Banking is undergoing a massive shift that began with the automated teller machine, continued with online banking, and is now accelerating with the advent of mobile computing. It wasn't that long ago that banking customers were limited to the branch on Main Street. Teller services were confined to the 10 a.m. to 3...
Financial services firms are facing a new set of challenges and risks. In an increasingly global, mobile and connected world, customers can come from anywhere and they can leave in a heartbeat. But they are also interested in consolidating their banking wherever possible, and they expect the companies with whom they...
For years, security leaders have struggled to find the balance between ensuring strong security and maintaining customer convenience. Benjamin Wyrick of VASCO Data Security says mobility may be the answer.
Every interaction is an opportunity to foster customer loyalty. A satisfying experience can be remembered for years and rewarded with repeat business, positive reviews to friends and on social media, and even brand evangelism. A negative experience, however, can ruin a relationship and damage brand reputation. ...
Ask your average customer how much snail mail he wants to receive from the companies with whom he does business, and the answer will likely be "zero." This is especially true for people under 30, although the evidence suggests that even older clients are moving away from their preference for paper-based documents and...
In today's global economy, access to information anytime from anywhere is essential to maintain high levels of customer service and a competitive edge. Whether it is case management, insurance claims, or internal review processes, mobile devices are in use by employees in the field and are here to stay in business. ...
Information is exponentially more valuable when it is easy to access, consume and share, which is why getting the most from your enterprise content requires more than just effective management. You also need to provide your employees with a superior user experience. That's particularly true given recent trends toward...
After a three-year delay, federal regulators remain tight-lipped about when the next round of HIPAA compliance audits will begin. But a variety of HIPAA-related guidance is in the works, a government official reveals at the HIMSS15 conference.
In the wake of the breaches suffered by JPMorgan Chase, Sony and Anthem, attack attribution and information sharing are playing more prominent roles for banking leaders, and they will be key discussion points at the upcoming RSA Conference 2015 in San Francisco.
This Flash looks at IBM's recent announcement of threat-aware identity and access management (IAM), with a focus on "enabling identity as the new security perimeter." This announcement embraces the concept of identity life-cycle management, with user self-care, enrollment, provisioning, recertification, and...
This IDC study assesses 13 different vendors offering products and services in the federated identity management (FIM) single sign-on (SSO) market. This market falls within the overall worldwide identity and access management (IAM) market as defined in IDC's Software Taxonomy, 2013 (IDC #241527, June 2013). Vendor...
As organizations strive to securely deliver high-quality, high-availability services to users around the world, they grapple with ever-changing user populations, access points and applications that are increasingly dynamic, distributed and mobile. While the traditional forms of server, network and data security are...
Organizations today grapple with the expansion of distributed computing, increased online collaboration, explosive data growth and heterogeneous IT environments all issues that make information security more critical, yet more complex than ever. Moving data to a virtualized, cloud-based environment can help develop...
For organizations around the world, nearly nonstop security threats are simply a way of life. In fact, the average organization experienced
more than 91 million security events in 2013 a 12 percent increase over 2012. But security intelligence tools make it possible to reduce these millions of events to a small,...
The plethora of business apps coupled with the always-connected nature of mobile devices represent an opportunity to improve worker productivity. However, the need to retain control over corporate data should give an enterprise pause before sanctioning widespread use of mobile apps. Learn the 7 must haves for mobile...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.