attracted approximately 60 attendees, along with another 10-15 event organizers, Salesforce employees, Salesforce...

Read More

Identity and Access Management – The Cart or The Horse?

In my experiences with identity and access management (IAM) projects, there is always a moment when you begin having a “Are we putting the cart before the horse?” conversation.  This is particularly the case when you are, in parallel, having a conversation about how to “enable” IAM in the environment by either redesigning your current implementation of Windows Server Active Directory, creating...

Read More

Tips on supercharging your ETL

We live in the era of big data explosion with data volumes growing at exponential pace.  At the same time data driven organizations increasingly demand more real time data availability. Given these trends, ETL performance is quickly gaining business importance. Let’s look at a few approaches that could be considered to maximize performance of data processing.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons