InsightsInsights into our work and our topicsBlogCBAM reporting obligation - action must be taken now!Learn moreBlogSuccess in the hyperautomation of processesLearn moreBlogWhy Cybersecurity Needs Ethical HackingLearn moreSericeRelease Manager Training - Dates 2024 in Vienna and MunichLearn moreAllBlogNewsPeopleServicesSuccess StoriesTrainingsAllAllBlogNewsPeopleServicesSuccess StoriesTrainings News Three important points for the use of CBAM default values Learn more Services Jira Migration – your key to smooth data transfer Learn more News Ventum becomes world champion at the Celonis Ecosystem Hackathon Learn more Success Stories Requirements engineering for a utility software Learn more News How a UX strategy creates value Learn more People Women’s Power in IT Consulting: Shaping the Future Together Learn more Success Stories IT Transformation S4/HANA – Get your project team ready in 4 weeks Learn more News Follow-up report and pictures of Agile Beyond IT (ABIT) 2023 Learn more News Why Cyber Security Needs Ethical Hacking Learn more News Six common misconceptions about enterprise cyber security Learn more News Interview on digitization: “The image is colorful” Learn more News Success factors in the hyperautomation of processes Learn more News The drivers of digital transformation Learn more News The System Usability Scale – How to measure usability and UX Learn more News The vision of process automation in administration Learn more News UI Design: Differences between Wireframes, Mockups & Prototyping Learn more News User-Centered Design: user-oriented software development Learn more News Bogus security through vulnerability scans: Why Pentesting Abandonment Costs Billions Learn more News Digital transformation in the retail environment Learn more Success Stories Cloud strategy: concrete instead of cloudy Learn more