In the retail sector, sales people can approach customers with a proposition which can be immediately demonstrated on a tablet device. Quick and flexible access to information means deals can be closed on the spot and communicated to head office immediately.
For the public sector, students are able to easily collaborate in the classroom and remotely by using highly flexible devices such as tablets. The healthcare sector also benefits from touch enabled devices, as portable technology enables doctors, nurses and staff to access and update patient information immediately, streamlining and improving patient care overall.
Whether it's improving patient care by accessing patient records immediately or increasing transactions by processing them at point of sale, touch-enabled technologies offer employees easy input devices which are portable and desirable while meeting the specific demands of their business or occupation.
In addition to productivity gains and supporting the workforce, enterprises choosing touch technology are just as dictated to by security as any other. Globally, the average cost of a data breach is $136 making security a key concern and a significant factor in limiting costs.
By offering a desirable alternative to consumer devices, enterprise-class touch-enabled technologies address the security risk factor and compliance complexities stemming from trends like BYOD by presenting employees with the type of technology they most want to use while also meeting the demands of IT. Touch technology is great for productivity but keeping devices, data, connections and networks safe without restricting workflow and preventing employees from getting their job done is a permanent concern and focus.
Regardless of the internal IT resource available, it's probably fair to say that no IT team has the capacity to continually monitor for every single growing and emerging cyber threat. The adoption of touch devices in the enterprise represents a growing number of endpoints at which these types of attacks are targeted. Therefore, a level of reassurance is a "must have" for businesses and protection against core threats including viruses, malware, spyware trojans and device damage or loss is vital.
In addition, the mobile and flexible working enabled by touch technologies like tablets, mean that data no longer resides on one device, but moves across devices and into the cloud. Therefore, data protection must move beyond simply protecting the device to protecting the data as it moves with end users. It's no wonder that data protection and encryption are the top concern of IT managers when it comes to endpoint security. To enable secure collaboration, data protection needs to be all-encompassing, easy-to-manage and must extend across multiple platforms from devices to removable media and public cloud storage. File level encryption ensures the protection of data at rest, regardless of device meaning that security levels are enhanced despite the introduction of mobile form factors. In addition to platform coverage, it's key to choose encryption technologies that won't interrupt existing IT processes or negatively impact system performance. Security can be additionally strengthened through advanced authentication measures, port control options, physical hardware lock and optional tracking and recovery services.
Sign up for MIS Asia eNewsletters.