by Patricia Ames
Workflow was invited to attend the Executive Connection Summit in Scottsdale this October and we encountered many unexpected surprises. SAP’s Kevin Gilroy, senior vice president and general manager, Global Indirect Channels and SAP Global Partner Operations was one of them. Articulate, fun and smart with an appreciation of millennials not always present among senior management, Gilroy broke down the technology inflection point for us, among other things. Words like epic, jazzed, simplicity and introspection were used, and from Gilroy they almost sound like fighting words. Please join us in the SpeakEasy.
by Michael Howard, HP
Data breaches are a hot topic right now. Each time a retailer unknowingly has confidential information hacked, it makes the nightly news. In fact, I’m sure you’ve had your debit card replaced at least once in the past year. In the past year, 43 percent of companies have experienced a data breach. These vulnerabilities create uneasiness about the security of corporate data and impact customer brand confidence.
by Jaqueline Risley, FileBound
Cloud security is a big concern, right? Especially if you’re in a highly regulated industry with compliance requirements. Yet more than half of adults bank online, according to a survey by Pew Internet Research, which means that banks (which are heavily regulated) rely on cloud technologies for both customer-facing and back-office processes.
by Anand Sankaran
We already live in an automated world. Most of us take automation for granted in dozens of routine activities. We get cash from automated teller machines, book travel arrangements through automated reservation systems, and buy products online through automated e-commerce platforms.
by Robert Palmer
Security is obviously a major concern for every business these days, and it has become the focal point for many. Of course, the issue of IT security involves multiple aspects, from securing computing devices to protection of data, networks, and processing power, to name just a few. But the complexities surrounding security continue to mount with the ongoing overlap between office and consumer technologies and services. Computer processing and content is rapidly moving to the cloud, while mobile devices in all shapes and forms present significant risks when it comes to privacy issues and securing access to corporate information.
by Thomas Phelps, Laserfiche
No, we’re not talking about an elite sect of the Central Intelligence Agency. This article is about how to bring control and security to your organization’s unstructured content (e.g., documents, emails, voicemails and the like — essentially the information that is not housed in a database) according to the security principles of confidentiality, integrity and availability (CIA).
by Kirk Pothos, Xerox
In today’s evolving and increasingly mobile workplace, laptops, tablets and smartphones are present at meetings, at the airport, in the car and in a home office, ready to respond to a text, email or call instantly. Technology has not only impacted the way we do business, but has also changed where we do business.