A new report sponsored by CA Technologies examines how IT and business
leaders aim to sync the security and mobile user experience. CA
Technologies’ latest research determines that though top concerns of IT
Security practices include the elimination of breaches, data protection and
identities – mobility customer experience, in fact, ranks number two in top
Yes, that really says 42% of respondents say improving mobile customer
experience is a top priority for their organization, which is a great thing.
After all, did you see how many iPhones Apple sold last quarter? That’s a
lot of mobile devices being used for commerce, data collection, work and
play. And latest research sees it having an impact on security practices.
Digging a little deeper into the results brings more encouraging data:
Controllers rank improving mobile customer experience sl... (more)
Healthcare's Ultimate Makeover by the Digital Application Economy
After making a doctor’s appointment via your mobile device, you receive a
calendar invite. The day of your appointment, you get a reminder with the
doctor’s location and contact information. As you enter the doctor’s exam
room, the medical team is equipped with the latest tablet containing your
medical history – he or she makes real time updates to your medical file.
At the end of your visit, you receive an electronic prescription to your
preferred pharmacy and can schedule your next appointment.
Instantly, you get... (more)
APIs - application programming interfaces -- are an old technology that has
become today's hottest method for getting critical data to mobile apps. APIs
are good for business. APIs drove $2 billion in business for Expedia by
securely exposing valuable content to its affiliate network.
But there are hidden dangers to using APIs. APIs share many of the same
threats that plague the web, but APIs have unique risk profile that must be
managed. It is a mistake to think we can secure APIs the same way we secure
But there are some really simple things that anyone implementing a... (more)
While Bring Your Own Device (BYOD) programs are very widely adopted, far
fewer companies have implemented a comprehensive enterprise mobility
strategy. When there isn't a consistent governance policy in place, the
approach to mobility tends to become fragmented and siloed, with each
department executing on its own strategy.
Without a high-level, enterprise view of mobility and the governance policy
to support it, mobility management will be supported by a series of redundant
and fragmented point solutions, which can be quite costly. Worse still,
failure to implement an end-to-en... (more)
New research commissioned by CA Technologies and conducted by Vanson Bourne
shows the role of IT is changing -- and not to benefit IT leaders in many
cases. The survey of 1,300 senior IT leaders worldwide revealed 39% of
respondents now see IT as a service broker or consultant to the line of
business rather than a full-service provider of all IT services; and 35% of
IT spending is occurring outside of the IT department today - and that number
is expected to grow to 44% in three years. Other disturbing findings show
that just 11% see the role of IT as a developer of new, innovativ... (more)