All resources sponsored by:

Absolute

17 Matches
Top 10 Security Priorities For US Healthcare Organizations
sponsored by Absolute
WHITE PAPER:This report by Gartner reveals the main security challenges the healthcare industry faces. Unveil the top 10 security priorities for US healthcare organizations so that you can address the industry's most difficult challenges.
Posted: 24 May 2016 | Published: 22 Oct 2015
Get This Now


A Legal Practitioner's Guide To Mobility Risk
sponsored by Absolute
WHITE PAPER:This white paper explroes the challenges of mobile computing for legal organizations and offers 8 tips for securing mobile devices and data to avoid penalties.  View now to learn more.
Posted: 14 Mar 2016 | Published: 13 Nov 2014
Get This Now


The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute
WHITE PAPER:This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 14 Mar 2016 | Published: 08 Jul 2015
Get This Now


Remote Data Management a Necessity at Law Firms
sponsored by Absolute
WHITE PAPER:This white paper provides solutions to ensure data security and privacy. Add persistent endpoint security and data risk management solutions to your IT environment to lock up confidential client information and use your security prowess as a standout advantage in your field.
Posted: 14 Mar 2016 | Published: 31 Dec 2015
Get This Now


Global Data Breach Notification Laws: Meeting Requirements and Mitigating Risks with Endpoint Security
sponsored by Absolute
WHITE PAPER:This white paper discusses the basic requirements of data breach notifications and highlights an endpoint protection technology that can help you develop effective risk management and compliance strategies. Read on to discover how you can ensure the security of your devices and protect your information.
Posted: 11 Mar 2016 | Published: 31 Dec 2015
Get This Now


The Three Faces Of Insider Threat
sponsored by Absolute
WHITE PAPER:This white paper overviews the three faces of insider threat and offers best practices for how to easily identify behavior and determine an appropriate response when faced with each threat. View now to learn how you can prevent an insider threat from affecting your enterprise's data security.
Posted: 11 Mar 2016 | Published: 11 Mar 2016
Get This Now


Achieving HIPAA Compliance
sponsored by Absolute
WHITE PAPER:This white paper shows you how to ensure HIPAA compliance even as healthcare becomes an increasingly mobile environment.
Posted: 11 Mar 2016 | Published: 31 Dec 2015
Get This Now


Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER:This white paper gives you tips on how to protect your sensitive data and what to look out for in today's dynamic threat landscape. Access now and learn how to foster an environment of diligence among your employees so they can protect your enterprise from catastrophe.
Posted: 10 Mar 2016 | Published: 08 Jul 2015
Get This Now


The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER:This white paper sheds light on how hostile the PHI black market is with recent breach reports. Learn from other healthcare organizations that have experienced a data breach and make security adjustments to ensure you don't suffer the same fate.
Posted: 09 Mar 2016 | Published: 31 Dec 2015
Get This Now


Top 6 Security Considerations in Migrating to Microsoft Windows 10
sponsored by Absolute
WHITE PAPER:This white paper can help you make the migration to Windows 10 without sacrificing your security.
Posted: 05 Aug 2015 | Published: 05 Aug 2015
Get This Now


HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute
WHITE PAPER:Follow the evolution of HIPAA-HITECH regulations over the past few years, learn why compliance is more important than ever before, and gain knowledge on how to avoid violations inside this resource.
Posted: 04 Aug 2015 | Published: 15 Jul 2015
Get This Now


Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE:In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014
Get This Now


HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute
WHITE PAPER:In this resource, read about some recent HIPAA breaches that cost the violating parties significant penalties and learn about the measures that can be put in place to help maintain compliance.
Posted: 21 Jan 2014 | Published: 15 Jan 2013
Get This Now


Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act
sponsored by Absolute
CASE STUDY:This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.
Posted: 13 Nov 2013 | Published: 31 Dec 2012
Get This Now


La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute
VIDEO:In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013
Get This Now


Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute
WEBCAST:The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013
Get This Now


PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks
sponsored by Absolute
WHITE PAPER:Read this white paper to learn how new hardware-based technology, could help reduce the incidence of notebook theft. The result can be better protection of assets and sensitive data on notebooks, rapid reactivation when systems are returned, and reduced business risk.
Posted: 14 Dec 2009 | Published: 14 Dec 2009
Get This Now


17 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement