access

Results 1 - 25 of 2583Sort Results By: Published Date | Title | Company Name
By: Imprivata     Published Date: Sep 13, 2010
East Kent Hospitals University NHS Foundation Trust is one of the largest hospital trusts in England, with five hospitals and several outpatient facilities across East Kent and Medway. The Trust provides a wide range of services within both hospital and community settings and employs more than 7,500 staff who require access to a variety of healthcare applications and support systems.
Tags : 
clinical access, it
    
Imprivata
By: IBM United Kingdom Limited     Published Date: Jul 13, 2011
MedeAnalytics employs IBM® SPSS® Modeler to help prioritize providers' collection efforts Hospitals across the nation are facing a tough dilemma: a growing number of the patients they treat lack health insurance or are underinsured - but turning these patients away isn't an option. The result: more and more patients are being classified as "self-pay" and hospitals increasingly have to contend with collections headaches and budget shortfalls. "The rising uninsured and under-insured are among the top issues plaguing healthcare," researchers at Deloitte LLP noted in a recent study. "Not only does this issue impact access to care and hospitals' ability to fulfill their mission, it impacts their ability to protect margins and keep their doors open."
Tags : 
helping hospitals capture more revenue
    
IBM United Kingdom Limited
By: IBM United Kingdom Limited     Published Date: May 24, 2011
Introduction and overview eHealth offers a potent means for health services in EMEA, and worldwide, to tackle the daunting challenges of the 21st century. Ageing populations, long-term management of chronic illnesses, escalating costs1, changing patterns of disease, and a worldwide shortage of healthcare workers are all driving the need for health information and communication technology (ICT) to improve healthcare administration and delivery. For future sustainability, the healthcare system demands efficient and affordable access to finite healthcare resources, improving care for all and reducing healthcare inequalities. To achieve its potential, eHealth must facilitate the secure movement of patient data out of system silos and transform it into intelligence for improved patient administration and enablement of patient-centred, coordinated care.
Tags : 
ehealth, health services, ageing populations, escalating costs, shortage of healthcare workers, ict, primary care, acute care
    
IBM United Kingdom Limited
By: Vanguard Healthcare Solutions Ltd     Published Date: Mar 16, 2011
It is universally agreed that innovation must be the driving force behind the reconfiguration and evolution of the NHS. Innovation and innovative thinking, however, take many forms, and it is important that the pursuit of innovation does not focus solely on that which is new and high tech. In fact, it is often simple and accessible solutions - solutions which have been proven successful in practice - that provide an answer when a new challenge presents itself. Shifting delivery of services from hospitals to community settings is one of the biggest challenges that has faced the NHS in living memory, and one that will require no small measure of innovative thinking to overcome. The answer, however, will not be found in high tech IT systems, or process management, or any new medical gadgets - these are a given in such a complex sector. In its simplest form, the problem is about being able to provide a suitable clinical environment in a local setting, quickly, safely and cost-effectively. This video demonstrates the ways in which mobile healthcare facilities can be used to tackle the issues facing the modern NHS, and deliver the accessible and affordable innovation that NHS organisations need in this era of cost-saving and efficiency.
Tags : 
mobile surgical units, nhs, high tech, primary care, acute care, mental health, workforce/hr, policy
    
Vanguard Healthcare Solutions Ltd
By: Imprivata     Published Date: Jul 02, 2010
With the proliferation of electronic patient information, hospital administrators, compliance officers,privacy officers and information security officers are required to enforce patient privacy. Motivated by patient-citizen damages from increased healthcare privacy breaches, law-makers across the United States, Canada, and Europe have enacted new regulation protecting patient privacy and penalizing those involved. Snooping, identity theft and general inappropriate access of medical records are now explicitly prohibited. Additionally, a patient's right to know who has accessed their records has been expanded,requiring hospitals and their business associates to account and disclose for personal health information breaches. Beyond putting patients at risk, personal health information breaches are increasingly putting healthcare organizations at a significant risk of financial, and reputational harm.
Tags : 
privacy monitoring, it
    
Imprivata
By: Imprivata     Published Date: Jul 13, 2010
The move away from paper-based medical records systems to electronic medical records (EMR) is rightly viewed as a step towards improving patient outcomes, increasing clinician productivity, and lowering costs. The transition, however, is often hampered by the challenge of providing secure access to patient information, particularly given the increased focus on regulatory compliance. From an IT perspective, the mandate is clear: access to patient information must be not only secure but also fast, convenient, and reliable. Technologies that provide security but frustrate clinicians-by slowing them down or adding steps to their everyday tasks-will slow adoption of EMR to a crawl.
Tags : 
emr, patient outcomes, it
    
Imprivata
By: Dell     Published Date: Mar 27, 2014
Locala wanted to improve healthcare by integrating technology more deeply into the provision of services. A key goal was boosting caregiver access to real-time patient data while in the field. The healthcare provider chose a private cloud solution with single-service desk from Dell. Clinicians also gained Dell Latitude laptops to connect to their cloud-based systems and for web conferencing.
Tags : 
    
Dell
By: RMS     Published Date: Jul 25, 2019
The insurance industry boasts some of the most sophisticated modeling capabilities in the world. And yet the average property underwriter does not have access to the kind of predictive tools that carriers use at a portfolio level to manage risk aggregation, streamline reinsurance buying and optimize capitalization.
Tags : 
    
RMS
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed breach world.
Tags : 
    
F5 Networks Singapore Pte Ltd
By: BeyondTrust     Published Date: Jul 29, 2019
What It is & Why Now Is The Time To Implement It
Tags : 
    
BeyondTrust
By: BeyondTrust     Published Date: Jul 29, 2019
Greater visibility and improved integration are vital to tackling the modern threat landscape
Tags : 
    
BeyondTrust
By: Pure Storage     Published Date: Sep 13, 2019
Discover how to revolutionize processing performance, data intelligence, customer experiences, and GRC. The future of financial services will belong to those who can capture and capitalize on data. And it all begins with employing modern data strategies in four critical areas. Description You’ll learn how to: Leverage AI, machine learning and predictive analytics. Get scalable, high-speed access to vast amounts of data. Respond faster, become more competitive, and attract new customers.
Tags : 
    
Pure Storage
By: Gigamon     Published Date: Sep 03, 2019
Dataflow is increasing at a rate unseen in history. Network managers are tasked with enabling massive quantities of new data in a secure and highly available fashion, all while facilitating access to new types of form factors and data stores. This challenge is often met with layers of networking hardware and tools resulting in a complex mess, or even worse, a culture of network protectionism that inhibits business innovation.
Tags : 
    
Gigamon
By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
By: KPMG     Published Date: Jun 10, 2019
Today’s customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: • how to create customer-centric operations to deliver the customer experience • the eight essential components of a connected, customer-centric enterprise • why alignment between the COO and CIO is essential • five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Impact: -Substantially reduced administrative time -Accelerated response and remediation process -Increased performance of cloud applications -Reduced time to investigate"
Tags : 
    
Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isn’t efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
    
Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
    
Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Grab a cup of coffee and tune in to hear Alan Meirzon, Director – Chief Information Security Office at Deutsche Bank share his experience using Cisco Umbrella. Alan discusses how his team uses Umbrella as the first line of defense against threats on the internet. He shares best practices and the outcomes his team has seen using DNS-layer security to protect users wherever they access the internet. View this video to hear security best practices and lessons learned from Alan, a security veteran.
Tags : 
    
Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
"Cloud applications provide scale and cost benefits over legacy on-premises solutions. With more users going direct-to-internet from any device, the risk increases when users bypass security controls. We can help you reduce this risk across all of your cloud and on-premises applications with a zero-trust strategy that validates devices and domains, not just user credentials. See why thousands of customers rely on Duo and Cisco Umbrella to reduce the risks of data breaches and improve security. Don’t miss this best-practices discussion focused on the key role DNS and access control play in your zero-trust security strategy. Attendees will learn how to: ? Reduce the risk of phishing attacks and compromised credentials ? Improve speed-to-security across all your cloud applications ? Extend security on and off-network without sacrificing usability"
Tags : 
    
Cisco Umbrella EMEA
By: TIBCO Software     Published Date: Jul 22, 2019
The biggest headache for most payment operations teams is cost control — and a large part of it comes from fraud management: Investigation teams waste large amounts of time just assembling the data needed to make decisions. Detection engines are always playing catchup with the latest fraud patterns. Ever changing regulations increase the time and cost required to reach compliance and meet audit standards. Given their scope and impact, replacing core fraud systems is not an option for most firms. But instead of replacing them, you can improve the investigative process with augmented investigation, and improve the detection process by enhancing current systems. This whitepaper describes three ways financial services firms can use TIBCO solutions to lower the cost of investigations through faster results, reduce fraud losses through better detection, and simplify audit and regulatory compliance through centralized access to information.
Tags : 
    
TIBCO Software
By: Group M_IBM Q3'19     Published Date: Jul 01, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q3'19
By: Group M_IBM Q3'19     Published Date: Sep 04, 2019
This white paper considers the pressures that enterprises face as the volume, variety, and velocity of relevant data mount and the time to insight seems unacceptably long. Most IT environments seeking to leverage statistical data in a useful way for analysis that can power decision making must glean that data from many sources, put it together in a relational database that requires special configuration and tuning, and only then make it available for data scientists to build models that are useful for business analysts. The complexity of all this is further compounded by the need to collect and analyze data that may reside in a classic datacenter on the premises as well as in private and public cloud systems. This need demands that the configuration support a hybrid cloud environment. After describing these issues, we consider the usefulness of a purpose-built database system that can accelerate access to and management of relevant data and is designed to deliver high performance for t
Tags : 
    
Group M_IBM Q3'19
By: Infinidat EMEA     Published Date: May 15, 2019
Fondato nel 1998, IFOM, Istituto FIRC di Oncologia Molecolare è un centro di ricerca dedicato allo studio della formazione e dello sviluppo di tumori a livello molecolare. Nello specifico, il laboratorio di Francesco Ferrari si concentra sull’identificazione e sullo studio di elementi regolatori non codificanti nel genoma e sul modo in cui vengono coinvolti nella regolazione dei processi biologici fisiologici e patologici. Il gruppo utilizza i dati della genomica funzionale (trascrizione, indicatori epigenetici, organizzazione tridimensionale) e altre informazioni genomiche (come il re-sequencing dei pazienti) con metodi di massive sequencing.
Tags : 
    
Infinidat EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.