Health Care Security

RSS Feed    Add to Google    Add to My Yahoo!
Health Care SecurityReports
1 - 25 of 228 Matches Previous Page  | Next Page
Preventive Practices Help Avoid Costly Security Breaches and Data Risks
sponsored by Insight
WHITE PAPER: This white paper summarizes a number of recent articles on preventive practices that healthcare providers should take in order to avoid falling victim to security breaches that put highly sensitive patient data at risk.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Insight

Healthcare IT Managers Discuss Desktop Virtualization
sponsored by Unidesk Corporation
WEBCAST: View this webcast to see four leading healthcare providers discuss the impact of desktop virtualization on their organization and how a management solution helped them to reap the benefits.
Posted: 26 Nov 2014 | Premiered: Jul 24, 2014

Unidesk Corporation

Addressing Changes in the Healthcare IT Legislative and Regulatory Environment
sponsored by Dell
WHITE PAPER: Access this white paper to discover how cloud client computing solutions supported by VDI provide a flexible, integrated, and virtualized IT environment to tackle the challenges faced by healthcare providers.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Dell

Report Helps Healthcare IT Execs Navigate the Cloud
sponsored by Insight
WHITE PAPER: This white paper summarizes a recent report from the Institute for Health Technology Transformation that addressed the state of cloud computing within the healthcare industry.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Insight

Healthcare in Motion: Giving Docs and Nurses Mobility
sponsored by Insight
WHITE PAPER: Explore this paper to learn about "Geisinger in Motion," an initiative to give iPhones and iPads to physicians and nurses for secure, mobile access to patient records anytime and anywhere. Discover the challenges Geisinger Health System confronted, as well as the benefits they have provided.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Insight

Healthcare Solutions Brief: Healthy Data's at the Heart of Modern Healthcare
sponsored by Nexenta
WHITE PAPER: This whitepaper explains how Nexenta is helping healthcare organizations eliminate data management bottlenecks and deliver cost-effective solutions that are highly scalable for a broad range of end-user needs.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Nexenta

Transforming healthcare IT with user virtualization
sponsored by AppSense
WHITE PAPER: Access this resource to learn about key benefits user virtualization provides for healthcare IT and how it moves toward a more secure, well managed, and dynamic infrastructure.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

AppSense

Healthsense: A publication for healthcare IT professionals
sponsored by AppSense
NEWSLETTER: Find out how desktop and application virtualization is transforming the healthcare industry to enhance employee productivity, securely share health information, and reduce costs in a multiplatform end-user computing environment.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

AppSense

Overcome Healthcare Data Protection Challenges, Meet HIPAA Requirements
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this exclusive resource, learn about software that will help your organization achieve a HIPAA-compliant security system that includes administrative procedures, physical safeguards, and technical measures to protect patient information while stored, and while transmitted across communications networks.
Posted: 14 Nov 2014 | Published: 22 Apr 2014

Hewlett-Packard Limited

Continuous Monitoring and Reporting: The New "Reasonable and Appropriate" for Healthcare Compliance
sponsored by Tenable Network Security
WHITE PAPER: Access this white paper to find out how healthcare organizations can leverage a solution that automates and simplifies compliance with the HIPAA Security Rule.
Posted: 29 Oct 2014 | Published: 31 Dec 2013

Tenable Network Security

Forrester Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk
sponsored by Absolute Software
WHITE PAPER: The following white paper discusses the current state of endpoint data loss in healthcare organizations using the current breach data to highlight the need for a data-centric approach to endpoint security on all employee devices. In addition, this paper intends to illustrate an approach that can lead to fewer compliance violations and reduced risk.
Posted: 21 Oct 2014 | Published: 04 Sep 2014

Absolute Software

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014


RES Software Helps the Chester Country Hospital Streamline Patient Care
sponsored by RES Software
CASE STUDY: View this informative case study to discover what virtual desktop system Chester County Hospital deployed to provide easy, predictable, and secure access to applications, printers and personal files from any device. Learn how they were able to take the time previously spent on technology issues and focus on the care of their patients.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

RES Software

Bay Cove Human Services Achieves HIPAA Compliance on Google Apps & BYOD
sponsored by BitGlass
WHITE PAPER: This short white paper details how Bay Cove Human Services collaborated with BitGlass to achieve HIPAA compliance while still enabling the company to utilize Google Apps as their productivity backbone.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Survive & Thrive: In the Sea of Healthcare IT Change
sponsored by Peak 10
RESOURCE: The healthcare industry in this U.S. is currently undergoing some serious changes in terms of patient record management and care. What do you need to do to keep up with leading organizations? Find out in this infographic, where you'll explore five key aspects of modernizing healthcare IT.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Peak 10

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software

AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
WHITE PAPER: This white paper describes how BitGlass partnered with AMAG Pharmaceuticals to resolve critical security and privacy issues following the company's adoption of Google Apps' cloud and BYOD tools.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute Software
RESOURCE: In this report conducted by Gartner, discover the major findings drawn from the debate between keeping patient information accessible or disclosed.
Posted: 01 Oct 2014 | Published: 27 Sep 2013

Absolute Software

Resolving the Catch-22 of UC&C in Regulated Environments
sponsored by Dimension Data
WHITE PAPER: This white paper explains why organizations in regulated sectors like finance, government, and healthcare have a different set of requirements for cloud-based unified communications and collaboration services, and introduces a suite of email and collaboration tools that meets these needs.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dimension Data

IHE and Intel®: Delivering a Foundation for Interoperable Health Information Exchange
sponsored by Intel® Services
WHITE PAPER: View this white paper to learn more about how you can solve your technological problems. With the IHE framework, you can create a process and model to help you address the challenges of efficient care coordination, disconnected data silos and non-scalable integration strategies.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Intel® Services

Rhode Island Blood Center Protects Donor Information and Locates Laptops using Absolute Computrace
sponsored by Absolute Software
CASE STUDY: In this case study, find out how the Rhode Island Blood Center used a simple, cost-effective solution to track hardware assets and ensure laptops remained protected.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Absolute Software

5 Ways That  Data Analytics Help Healthcare Systems
sponsored by ExtraHop
WHITE PAPER: This white paper describes the benefits of the real-time healthcare system, and how one company is using wire data analytics to empower healthcare IT and provide unprecedented insight into all of an organization's wire data.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

ExtraHop

HIPAA/HITECH Compliance Using VMware vCloud Hybrid Service
sponsored by CDW Corporation
WHITE PAPER: Uncover the responsibilities for PHI in the cloud, as well as an introduction to the VMware Business Associate Agreement.
Posted: 15 Sep 2014 | Published: 31 Dec 2013

CDW Corporation

Citrix ShareFile Cloud for Healthcare: 10 Days to Facilitate HIPAA Compliance
sponsored by CloudPassage
WHITE PAPER: Check out this white paper to find out how one particular company utilized a virtual private cloud to support HIPAA compliance regulations.
Posted: 09 Sep 2014 | Published: 31 Mar 2014

CloudPassage

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight
1 - 25 of 228 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement