Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

HIPPA

RSS Feed    Add to Google    Add to My Yahoo!
HIPPA White Papers (View All Report Types)
 
7 Ways to Manage Rapid Patient Data Growth
sponsored by Dell Compellent
WHITE PAPER: This white paper discusses seven ways healthcare IT teams can use Dell Compellent Fluid Data storage to drive efficiency, ensure high availability and protection, and readily adapt to constant change.
Posted: 10 May 2011 | Published: 30 Jul 2010

Dell Compellent

Selecting the right EHR for the Life of your Practice and Your Patients
sponsored by HP & Intel®
WHITE PAPER: If we are at or approaching a technological tipping point in the history of healthcare, then it has never been more important for physician practices to select the right electronic health record (EHR) – and there are tangible reasons to believe so. This white paper discusses criteria for selecting the right EHR solution.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

Document Solutions IP Faxing versus Conventional Faxing: A Critical Analysis
sponsored by Premiere Global Services
WHITE PAPER: This white paper uses examples in three industries with the heaviest fax usage - finance, healthcare, and insurance - to demonstrate costs and risks that are shared across all industries.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Premiere Global Services

Laptop Locks: A Simple and Cost-Effective Approach to Data Loss Prevention
sponsored by Kensington
WHITE PAPER: This paper will educate IT decision makers on the need for physical security, how it can protect sensitive data, and how Kensington laptop locks can help.
Posted: 04 Oct 2010 | Published: 04 Oct 2010

Kensington

Achieving Compliance in a Virtualized Environment
sponsored by Tripwire, Inc.
WHITE PAPER: The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.
Posted: 25 Sep 2008 | Published: 19 Sep 2008

Tripwire, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Enabling Sustainable Compliance Management
sponsored by IBM
WHITE PAPER: Read this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.
Posted: 22 Dec 2008 | Published: 19 Dec 2008

IBM

CWAT Data Loss Prevention - Whitepaper/Technical Review
sponsored by Software Engineering of America, Inc.
WHITE PAPER: CWAT monitors all terminals including laptop computers and even missing terminals that are disconnected from networks.
Posted: 25 Feb 2008 | Published: 01 Sep 2006

Software Engineering of America, Inc.

Forrester Research: Improving Application Deployments - How an Application Delivery Architecture Can Help Businesses Overcome Deployment Challenges
sponsored by F5 Networks
WHITE PAPER: Today's businesses must operate in a drastically changing environment. Forrester found most companies are not well equipped to reorient IT as a critical driver of top line success. This report showcases the results of an April 2007 Forrester survey.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Privilege Made Simple: Privilege Identity Management (PIM) Demystified
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more.
Posted: 29 Mar 2010 | Published: 26 Mar 2010

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement