Vertical Industries  >  

Health Care Industry

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Industry Reports
1 - 25 of 577 Matches Previous Page  |  Next Page
How To Approach Mobile Healthcare Security And Data Breaches
sponsored by Absolute Software
EGUIDE: In this expert e-guide, Reda Chouffani, industry expert and cofounder of Biz Technology Solutions, presents 7 best practices for protecting mHealth data from loss. Also inside, Don Fluckinger, Senior Content and Media Strategist at Schwartz MSL Boston, explores the aftermath of a breach.
Posted: 26 May 2015 | Published: 29 Apr 2015

Absolute Software

Healthcare Risk Management: Best Practices for Creating an Effective Program
sponsored by Auxilio
EGUIDE: This expert e-guide outlines the 5 common mistakes healthcare organizations make when creating a comprehensive security risk management program. Continue reading to uncover a 3 step strategy for ensuring security risk management success.
Posted: 26 May 2015 | Published: 20 May 2015

Auxilio

SVC and Red Hat Secure Austrian Healthcare E-card System
sponsored by Red Hat
CASE STUDY: Access this case study to learn how one organization implemented an enterprise application platform to construct a sustainable architecture for the operation of an electronic health card. Explore the key elements of the e-card infrastructure and how it enables secure, efficient communication between patients and providers.
Posted: 21 May 2015 | Published: 30 Apr 2015

Red Hat

Overcoming BYOD & HIPAA Breaches at Hospitals
sponsored by Box
RESOURCE: Check out the following IDC infographic to learn how with the right cloud system in place, hospitals can alleviate, and in many cases, overcome BYOD and HIPAA breach issues. Read on now to learn more.
Posted: 20 May 2015 | Published: 20 May 2015

Box

With ICD-10 Implementation, the Medical Industry Can Escape the Past
sponsored by Allscripts Healthcare Solutions
EGUIDE: Explore the debate on whether ICD-10 will be beneficial for healthcare providers and patients or not, and why we should move forward with implementation.
Posted: 15 May 2015 | Published: 29 Apr 2015


FAQ: How Will The Transition To Icd-10 Codes Affect Health IT?
sponsored by Allscripts Healthcare Solutions
EGUIDE: As of Oct. 1, 2015, U.S. healthcare providers must use ICD-10 codes when they submit medical claims. This FAQ addresses what the transition means and how providers can prepare.
Posted: 14 May 2015 | Published: 01 Apr 2015


CHIME & SearchHealthIT ICD-10 Survey Brief
sponsored by Allscripts Healthcare Solutions
EGUIDE: Learn from industry experts why so many healthcare organizations need to ramp up ICD-10 preparations for the delayed October 1st and gain insights into the advantages and challenges of the new coding system.
Posted: 14 May 2015 | Published: 30 Sep 2014


Replacing Your Revenue Cycle: A Roadmap to Financial Health
sponsored by Allscripts Healthcare Solutions
WHITE PAPER: Discover how you can replace your revenue cycle to capitalize on the latest technology in healthcare finance in this white paper.
Posted: 06 May 2015 | Published: 06 May 2015


How to Turn Your C-Suite into Your A-Team
sponsored by RES Software
WHITE PAPER: Access the following white paper to learn how RES Software can help you improve quality care and deliver easier access to IT services at a lower cost, all while protecting security and compliance.
Posted: 06 May 2015 | Published: 06 May 2015

RES Software

TriviumMeulenbeltZorg: Upleveling Patient Care
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines how TriviumMeulenbeltZorg, a personal healthcare provider based in the Netherlands, found one solution (after evaluating several) that allowed for instant patient updates while enabling unified network management and exceptional performance.
Posted: 05 May 2015 | Published: 05 May 2015

Hewlett-Packard Company

Compliance Penalties + Class Action Damages = Healthcare Budget Crisis
sponsored by Absolute Software
WEBCAST: Examines the cost of a breach in the healthcare sector and why you need to go beyond encryption to protect your organization. View this webcast now for strategies to limit the exposure of your organization to security risks.
Posted: 05 May 2015 | Premiered: Mar 19, 2014

Absolute Software

Espria Case Study: Reducing Budget without Impacting Quality of IT
sponsored by RES Software
CASE STUDY: The following case study explores how RES Software aided Espria in reaching its goals to reduce operating costs, do more with less, and provide its caregivers with a facet to leverage the benefits of self-service. Access now and learn how you can attain similar results.
Posted: 05 May 2015 | Published: 05 May 2015

RES Software

IBM Case Study: Kelsey - Seybold Clinic
sponsored by IBM
WHITE PAPER: This white paper examines how the Kelsey-Seybold Clinic, a Houston-based organization operating twenty healthcare facilities and serving over a half million patients, improved the operation and use of its Epic EMR solution by revamping its storage and server infrastructure.
Posted: 05 May 2015 | Published: 05 May 2015

IBM

When Data Breaches Don't Have To Be Reported
sponsored by Absolute Software
WEBCAST: Join Jeff Pelot, CIO at Denver Health, for a QA&A session on data security in healthcare organizations, how to stay on top of regulations, remain compliant, and how to prove that patient data on mobile devices is not at risk.
Posted: 04 May 2015 | Premiered: Feb 18, 2015

Absolute Software

Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
WEBCAST: Find out about data breach trends and statistics, including the cost of a breach and common attack strategies, in this webcast. View now to learn the steps to take to mitigate and respond to a breach.
Posted: 04 May 2015 | Premiered: Jan 22, 2015

Absolute Software

What You Should Do Today to Protect Endpoint Devices in Healthcare
sponsored by Absolute Software
WEBCAST: With only roughly 50% of healthcare endpoints being secure with encryption, it's obvious that healthcare security pros need to revamp strategies.  View this webcast to take an in-depth look at the current threat landscape for healthcare organizations how to protect endpoint devices using five design principles. Watch now to learn more.
Posted: 04 May 2015 | Premiered: Feb 2, 2015

Absolute Software

Centricity™ Cardio Enterprise Solution for the Echo Lab
sponsored by GE Healthcare
WHITE PAPER: Centricity Cardio Enterprise solution for the Echo Lab empowers cardiologists to help enhance patient care through full clinical access, optimized productivity, and improved revenue cycle efficiencies. Read this white paper to learn more about this single point of access to unified patient data, images, and reports.
Posted: 04 May 2015 | Published: 04 May 2015

GE Healthcare

Centricity* Cardio Imaging
sponsored by GE Healthcare
WHITE PAPER: This white paper describes a specific cardio imaging solution that helps reduce costs by optimizing storage management for the cardiovascular department and beyond. Read now to reduce your IT footprint and your system's total cost of ownership.
Posted: 01 May 2015 | Published: 01 May 2015

GE Healthcare

Empowering Cardiologists to Enhance Patient Care
sponsored by GE Healthcare
WHITE PAPER: Read this white paper to learn how cardiologists can gain a single point of access to unified patient data, images, and reports across multiple modalities, with end-to-end configurable workflows. Additionally, cardiologists can enhance patient care through improved productivity and revenue cycle efficiencies.
Posted: 01 May 2015 | Published: 30 Nov 2011

GE Healthcare

Optimal care for patients and their data
sponsored by Dell, Inc. and Intel®
CASE STUDY: Access this case study to learn how FastMed Urgent Care combined leading encryption technology to encrypt all endpoint devices with file-level encryption in order to protect patient data with the highest level of encryption.
Posted: 30 Apr 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute Software
RESOURCE: In this research conducted by Gartner, discover the major findings of the HIPAA-HITECH debate between keeping patient information accessible or fully disclosed. Uncover recommendations on how to choose a side, lobby, and enter the public debate.
Posted: 30 Apr 2015 | Published: 11 Sep 2014

Absolute Software

The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015

Imprivata

Curvature & Sisters of Charity Health System
sponsored by Curvature
CASE STUDY: This short case study shows how Curvature was able to reduce costs for the Sisters of Charity Health System
Posted: 24 Apr 2015 | Published: 31 Dec 2014

Curvature

The Opportunities and Challenges to Healthcare Innovation
sponsored by Mashery
WEBCAST: Julie Ask, author of The Mobile Mindshift, addresses how healthcare companies can extend their platform via Application Program Interface (APIs) in this webinar. Discover what can be accomplished if the healthcare industry optimizes mobile services.
Posted: 22 Apr 2015 | Premiered: Jun 12, 2014

Mashery

Could HIPAA Make Criminals Out of People You Know?
sponsored by 8x8, Inc.
WHITE PAPER: This white paper teaches you how to evaluate telecom providers for storing important data such as faxes, voicemail, and other PHI. View now to learn when to trust an organization as an associate and when to realize red flags are being raised.
Posted: 17 Apr 2015 | Published: 18 Aug 2014

8x8, Inc.
1 - 25 of 577 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement