How State and Local Governments Can Spend Efficiently, Restore Trust
With modern solutions, state and local governments can now achieve holistic and easy-to-access insights into their spending.
Analytics, Mobile, State and Local
With modern solutions, state and local governments can now achieve holistic and easy-to-access insights into their spending.
Cybersecurity, Human Resources, Mobile
To find out more about the risks of insider threats, check our new GovLoop Academy course, A Layered Approach to Insider Threat Prevention. This blog post is an excerpt from the course. Insider threats are dangers that originate within an organization, and they’re one of the biggest hazards that agencies face. They can come in allRead… Read more »
Cybersecurity, Human Resources, Mobile
As agencies set up security gateways and protections to guard against external hackers, the biggest threats might come from inside of the organization.
Digital Government, Mobile, State and Local
Since coming to Santa Clara County, Ann Dunkin has prioritized Agile processes and digital services, which have saved the county hundreds of millions of dollars.
Cloud, Digital Government, IT Modernization, Mobile
Increasing dependence on technology in day-to-day life has prompted governments to reevaluate their workflow processes.
Citizen Engagement, Communications, Digital Government, Mobile
Real-time text notifications can alert citizens of important details, such as public transit arrival times, disease warnings and regional reminders.
Citizen Engagement, Digital Government, Mobile
Government websites on average now handle more than 20 million users daily, with about 48 percent of traffic on federal websites coming from mobile devices.
Cloud, Digital Government, IT Modernization, Mobile
With a secure digital workspace, agencies can make their applications and data available to any employee on any device in any location.
Cybersecurity, Mobile, State and Local
Mobile apps help governments protect their constituents by keeping them aware of their phone’s security and alerting users to cyberthreats.
Everyone has great ideas for how to incorporate mobile applications into an application environment. They all start from user feedback, modernization efforts, or digital transformation. But when does that application need mobile capabilities and accessibility from multiple devices?
Notifications