Game Changing Process Automation Solutions
VisualVault transforms business processes quickly and cost effectively streamlining data and document
intensive processes with uniquely configured software as a service solutions (SaaS).

We know what you’re thinking

Old approaches are not working. You need effective SaaS solutions which are delivered faster than ever before with flexible pricing. Integration with existing systems is a must. Discover how VisualVault can transform business operations for healthcare, human resources, and government agencies.

Solutions

Industry specific solutions designed to complement existing line of
business applications.

Features

Intelligent web forms, workflow, content management. Designed for high volume, data intensive processes.

Value

Creative (pay for consumption) pricing configured to your specific business automation requirements.

VisualVault News

Experienced Healthcare Veteran Becomes VisualVault’s Director of Healthcare Solutions


Kathy Biggers provides a fresh outlook on how VisualVault will automate key healthcare processes that have a positive impact on providers and patients.

TEMPE, AZ – March 8th, 2018 - VisualVault, a Business Process Automation (BPA)/ Enterprise Content Management (ECM) software company, has named Kathy Biggers as Director of Healthcare Solutions. VisualVault’s cloud-based SaaS application serves as a BPA platform and provides clients with cost-effective solutions to digitally transform document and data intensive processes that no longer support service levels and performance goals of a healthcare system.

Biggers received her Bachelor’s degree from Texas Tech University in Lubbock, Texas and completed her Masters studies at University of Missouri, Columbia and Trinity Seminary, Newburgh, Indiana. Biggers has held senior business development and leadership positions at Iron Mountain, National Healing Corporation, Agility Healthcare, McKesson Provider Technologies and Emdeon.  Her 20+ years of experience in the Healthcare field provides Kathy unique insights to be a “trusted advisor” guiding clients through digital transformation in this industry.

“Kathy is a 20+-year healthcare veteran who has successfully launched and led sales and marketing teams in the Healthcare market who focused on improving outcomes for patients and providers. Her experience will prove invaluable in the expansion and growth of VisualVault in this important segment.  She is well-versed in the digital transformation challenges facing the healthcare market today and brings great passion to our fast-growing company,” said Steve Leichtman, CEO of VisualVault.

VisualVault’s SaaS based platform and unique licensing enables healthcare organizations to affordably extend the use of VisualVault to all users including providers and patients. VisualVault’s digital transformation for healthcare organizations opens the concept for these organizations to improve service levels at all levels and introduce analytics, reporting to support knowledge based decisions as well as improve governance and compliance management activities.

Kathy Biggers, Director of Healthcare Solutions, comments, “I have a passion which matches the VisualVault culture; for helping healthcare organizations understand and prepare for the current and future challenges of optimizing healthcare delivery. I am excited to join VisualVault which has a healthcare services presence which I look forward to leading.”

VisualVault also provides leadership with the reporting metrics, workflow, intelligent forms and core enterprise content management services required to enable a digital transformation that automates processes and informs decision making. Additionally, the solution provides improved oversight with the data elements recovered through VisualVault’s audit trailing capabilities. VisualVault is a versatile platform in terms of implementation, day-to-day functionality, and scalability; making it an ideal solution for healthcare organizations.

About VisualVault

Founded in 2009, VisualVault is a private, Arizona-based, Business Process Automation (BPA)/Enterprise Content Management (ECM) company specializing in the automation of data and document intensive processes at an enterprise level. The VisualVault® platform is a cloud-based application that includes Intelligent Forms (i-Forms) which automate and validate both structured and unstructured data. These i-Forms streamline manual data entry and routing processes to boost overall productivity and accelerate business results.

VisualVault enables its clients to search and present content in a contextual manner configured for their specific business requirements, improving adoption through flexibility and ease of use. VisualVault's integrated platform standardizes user data so it may be accessed, viewed and used across an enterprise providing users with live dashboards for end-to-end reporting, analysis and decision making. VisualVault’s mission is transforming our client’s processes quickly and cost-effectively, without replacing expensive core legacy systems, by streamlining their data and document intensive processes with our uniquely configured software that is delivered as a service.

 

Press Contact:

Jason Hatch
VisualVault
Phone: 480-308-4400 x225
jason.hatch@visualvault.com

99 comments

Leave a comment
  1. Vivian | Sep 17, 2018
    Thank you for sharing. Hope to see more updates on the blog. hotmail email login
  2. sindrela | Sep 11, 2018

    Word Formatting refers to make alteration or modify the text of content to different fonts and styles   

    www.office.com/setup

  3. AOL support number | Sep 11, 2018
  4. Mumbai Escorts | Sep 11, 2018
    We Deal In High Class Mumbai Models And Beautiful Mumbai Call Girls. Our Service Charge Is Low. We Provide Mumbai Escorts Service At Your Home Or In Star Hotels. We Are Available To Serve You 24 X 7.  Contact Us For Booking Ph- 09987215552  Visit- http://www.escortagencyinmumbai.com/mumbai-escorts/ 
  5. office.com/setup | Sep 10, 2018
    offline and online office Activation at office.com/setup.office.com/setup want to learn how to Download,Install and Activate your office setup, our team will provide you Offline and Online full support at www.office.com/setup.For more visit website:  office.com/setupofficecom/setup,wwwofficecom/setup,office/setup
  6. Mediterranean Diet | Sep 10, 2018
    I liked your article and I hope you will have many entries or moreMediterranean Diet
  7. Jaundice | Sep 10, 2018
    Through this post, I know that your good knowledge in playing with all the pieces was very helpful. I notify that this is the first place where I find issues I've been searching for. You have a clever yet attractive way of writing.Jaundice
  8. Vitamin B6 Deficiency | Sep 10, 2018
    It has fully emerged to crown Singapore's southern shores and undoubtedly placed her on the global map of residential landmarks. I still scored the more points than I ever have in a season for GS. I think you would be hard pressed to find somebody with the same consistency I have had over the years so I am happy with that.Vitamin B6 Deficiency
  9. Mediterranean Diet | Sep 10, 2018
    I liked your article and I hope you will have many entries or moreMediterranean Diet
  10. Jaundice | Sep 10, 2018
    Through this post, I know that your good knowledge in playing with all the pieces was very helpful. I notify that this is the first place where I find issues I've been searching for. You have a clever yet attractive way of writing.Jaundice
  11. Vitamin B6 Deficiency | Sep 10, 2018
    I finally found great post here.I will get back here. I just added your blog to my bookmark sites. thanks.Quality posts is the crucial to invite the visitors to visit the web page, that's what this web page is providing.Vitamin B6 Deficiency
  12. Remedies for Gout | Sep 10, 2018
    wow, great, I was wondering how to cure acne naturally. and found your site by google, learned a lot, now i’m a bit clear. I’ve bookmark your site and also add rss. keep us updated.Remedies for Gout
  13. Type 2 Diabetes Diet | Sep 10, 2018
    Glad to chat your blog, I seem to be forward to more reliable articles and I think we all wish to thank so many good articles, blog to share with us.Type 2 Diabetes Diet
  14. Narcolepsy | Sep 10, 2018
    Good to become visiting your weblog again, it has been months for me. Nicely this article that i've been waited for so long. I will need this post to total my assignment in the college, and it has exact same topic together with your write-up. Thanks, good share.Narcolepsy
  15. Vegan Diet | Sep 10, 2018
    This is a great article thanks for sharing this informative information. I will visit your blog regularly for some latest post. I will visit your blog regularly for Some latest post.Vegan Diet
  16. Paleo Diet | Sep 10, 2018
    I’ve been searching for some decent stuff on the subject and haven't had any luck up until this point, You just got a new biggest fan!.. Paleo Diet
  17. ahmed | Sep 09, 2018
    Mind blowing posting this is from you. I am truly and really excited to peruse this grand post. You've extremely inspired me today. I trust you'll keep on doing so! Full stack developer
  18. billu | Sep 09, 2018
    This is my first time I visit here. I found such a significant number of engaging stuff in your blog, particularly its talk. From the hunts of remarks on your articles, I figure I am by all account not the only one having all the relaxation here! Keep doing awesome. I have been importance to compose something like this on my site and you have given me a thought.Sneaker boutiques in Atlanta
  19. billu | Sep 08, 2018
    I used to cheerfully discover this web-site.I anticipated that would a commitment of appreciation is all together for your probability for this fundamental learn!! I unequivocally getting a charge out of each and every piece of it and I've you bookmarked to look at new stuff you blogWeb design company Los Angeles ca
  20. JESS | Sep 07, 2018

    We have a three-part technology to defend against chargebacks. Using our technology frees you up to concentrate on your business and keeps up your merchant account so that you can grow your business.chargeback management

    adobe support  number  – Adobe is an American multinational software company which is well known for its creation of multimedia and creativity software products.adobe support number

    www.mcafee.com/activate – Activate Your McAfee Retail card by simply visiting our website mcafee.com/activate and Get Started with McAfee Security. mcafee.com/activate

    Webroot has a wide range of product such Spy Sweeper, Windows Washer, Webroot Internet Security Essential, and Webroot SecureAnywhere etc. The first commercial product which was launched by the Webroot is Webroot Windows Washer, which is a trace removal agent. www.Webroot.com/Safe

    Webroot.com/safe - Whether you use a computing device for personal use or for your business. You are always under threat. The attackers with their highly advanced technology are waiting for your make a mistake and they will steal your data in a snap. webroot.com/safe

    Garmin.com/express - With the rising popularity of the Garmin product, the Garmin is launching new updates related to the system, security, and usability for the users. This is to offer the better service to their users.Garmin.com/express

    garmin.com/express - Garmin Express is a software which allows you to update, and manage your Garmin devices. You can update, edit, register your Garmin devices as well as sync the data with Garmin connect. Garmin.com/express

  21. ahmed | Sep 07, 2018
    I think this is a champion among the most basic information for me. Likewise, i"m cheerful examining your article. Be that as it may, should remark on some wide things, The site style is impeccable, the articles is really amazing kentucky web design
  22. billu | Sep 06, 2018
      I used to happily discover this web-site.I anticipated that would a devotion of thankfulness is all together for your probability for this significant learn!! I unequivocally getting a charge out of each and every piece of it and I've you bookmarked to look at new stuff you blogkamagra
  23. billu | Sep 06, 2018
      I used to happily discover this web-site.I anticipated that would a devotion of thankfulness is all together for your probability for this significant learn!! I unequivocally getting a charge out of each and every piece of it and I've you bookmarked to look at new stuff you blogkamagra
  24. ahmed | Sep 06, 2018
    You got an awesome blog .I will be keen on more comparative points. I see you got extremely exceptionally valuable subjects , I will be continually checking your blog much obliged. sbobet
  25. Andrew Saiman | Sep 06, 2018

    Thanks for sharing this marvelous post. I m very pleased to read this article.

    mcafee.com/activate

  26. mcafee.com/activate | Sep 05, 2018
    McAfee.com/activate – McAfee Antivirus is one of the most critically acclaimed security program across the globe. Protect your devices and data from viruses, malware, Trojan horses, worms, and other cyber threats with real-time protection and threat scanning. Get robust protection offered by McAfee by following the process (download, install, activate) on  www.mcafee.com/activate
  27. Jessica Taylor | Sep 05, 2018
    You are writing style and a great resource that you are providing and you give it away for free. We are working on whatsapp group link girl I want to share you article in my blog.. I love seeing blog that understand the value of providing a quality resource for free.
  28. mywebroot | Sep 04, 2018

    Go to www webroot com safeOnce you ready with your key code you need to visit Webroot official website (mentioned above).Login with your Email Id and password or simply click on Sign Up option to create an Account with Webroot Secure Any Where.After Login to your account add your key code & other personal Information. 

    <a href="https://www.webroot-comsafe.org/">www.webroot.com/safe</a>

  29. ahmed | Sep 04, 2018
    Your style is extremely interesting contrasted with other individuals I've perused stuff from. I value you for posting when you've got the chance, Guess I'll just book marks  check this page. Web Design Company Florida
  30. billu | Sep 03, 2018
    I used to joyfully discover this web-site.I foreseen that would a commitment of thankfulness is all together for your probability for this momentous learn!! I unequivocally getting a charge out of each and every piece of it and I've you bookmarked to look at new stuff you blogLatin food near me
  31. office.com/setup | Sep 02, 2018
    Bolster the productivity by purchasing Microsoft Office suite from office.com/setup. Select from numerous Office editions available for people with varying requirements. Access your Microsoft account to download and install Office setup. For activation of any versions of MS Office suite such as 365, 2016, 2013, 2010, and 2007 using the 25 characters alpha-numeric product key, visit <a href="https://www.offiice-com-setup.com/"> www.office.com/setup</a>
  32. www.webroot.com/safe | Sep 02, 2018

    Home users can compare each of these products, read reviews and go for customized protection for one or all of your devices according to your requirement and budget. Webroot offers real-time anti-phishing defense to protect all your personal information and data that can be easily accessed on any of your devices.

     http://www.webroot-comsafe.org/

  33. mcafee.com/activate | Sep 02, 2018
    mcafee.com/activate- Follow these basic strides to download, establishment and enact your mcafee item. for more data visit:  www.mcafee.com/activate
  34. ahmed | Sep 02, 2018
    I am continually looking on the web for articles that can encourage me. There is clearly a great deal to think about this. I think you made some great focuses in Features too. Continue working, extraordinary occupation! Long Island hip hop
  35. www.webroot.com/safe | Sep 01, 2018

    Home users can compare each of these products, read reviews and go for customized protection for one or all of your devices according to your requirement and budget. Webroot offers real-time anti-phishing defense to protect all your personal information and data that can be easily accessed on any of your devices.

    http://www.webroot-comsafe.org/

  36. mcafee.com/activate | Aug 31, 2018

    https://help-mcafee.com/activate/

    Support and Installation for Mcafee Antivirus. Setup and Activate Mcafee at mcafee.com/activate, www.mcafee.com/activate or alternatively visit mcafee com activate.

    https://help-mcafee.com/activate/

  37. billu | Aug 31, 2018
    I used to gladly discover this web-site.I expected to a debt of gratitude is in order for your chance for this phenomenal learn!! I decidedly getting a charge out of each and every tad of it and I've you bookmarked to look at new stuff you blog entwifi murah dan cepat
  38. roger vivier flats sale | Aug 30, 2018
           Great post, you have pointed out some fantastic points, I like wiseconceive this is a very excellent website.
  39. lavleen laur | Aug 26, 2018

    I really like this post! I read your site consistently and you're continually turning out with a couple of things that are surely great.

    Lavleen Laur

  40. Andrew Saiman | Aug 24, 2018

    your site is very good as well as its contents. thank you for sharing.

    mcafee.com/activate

  41. billu | Aug 24, 2018
    Surprising, astounding weblog diagram! The time will you be blog for? a man make blogging produce a relationship of being vivacious. The whole show up of your individual site page will befuddle, and the subject materialTest Bank for Better Business 5th Edition by Solomon
  42. maryrosie | Aug 23, 2018
    This is a great little post with some valuable tips. I totally agree. The way you bring passion and engagement into the things you do can really change your outlook on live.   learn  how to make slime

  43. ahmed | Aug 23, 2018
    You have completed an incredible activity. I will burrow it and actually prescribe to my companions. I am certain they will be profited from this site. hundesalon trittau
  44. avg.com/retail | Aug 22, 2018
    I have visited lots of the blogs but this blog is truthfully wonderful.  avg.com/retail
  45. webroot.com | Aug 22, 2018
    Perfectly composed content, thankyou for entropy  www.webroot.com/safe
  46. webroot.com/safe | Aug 22, 2018
    Waooow!!! Really very cool site of blogs.   www.webroot.com/safe
  47. ahmed | Aug 21, 2018
    heyy whats up... i like your blog and your artical present some unique ideas. keep it up i come back again. Brighton Accountants
  48. billu | Aug 21, 2018
     Amazing, dazzling weblog design! The time will you be blog for? a man make blogging produce a relationship of being vivacious. The whole show up of your individual site page will dumbfound, and the subject materialTax Accountants
  49. norotn setup | Jul 25, 2018
    We give reasonable and for the term of the day, dependably brace for customers. They can find best response for repairing issues, foundation issues, un-foundation issues, checking and hanging issues.
    http://nortoncomnorton.com/
  50. Sahil Arora | Jul 24, 2018
    Great article with an excellent idea! Thank you for such a valuable article. I really appreciate for $1 Web Hosting this great information.

    Leave a comment

    Industry News

    Streamlined Grant Reporting May Be Coming Soon
    Streamlined Grant Reporting May Be Coming Soon
    June 27, 2018
    Survey shows data standardization can boost efficiency, though cultural blocks remain.
    Author: Charles S. Clark, Government Executive
    Opioid Crisis Mapping and Collaboration Effort Continues Expanding
    Opioid Crisis Mapping and Collaboration Effort Continues Expanding
    June 27, 2018

    New and larger jurisdictions have begun to join the Opioid Mapping Initiative, a coordinated effort to help local government agencies share insights and use data to visualize the story of the nation’s ongoing opioid crisis. 

    As such, an effort meant to last a year when it was launched in October is now being prolonged. The Opioid Mapping Initiative, coordinated by New America’s Public Interest Technology Team, is being pushed forward by increased participation and interest, said Jeremiah Lindemann, a public interest technology fellow at New America who is coordinating the work.

    The effort started with a diverse list of 10 agencies, ranging from Boulder County, Colo., to Orange County, Calif., to West Allis, Wis. It now includes 14 government agencies and two universities, with one notable addition being Cook County, Ill., which is home to Chicago.

    “This started with me stalking governments that had already been doing things and getting them to share work in these venues,” Lindemann said. “No one had answers for everything, and they were all eager to learn from each other.”

    There are essentially two facets to participating in the Opioid Mapping Initiative. The first is sharing data sets for use on the map, which is powered by the gov tech company Esri. This map, primarily, shows the locations and stories of deaths related to opioid use.

    Users can click on instances where opiates have claimed a life and see where the tragedy happened, a picture of the deceased, and a story about who he or she was, essentially putting a human face on the epidemic to demonstrate that this is not an abstract problem, that it’s affecting people everywhere and of all different ages, genders and socio-economic backgrounds. It’s a timely effort, given that opioid use continues to worsen, claiming the lives of an average of 115 Americans a day, according to the Centers for Disease Control and Prevention.

    The second facet of participation is a monthly phone call with the other agencies to share the work being done. These calls have already yielded results. For example, Tempe, Ariz., recently described a dashboard it was using to map EMS responses to overdoses. The Northern Kentucky Health Department subsequently reached out to Tempe and swiftly replicated their work in its own jurisdiction.

    In addition to the 14 agencies that have actively joined, others have begun to listen to the calls without yet fully committing.  

    One continuing challenge the group faces, however, is a reluctance by some local governments to publicize the severity of the opioid crisis within their boundaries. Lindemann said there is sometimes a sense that officials are worried a visualization of drug deaths will be a blight upon economic development.

    “It gets stifled under the guise of economic development,” he said, “but it’s not so much about economic development right now. It’s about the development of the community down the road, and it’s about making a community better.”

    Oakland County, Mich., a participating jurisdiction, can speak to that potential. Oakland County was using data visualization technology to show the high frequency of opioids being prescribed in the area, specifically showing that in 2015 there were 48 pills classified as opioids prescribed per resident, and not just per adult. There were 48 pills prescribed per man, woman and child. In 2016, that number fell slightly to 45.

    “From a technology perspective, there’s a lot GIS can bring to the table,” said Tammi Shepherd, chief of application services for Oakland County Information Technology in an interview with Government Technology last year. “The dozen or so agencies participating in the fellowship are thought leaders in the area. We’re really excited to both share what we’ve done and learn about the best practices of others.”

    Indeed, it would seem that more jurisdictions are seeing value in publicizing the severity of the struggle, as well as in coordinating with other agencies. Cook County actually reached out to the group to inquire about joining. Cook County’s largest city, Chicago, is often in the news for gun violence, but deaths related to opioid use have outpaced shooting fatalities.

    According to local news reports, opiate deaths in Chicago have almost doubled since 2013, eclipsing 1,000. By comparison, there were 650 shooting deaths last year in the city.

    Using tech to combat the opioid crisis is also a growing trend nationwide. Last year, Attorney General Jeff Sessions announced the Opioid Fraud Detection Unit, a federal effort that seeks to use data analytics to identify malfeasance among prescribers. At the state level, related tech efforts are underway in Maine, Virginia and Pennsylvania, among others. While efforts are less common with city governments, jurisdictions such as Cincinnati have taken action, too.

    Moving forward, The New America project has a trio of objectives: continue to expand to new jurisdictions, create more national data maps, and help communities to drive decision-making processes related to policies.

    For Lindemann and others involved with the work there is a sense that peer pressure may be pushing more jurisdictions to join. In the Phoenix area for example, Tempe’s involvement has sparked interest among others in the region.

    “Everyone has a part they can play, and it’s cross collaboration,” Lindemann said. “If you’re a county, you have death data, you probably have some law enforcement data as well. If you’re a city, you have first responder data, and then if you’re a health department, you have all sorts of community resources data such as where there are treatments and being more proactive about what’s out there. Everyone has some type of stake in this, and it is going to be a collaborative effort.”

    Jurisdictions interested in joining the work can find more information here.

    Author: Zack Quaintance
    Four Measures to Keep Agency Cloud Data Safe (Industry Perspective)
    Four Measures to Keep Agency Cloud Data Safe (Industry Perspective)
    July 2, 2018
    Hacking

    When news of the latest government data breach breaks, most will conjure up images of nefarious hackers exploiting networking vulnerabilities. For others, their thoughts may turn to agencies relying on aging IT systems that cannot withstand a legitimate fight against today’s cyberthreats.

    However, there is a new breed of data breaches developing, aimed at the cloud storage buckets offered by Amazon, Google, Microsoft and other cloud vendors. These compromises take place when organizations alter rules determining who has access to shares or documents that open the door for unauthorized users to access data stored in cloud services. 

    These “leaking buckets” of data are a widely overlooked security risk that goes unnoticed until disaster strikes. It is time to acknowledge that achieving a quick transition to the cloud can no longer be prioritized over security. 

    The Perfect Storm of Vulnerability

    Most IT professionals are familiar with the basic cloud storage structure: All of an organization’s cloud data is housed in “buckets” that are used to organize information and control access. Buckets cannot nest under one another like in a traditional file storage structure, and each must be assigned a unique name. 

    By default, bucket contents are private; however, those settings are changed for a variety of legitimate reasons such as providing customer or third-party access to data. Bucket privacy settings are also sometimes overlooked or misunderstood by personnel unfamiliar with the cloud landscape — a risky oversight, considering buckets that are configured as public can be accessed by anyone who has the link.

    A staggering number of private- and public-sector breaches — including the U.S. Army, Pentagon and National Security Agency (NSA) — prove there is a fundamental disconnect between cloud security settings, bucket-identifier conventions and who is ultimately responsible for securing cloud data. 

    The crux of this cybersecurity epidemic lies in the fact that the cloud bucket namespace is global and publicly visible. When combined with misconfigured permissions and easily guessed identifiers, this creates a perfect storm of cloud data vulnerability. 

    Four Ways Agencies Can Secure Cloud Data 

    Implementing best practices for identifying data storage is key to keeping organizations off the radar of probing attackers. Security measures should also be in place to prevent access to cloud data storage through brute force or other attacks if discovered. Following are four foundational steps federal agencies should take to protect cloud data storage:

    1. Add complexity: Make bucket names unguessable.

    As with passwords, the longer and more complex bucket identifiers are, the better: Identifiers should be 64 alphanumeric characters or longer. Do not include the agency name, user IDs, email addresses, project names or other identifying information in identifiers.

    2. Use tarpitting: Slow down attackers.

    Discovering an agency’s cloud data storage location does not automatically equal compromise — successful access is still required. Often this occurs after many successive failures. Tarpitting security technology, which makes the time between attempts increasingly longer with each failed attempt, can prove a significant deterrent for hackers looking to quickly scan and access data." 

    3. Limit password attempts: Block brute-force attacks.

    Through brute-force attacks, intruders deploy software that does the work for them by generating a large number of consecutive guesses looking for an identifier until one works. Establishing maximum failed attempts is an easy way to deter these types of attacks. If the maximum number of failed attempts is exceeded, a temporary block of all activity from this attacker could be employed to further restrict access. 

    4. Stay informed: Alert security personnel of problems. 

    It is much more difficult for an agency to gauge its security stance or detect public cloud buckets staff are unaware the organization is being targeted. Security software should be configured to alert security personnel of multiple failed password attempts in order to determine if the issue is more than just a forgetful user. The scale of government enterprise cloud storage often results in sprawling bucket systems and applying secure naming standards can represent just one of many challenges to organizing and managing cloud data. 

    To ease the burden, states should consider turning to solutions providers structured to meet the unique needs of federal organizations, whose cloud applications already integrate the strongest security industry’s best practices. State cloud data — much of it entrusted to the government by the citizens it serves — requires the utmost privacy and security protections available; only then can agencies fully unlock the transformative benefits of cloud implementation. 

    Jayne Friedland Holland is the chief security officer at NIC Inc. (Nasdaq: EGOV), the nation’s premier provider of innovative digital government and secure payment processing solutions for more than 6,000 local, state and federal agencies across the United States. You may reach her at jayne@egov.com. More information about NIC is available at www.egov.com.

    Author: Jayne Friedland Holland, NIC
    Contact Us For More Information!
    * required