Some Secrets to Success of iPad Application in E-Health

Add bookmark
Helen Winsor
Helen Winsor
07/19/2011

"Most organisations looked at security over the last couple of years and personal devices wouldn’t have been allowed if it’s portable and encrypted. So we’ve turned things around there. Obviously corporate equipment is still encrypted but we’ve developed ways of allowing users to use their own devices, smart phones, tablets, laptops in a way that we don’t have to manage their local security AV protection. They’re isolated away from the corporate equipment and corporate data but they have access...
To continue reading this story get free access

RECOMMENDED