Four Tips For Integrating Mobile Cloud Applications Into Your Treasury Department

Four Tips For Integrating Mobile Cloud Applications Into Your Treasury Department

Four Tips For Integrating Mobile Cloud Applications Into Your Treasury Department

The global enterprise mobility market is expanding at a rapid rate – predicted to bring in $140 billion a year by 2020. As the market continues to expand, so do the varying needs of mobile businesses who rely on cloud-based solutions. For mobile employees, having full product functionality at their fingertips is critical, and cloud-based services enable a much more efficient solution than legacy apps.

However, companies shouldn’t assume that “mobile” equates to “road warrior.” Employees that are primarily office-based also find value in access to data on mobile devices. Applications that provide access to specific, critical pieces of time-sensitive data are a value-add for treasury.

One example is the corporate treasurer, who is mainly in-office and benefits from a consolidated treasury management system for cash management, payments, and treasury transactions. There are times when treasurers can’t access their desktops or laptops. In fact, recent data revealed more than 66 percent of finance professionals process cash flow transactions from their mobile devices. Even though they don’t need access to every piece of information in the system, they will have urgent tasks, such as approving an urgent payment, or viewing a key report that requires instant response. In these instances, a mobile application that extends the necessary functionality from their existing treasury system is a quick and easy solution to meet their needs. It pulls core data from the cloud, without the need for a complex interface or large amounts of processing power.

Not surprisingly, the same requirements are just as important to everyone in the treasury team. That is why, when evaluating treasury technology, organizations are seeking cloud providers that offer a mobile application to extend a system’s core functions directly to employees’ mobile devices, addressing the on-demand needs of the treasury team.

The consumerization of IT is a driving factor behind mobile app adoption within the enterprise, and has impacted almost every line of business. Given the sensitive financial data that corporate treasurers access on a daily basis, it’s critical they take precautions when integrating mobile applications into their daily routine. To ensure sensitive information remains safe and secure, below are four tips organizations should consider when launching mobile applications specifically aimed at streamlining the role of a corporate treasurer:

Identify core needs: At the recent 2013 Hosting and Cloud Transformation Summit, 451 Research chief analyst Eric Hanselman noted that “enterprise IT risks being left in the dust” if they don’t speed up their adoption of cloud computing. While this is true, it is also critical that organizations don’t dive headfirst into mobile cloud adoption when dealing with the treasury department, where executives leverage mobile applications to tap into sensitive financial information. Enterprise IT must first identify the key needs of the corporate treasurer, which are very different than the requirements of a road warrior. They rarely require all the bells and whistles that some mobile applications provide. Rather, they need a solution that extends core treasury management functionality to their mobile device. This empowers them to make informed, time-sensitive financial decisions on the go.

Focus on security: Security is a top concern when it comes to mobile cloud computing. This should be at the top of an organization’s checklist when approving mobile cloud applications for any line of business, including the corporate treasury department. The good news is cloud-based software is now trusted in business-critical environments by many large enterprise and government agencies. When evaluating applications for the treasury department, an organization needs to make sure its solution adheres to the latest and most rigorous security standards to ensure its data is completely secure.

Cost: Treasury teams do not have unlimited budgets, so mobile solutions must be cost-effective. This almost always rules out in-house developed or internally hosted/supported software applications with custom designed mobile access. Mobile access must be native to the application and not require customization to put in the hands of the treasury team.

Ease of Use: While most employees leverage mobile applications in their daily lives, this does not mean they will know how to navigate all applications introduced into the business. It is critical that mobile applications improve ease of use and are as intuitive as any mobile application that one would download from the cloud.

In summary, as more organizations deploy cloud-based solutions to mobilize their workforce, the treasury department should not be left out simply because they don’t frequently travel for business. Cloud-based services and mobile applications bring numerous benefits to the treasurer. If implemented correctly, extending the core functionality of a cloud-based treasury management system to the mobile environment can streamline processes and increase efficiency.

bob-stark_smallBy Bob Stark

Bob Stark is responsible for global product and marketing strategy at Kyriba, with a focus on thought leadership, product positioning, and market development. Bob is involved in a variety of strategic initiatives including risk and hedging compliance, eBAM, supply chain finance, SWIFT connectivity, and global business alliances.  Bob is a 15-year veteran of the treasury technology industry, with a particular focus on treasury management systems. He has previously held strategic roles at WallStreet Systems, Thomson Reuters, and Selkirk Financial Technologies. 

He is a regular guest speaker at treasury conferences and is an active member of the Association for Financial Professionals.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Marketing Execs Beefing Up on Martech Strategies

Marketing Execs Beefing Up on Martech Strategies

Martech Strategies As budgets shift from traditional marketing streams to marketing technology, it’s essential that both marketers and business leaders understand marketing technology and keep up with the developments. According to eMarketer, 78% of US senior marketers surveyed believe gaining this understanding of marketing technology is increasingly relevant to their success, and the majority of…

4 Monetization Models For The Digital Business Era

4 Monetization Models For The Digital Business Era

4 Monetization Models Digital business is expected to generate billions in new revenue in the next four to five years. However, MGI Research predicts that digital businesses will need to increase their time to market by 40 percent. Many global executives admit they are unprepared to monetize their operations. The million dollar question is: how…

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

The cyberwar is on! At this stage of the game, the stakes are higher than ever, and safeguarding networks from cyberattacks is a devilish combination of Chicken and Cat-and-Mouse. Attacks are now so commonplace that many events of serious cybersecurity breaches go uncovered by mainstream media. Despite the rapid advancements in IT security technology, hackers…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

The Age of Data: The Era of Homo Digitus

The Age of Data: The Era of Homo Digitus

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…