Project Management
Project Management
Project Management
Monitor and Tracking of Deliverables
Stakeholder Management
Project Communication Approach
Scope Management
Issue Management and Escalation Approach
Change Order Management
Risk Management
KOGNITIV’S APPROACH TO MANAGING OUR CLIENTS’ PROJECTS:
Act Like An Owner
Communication is Key
Documentation is Empowerment
Repeated Methodology Founded in Experience
Transparency is Trust
KOGNITIV’S APPROACH TO MANAGING OUR CLIENTS’ PROJECTS:
Act Like An Owner
Communication is Key
Documentation is Empowerment
Repeated Methodology Founded in Experience
Transparency is Trust
TENANT AUDITS AND ENHANCEMENTS
Whether one functional area, or a review of all existing areas, Kognitiv can tailor a review and recommend to your needs. We have seen hundreds of Workday tenants at all stages of deployment, and we understand what configuration works and what features are the best to implement for your unique instance. With constant releases and patches, many different hands in the system, and years of maintaining Workday, it always pays off to have an architect conduct a review and advise a plan for improvements.
Meeting to Gather Pain Points
First Audit
Review and Questions
Final pass
Deliverable
- What we noticed that needs updating or new features that we suggest uptaking. If it is an issue, we will outline why it is an issue and the possible problems it could cause
- The correct way to make the fix, level of effort, and skill set required
- The priority in which updates should be made and why it makes sense to tackle some items before others.
TENANT AUDITS AND ENHANCEMENTS
Whether one functional area, or a review of all existing areas, Kognitiv can tailor a review and recommend to your needs. We have seen hundreds of Workday tenants at all stages of deployment, and we understand what configuration works and what features are the best to implement for your unique instance. With constant releases and patches, many different hands in the system, and years of maintaining Workday, it always pays off to have an architect conduct a review and advise a plan for improvements.
Meeting to Gather Pain Points
First Audit
Review and Questions
Final pass
Deliverable
- What we noticed that needs updating or new features that we suggest uptaking. If it is an issue, we will outline why it is an issue and the possible problems it could cause
- The correct way to make the fix, level of effort, and skill set required
- The priority in which updates should be made and why it makes sense to tackle some items before others.
SECURITY AUDIT SERVICES
At Kognitiv, we understand that a strong security model is imperative for having a clean, operational system. We also understand that Workday security is not a set-it-and-forget-it module; with constant new functional areas, functionality, and multiplying domains, a continued way to see the status of your security is important. We offer a complete review of security and authentication across all functional areas of your system (HCM, FIN, Student) paired with consultant advisory and recommendations as well as executive level deliverables and custom reporting for increased security visibility and continued maintenance
The Key, High-Level areas we audit:
- Authentication Setup and Weaknesses
- Domain and Business Process Security Policies
- Organizations and Role Assignments
- General User Access to Tasks and Data
- User Access Exceptions
- Business Process Configuration and Historical Performance
- Custom Report Catalog (including report sharing and exceptions)
- Integration Security and Account Configuration
- Background and Scheduled Future Processes
While we have encountered almost every issue imaginable, some examples of issues commonly identified
- Security configuration with systemic issues causing process routing issues (unassigned tasks) and unwanted data exposure
- Non-public items (reports, manager tasks) available publicly or to non-managers
- No authentication enforcement for specific populations (back-end loopholes for Single Sign On or multi-factor authentication)
- Non-essential Workday accounts available for login (potential for breach)
- Scheduled Processes with errors preventing completion
Some final, specific details of the audit package
- The package consists of over 20 custom reports that monitor and identify specific issues and non-best practice configuration
- The audit is completed by a Workday Security Architect who performs the initial audit, reviews the findings, and recommends/helps prioritize solutions to issues found
- All reports are built into a dashboard that can be reused in the future for ongoing monitoring and periodic audits
SECURITY AUDIT SERVICES
At Kognitiv, we understand that a strong security model is imperative for having a clean, operational system. We also understand that Workday security is not a set-it-and-forget-it module; with constant new functional areas, functionality, and multiplying domains, a continued way to see the status of your security is important. We offer a complete review of security and authentication across all functional areas of your system (HCM, FIN, Student) paired with consultant advisory and recommendations as well as executive level deliverables and custom reporting for increased security visibility and continued maintenance
The Key, High-Level areas we audit:
- Authentication Setup and Weaknesses
- Domain and Business Process Security Policies
- Organizations and Role Assignments
- General User Access to Tasks and Data
- User Access Exceptions
- Business Process Configuration and Historical Performance
- Custom Report Catalog (including report sharing and exceptions)
- Integration Security and Account Configuration
- Background and Scheduled Future Processes
While we have encountered almost every issue imaginable, some examples of issues commonly identified
- Security configuration with systemic issues causing process routing issues (unassigned tasks) and unwanted data exposure
- Non-public items (reports, manager tasks) available publicly or to non-managers
- No authentication enforcement for specific populations (back-end loopholes for Single Sign On or multi-factor authentication)
- Non-essential Workday accounts available for login (potential for breach)
- Scheduled Processes with errors preventing completion
Some final, specific details of the audit package
- The package consists of over 20 custom reports that monitor and identify specific issues and non-best practice configuration
- The audit is completed by a Workday Security Architect who performs the initial audit, reviews the findings, and recommends/helps prioritize solutions to issues found
- All reports are built into a dashboard that can be reused in the future for ongoing monitoring and periodic audits
Kognitiv By The Numbers
150+
Workday Projects
100%
of projects completed accurately
Case Studies
Get in touch
USA EAST (HQ)
1340 Centre St #208
Newton MA
02459
USA WEST
Incline Village NV
CANADA
Yonge St.
Toronto
Ontario
INDIA
Hyderabad
CONTACT US
info@kognitivinc.com
617.433.9500