Health Care Security

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Security Reports
26 - 50 of 249 Matches Previous Page  |  Next Page
Healthcare Organizations: Security and Compliance Beyond HIPAA and PCI DSS
sponsored by HP Security Voltage
CASE STUDY: This case study shows how one organization overcame data protection challenges. View now to learn how the strategy they chose enabled the enterprise to simplify encryption management and if it is right for your organization.
Posted: 01 Apr 2015 | Published: 28 Apr 2014

HP Security Voltage

The CIO's BYOD Toolbox: Top Trends for HIPAA Compliant mHealth
sponsored by RingCentral
WHITE PAPER: Access this white paper now to learn how you can implement an efficient BYOD strategy that avoids the top 4 security risks and complies with HIPAA.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

RingCentral

Best Practices for Mobile Healthcare Security
sponsored by RES Software
EGUIDE: Mobile healthcare security depends on astrong top-down approach that informsemployees of all possible threats -- includingphysical theft and remote devicehacks. Read on to find out why.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

RES Software

Hospital La Fe Uses Vworkspace to Improve Security and It Maintenance
sponsored by Dell, Inc.
VIDEO: Access this brief video to see one healthcare organization's journey through administering their virtual desktops with a software solution that deploys and manages desktop virtualization and VDI technologies. Find out how they were able to simplify and automate the management of their VDI while increasing security and easing mobility.
Posted: 20 Mar 2015 | Premiered: 09 Feb 2015

Dell, Inc.

Workspace Modernization for Healthcare Delivering Flexibility, Performance and Stability
sponsored by RES Software
WHITE PAPER: This white paper highlights a technology that improves the virtual clinical workspace to better meet the needs of healthcare users and IT professionals. Find out how this technology is tackling the issues associated with performance, reliability and stability, and updates and learn how this is helping them to deliver high-quality patient care.
Posted: 18 Mar 2015 | Published: 09 Jan 2015

RES Software

Addressing unique security concerns within the Healthcare Industry
sponsored by Alert Logic
WHITE PAPER: Download this resource to discover how hackers are attacking the healthcare industry and what you can do to combat them.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Alert Logic

Meet Health Industry Regulations and Secure Sensitive Health Files
sponsored by Ipswitch File Transfer
CASE STUDY: Access this case study to learn how one health insurance provider was able to securely manage, view and control all of their file transfer activity with an automated system.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Turning the Daily Patient Routine into a Piece of Cake
sponsored by Compressus
PRODUCT OVERVIEW: Many physicians today struggle with the basic daily routine of doing patient rounds in an efficient manner that works for them as an individual. This solution overview explores a health care workflow tool that can help.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Compressus

Using Technology to Address the High Velocity of Change in Healthcare
sponsored by Compressus
WEBCAST: High velocity change within healthcare brought on by consolidation, need to contain costs, demand for high quality care, and the desire for more personalized care has driven healthcare executives to embrace innovative technology solutions. Find out what they are and how to use them in the following webcast.
Posted: 23 Feb 2015 | Premiered: Feb 23, 2015

Compressus

Digitizing Patient Records on the Medical Information Highway
sponsored by Compressus
WHITE PAPER: Digitizing of patient information with electronic medical records is an important first step in achieving quality medical care and Meaningful Use. This white paper explores an interoperability system that intends to help health care practices reach these goals.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Compressus

Technology Advances for Practicing Radiologists
sponsored by Compressus
CASE STUDY: This case study is the first installment in a series of Compressus interviews with prominent figures in Radiology and other specialties, focusing on the impact of today's and tomorrow's technologies on patient care and the practice of medicine in those specialties.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Compressus

Meeting the Challenges of Healthcare Virtualization
sponsored by Compressus
WHITE PAPER: This white paper explores the MEDxConnect4 system in terms of its efficacy to improve the speed, flexibility, and interoperability of the health care environment.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Compressus

MEDxConnect from Compressus: Reducing the Cost of Legacy Systems
sponsored by Compressus
PRODUCT OVERVIEW: How can health care IT managers ensure the health of their systems like PACS, Labs, RIS, HIS, Billing, and others while driving down costs of legacy use? Check out the following white paper to learn about an enterprise-wide interoperability system that can help.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Compressus

MEDxConnect from Compressus: Orchestrating Interoperability
sponsored by Compressus
PRODUCT OVERVIEW: This product review examines the MEDXCONNECT system, an enterprise-wide healthcare interoperability platform that supports the goals of delivering better patient care, business growth, and competitive achievement.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Compressus

7 Steps to Securing Healthcare Infrastructures Using a Cloud Security Plan
sponsored by NaviSite
WHITE PAPER: This resource outlines the 7 steps you need to follow in order to secure infrastructures using a cloud security plan. By adhering to the following seven-step plan, you can bank on a proven methodology for cost-effectively and securely leveraging cloud services.
Posted: 19 Feb 2015 | Published: 18 Feb 2015

NaviSite

Discover How to Guard Against Healthcare Cybercrime
sponsored by NaviSite
WHITE PAPER: Healthcare data is as valuable as gold on the black market, and thieves are drawn to the profits. Now, with more data stored digitally and more hackers taking advantage of that, the healthcare industry needs better security than ever.
Posted: 19 Feb 2015 | Published: 01 Jan 2015

NaviSite

New Threats to Healthcare and How to Stop them
sponsored by NaviSite
WEBCAST: This webcast provides you with a detailed analysis of healthcare's security threats and suggestions for combatting them.
Posted: 19 Feb 2015 | Premiered: Feb 19, 2015

NaviSite

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

The 2014 Bitglass Healthcare Breach Report
sponsored by BitGlass
WHITE PAPER: This informative report takes a close look at reported healthcare data breaches over the past 3 years and discusses what they mean for consumers, healthcare organizations, and the future of digital healthcare records.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

Can You Securely & Affordably Scale Your Healthcare Applications?
sponsored by Array Networks
CASE STUDY: In this case study, learn how application delivery controllers can provide scalability, availability, performance, and security for patient data and medical records.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Array Networks

Pulse E-zine: Vol. 3, No. 1
sponsored by SearchHealthIT.com
EZINE: Ready or not, HIPAA audits are about to strike. The first formal round will hit approximately 400 healthcare providers in 2015. In this issue of Pulse, prepare to survive your first audit, discover where security risks stem from, learn why migration planning is critical for EHR data migrations, and more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

SearchHealthIT.com

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to HIPAA guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Busting Myths About Mobility: Why the Dream of Mobility shouldn’t be a Security Nightmare for Highly Regulated Businesses
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at mobile security and why your business shouldn't have security nightmares. Read on to crack the common myths about mobility, and more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Dell, Inc. and Intel®
26 - 50 of 249 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement