Home

Legal

Legal
Leveraging Mobile Across Departments - Non-TechnicalLeveraging Mobile Across Departments - Non-Technical

This report was generated to help non-technical teams benchmark their mobile practices against their peers.

If you are a current SAP customer, when do you plan to migrate to SAP S/4HANA?

Top Answer: No plan to migrate soon.

6003 views
20 comments
100 upvotes
Related Tags
People & Leadership
Strategy & Architecture
Cloud
End-User Services & Collaboration
Applications & Platforms
Engineering
Governance, Risk & Compliance
Data & Analytics
Business Intelligence
Disruptive & Emerging Technologies
Team & Organizational Design
Security Strategy & Roadmap
IT Strategy & Roadmap
Outsourcing & Managed Services
Network
Compute
Storage
Backup & Disaster Recovery
Public Cloud
Hybrid Cloud
Contact Center & Telecom
Data Center
Device Management
End-User Devices
Mobile
Productivity Tools
Collaboration Solutions
Document Management
Finance
Business Applications
Legal
Human Resources (HRIS)
Technical Product Management
Software Development
DevOps
Quality Assurance
Continuous Integration/Continuous Deployment (CI/CD)
Enterprise & IT Service Management (ITSM)
Availability & Capacity Management
KPIs, Metrics & Reporting
Financial Management
Vendor Management
Service Desk
Management Tools
Risk Management
Data Privacy
Artificial Intelligence & Machine Learning (AI/ML)
Data Warehouse
Integrations
Security & GRC
Identity & Access Management (IAM)
Blockchain
IoT
Innovation
5G
Peer Insights
Feedback
Vendor/Product Recommendation
Business Continuity & Disaster Recovery
Crisis Management
Customer Engagement
Customer Relationship Management (CRM)
Enterprise Resource Planning (ERP)
Business Relationships
Talent Management & Performance
Portfolio, Program & Project Management
Data Management
Big Data
Vendor/Product Assessment
Process Management
Asset & Configuration Management
Infrastructure
Performance
Operations Management
Mobile Development
Testing
What primary booking platform or software do you use to book legal clients?

Top Answer: Legal shah

895 views
2 comments
4 upvotes
Related Tags
If these companies were affected then the foundation of computing could be at risk. If you could manipulate at the hardware layer via the firmware, BIOS, ect then a threat actor could weaponize well below the operating system which brings in to question the integrity of the entire computing stack and everything above it.  The firmware and bios are like the rebar and concrete for a building. If that foundation is weak then the entire structure and anything dependent on it is at risk. We cannot underestimate the potential or the severity of these companies being potentially affected by the SolarWinds hack and what that means for the foundational computing hardware they provide to the world.  What do others think ?  How could this impact your organization ?   Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack - The Verge

Top Answer: The message here is: one is never out of the woods ever, so pay attention! Just because today's news eclipses yesterday's doesn't mean companies get to shove the bad under the rug and stay silent. Remember, vulnerabilities discovered 10-15 years back are still at the top of the list of the most exploited.

What are your thoughts on SaaS management platforms (SMP)?

Top Answer:

116 views
0 comments
3 upvotes
Related Tags
People & Leadership
Strategy & Architecture
Cloud
End-User Services & Collaboration
Process Management
Governance, Risk & Compliance
Data & Analytics
Business Intelligence
Security & GRC
Disruptive & Emerging Technologies
Team & Organizational Design
Talent Management & Performance
Culture & Values
Financial Management
Security Strategy & Roadmap
IT Strategy & Roadmap
Outsourcing & Managed Services
Network
Compute
Storage
Backup & Disaster Recovery
Public Cloud
Hybrid Cloud
Contact Center & Telecom
Data Center
Device Management
End-User Devices
Mobile
Productivity Tools
Collaboration Solutions
Document Management
Finance
Business Applications
Legal
Human Resources (HRIS)
Technical Product Management
Software Development
DevOps
Quality Assurance
Continuous Integration/Continuous Deployment (CI/CD)
Enterprise & IT Service Management (ITSM)
Availability & Capacity Management
KPIs, Metrics & Reporting
Vendor Management
Service Desk
Management Tools
Risk Management
Regulatory Compliance
Data Privacy
Artificial Intelligence & Machine Learning (AI/ML)
Data Warehouse
Integrations
Data Lake
Threat & Vulnerability Management
Identity & Access Management (IAM)
Security Operations Center (SOC)
Augmented & Virtual Reality (AR/VR)
Blockchain
IoT
Innovation
Cryptocurrency & Bitcoin
Bots
5G
Peer Insights
Vendor/Product Recommendation
Business Continuity & Disaster Recovery
Crisis Management
Customer Engagement
Customer Relationship Management (CRM)
Enterprise Resource Planning (ERP)
Threat Intelligence & Incident Response
Talent Sourcing & Hiring
Employee Engagement
Mentoring & Coaching
Training & Certification
Business Relationships
Portfolio, Program & Project Management
Data Management
Big Data
Vendor/Product Assessment
Asset & Configuration Management
Infrastructure
Performance
Contact Center Solutions
Applications & Platforms
Engineering
Operations Management
Mobile Development
Testing
Data Protection & Encryption
Leveraging Mobile Across Departments - TechnicalLeveraging Mobile Across Departments - Technical

This report was generated to help technical teams benchmark their mobile practices against their peers.

How has GDPR and CCPA changed your use or procurement cybersecurity tools?

Top Answer: Not much directly but in some situations avoiding an agent, a plugin, or something that requires a cookie will mitigate privacy risks.  Many security technologies in how they are architected, deployed, and how the vendor gathers and shares information actually is generating a substantial amount of privacy risk