security

Results 1 - 25 of 6159Sort Results By: Published Date | Title | Company Name
By: Imprivata     Published Date: Jul 02, 2010
With the proliferation of electronic patient information, hospital administrators, compliance officers,privacy officers and information security officers are required to enforce patient privacy. Motivated by patient-citizen damages from increased healthcare privacy breaches, law-makers across the United States, Canada, and Europe have enacted new regulation protecting patient privacy and penalizing those involved. Snooping, identity theft and general inappropriate access of medical records are now explicitly prohibited. Additionally, a patient's right to know who has accessed their records has been expanded,requiring hospitals and their business associates to account and disclose for personal health information breaches. Beyond putting patients at risk, personal health information breaches are increasingly putting healthcare organizations at a significant risk of financial, and reputational harm.
Tags : 
privacy monitoring, it
    
Imprivata
By: Imprivata     Published Date: Jul 13, 2010
The move away from paper-based medical records systems to electronic medical records (EMR) is rightly viewed as a step towards improving patient outcomes, increasing clinician productivity, and lowering costs. The transition, however, is often hampered by the challenge of providing secure access to patient information, particularly given the increased focus on regulatory compliance. From an IT perspective, the mandate is clear: access to patient information must be not only secure but also fast, convenient, and reliable. Technologies that provide security but frustrate clinicians-by slowing them down or adding steps to their everyday tasks-will slow adoption of EMR to a crawl.
Tags : 
emr, patient outcomes, it
    
Imprivata
By: Imprivata     Published Date: Jul 13, 2010
Whether prompted by the compliance requirements of HIPAA or GLBA, the growing need to strengthen IT security, or mounting user frustration due to forgotten passwords, more and more organizations are thinking seriously about implementing Enterprise Single Sign-On (ESSO). According to Giga Research analyst Steve Hunt, "Enterprise SSO works well and makes sense. It is a secure, cost effective tool for adding value to an organization. It would be wise for vendors to implement it today."
Tags : 
enterprise single sign on, it
    
Imprivata
By: Capita     Published Date: Oct 22, 2010
With increased pressure on all healthcare organisations to improve efficiency and reduce administration costs, there has never been a better time to introduce a proven income and payment management solution. A solution that will enhance your income collection and cash flow at the same time as delivering a better patient experience. Over 180 public sector organisations across the UK are already seeing the benefit. Securing payments on time is a constant challenge, but one which we can help you meet by giving your customers a choice of convenient and easy-to-use payment options. Our suite of payment management products supports credit and debit card payments via the internet, automated telephone, or SMS text - 24 hrs a day. Card authorisation is covered by a fully-managed service, certified to the Payment Card Industry Data Security Standard (PCI DSS) which means you don't need any specialist on-site software or infrastructure. A payment management solution from Capita Software Services helps you to extend customer choice, delivers efficiency gains and includes the latest fraud protection measures when taking payments by credit or debit card.
Tags : 
payment management
    
Capita
By: Proofpoint Limited     Published Date: Apr 27, 2011
More than ever before, enterprises are under pressure to protect private data. Part of the pressure comes from the chilling examples of companies who failed to protect private data and then paid a high price in regulatory fines, disaffected customers, lost business, and damaged brands. Part of the pressure comes from knowing just how frequently data breaches occur. In a recent survey of email decision makers at large U.S. companies, 34% reported that their business had been affected by the leak of sensitive or embarrassing information in the past year, 33% had been affected by the improper exposure or theft of customer information, and 28% had been affected by the improper exposure or theft of intellectual property. Thefts are common. Leaks are common. Enterprises, even cautious ones, are plainly at risk. Proofpoint Encryption can help keep private data in email secure.
Tags : 
encryption, security, private data, primary care, acute care, mental health, workforce/hr, policy, finance, it, legal, commissioning, pharmaceuticals
    
Proofpoint Limited
By: Capita     Published Date: Oct 22, 2010
With increased pressure on all healthcare organisations to improve efficiency and reduce administration costs, there has never been a better time to introduce a proven income and payment management solution. A solution that will enhance your income collection and cash flow at the same time as delivering a better patient experience. Over 180 public sector organisations across the UK are already seeing the benefit. Securing payments on time is a constant challenge, but one which we can help you meet by giving your customers a choice of convenient and easy-to-use payment options. Our suite of payment management products supports credit and debit card payments via the internet, automated telephone, or SMS text - 24 hrs a day. Card authorisation is covered by a fully-managed service, certified to the Payment Card Industry Data Security Standard (PCI DSS) which means you don't need any specialist on-site software or infrastructure. A payment management solution from Capita Software Services helps you to extend customer choice, delivers efficiency gains and includes the latest fraud protection measures when taking payments by credit or debit card.
Tags : 
payment management, it
    
Capita
By: Spectrum Enterprise     Published Date: Feb 07, 2018
Unlock the benefits of Ethernet – An Expert Q&A Guide provided by Spectrum Enterprise. Find out how technology experts are using reliable Ethernet solutions to boost business performance. Get actionable insights from experts and learn how switching to a high-performance Ethernet solution from Spectrum Enterprise can deliver security and reliability across your network and IT infrastructure.
Tags : 
    
Spectrum Enterprise
By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC as a Service (PCaaS) will transform your company’s approach to IT infrastructure. The cost of PC lifecycle management can be reduced by up to 25% by using PCaaS. Learn more about Dell solutions powered by Intel®.
Tags : 
productivity, migration, security, support, hardware, software, devices, dell
    
Dell PC Lifecycle
By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA Tier 3 ABM
By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
The Cisco® Incident Response team is led by elite security specialists who can uncover the source of threats by analyzing and synthesizing intelligence from multiple sources. These sought-after specialists consistently deliver resolution in a shorter timeframe, returning businesses like yours to normal. Fast.
Tags : 
security, research, analyze, investments, cisco
    
Cisco EMEA Tier 3 ABM
By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
By: Workday Nordics     Published Date: Mar 06, 2018
This White paper looks at how system complexity is increasing, though enterprises deploy more applications to more endpoints than ever before. Hackers have evolved from isolated sociopaths into highly organised groups relying on leading-edge technology. Finally, IT budgets are growing, albeit slowly: International Data Corp. (IDC) expects budgets to increase 3.4% in 2017. So many CIOs are struggling to find the resources needed to ward off attacks. Cloud computing helps IT executives meet these conflicting objectives. These solutions are designed on a modern architecture, one much more fluid than premises-based systems. In addition, cloud is better able to handle threats than legacy systems. To be successful, CIOs need to overcome their traditional security (on premises is best) mindset, and hand management of their most important applications over to a cloud provider.
Tags : 
    
Workday Nordics
By: Workday Nordics     Published Date: Apr 09, 2018
As May 25th, 2018 approaches, many of the organisations that I speak to are choosing to modernise their HR systems to help with their compliance efforts. In particular, where organisations have a complicated mix of different HR systems and spreadsheets, with employee data spread across different databases managed by multiple security models, GDPR compliance will be more difficult. Contrast such a complicated mix of HR systems with Workday’s unified, single system approach to HR, with a single source of HR data and a single security model, and you can see why organisations are choosing to move to Workday as they work to both modernise their HR systems and move towards GDPR compliance. We hope you find this research an i
Tags : 
    
Workday Nordics
By: Dell EMC & Intel     Published Date: Apr 13, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
    
Dell EMC & Intel
By: Group M_IBM Q1'18     Published Date: Jan 04, 2018
For data-driven businesses, cloud can be a boon. Data can be found, processed and managed on the cloud without an investment in local hardware infrastructure, but what does that mean to information trust and governance? When data comes from cloud-based sources, IT needs a plan for data integration and security. Download this insightful white paper and learn the four key priorities you must consider when developing your IT strategy to promote good hybrid information governance. Learn the blend of process, organizational and technical enablers that will allow you to move to a hybrid environment with speed and confidence.
Tags : 
data-driven business, cloud, information trust, information governance, data integration, data security, it strategy
    
Group M_IBM Q1'18
By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC
By: ForgeRock     Published Date: Mar 22, 2018
What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.
Tags : 
forgerock, consumer privacy, data security, iot, internet of things, internet security, consumer behavior, tracking data
    
ForgeRock
By: Hitachi Vantara     Published Date: Mar 21, 2018
Challenge: Ensure that technology infrastructure will support business transformation, new growth and services. Solution: Implement highly automated converged infrastructure and managed cloud services from Hitachi Vantara. Outcomes: Use new capabilities to integrate acquired companies, deploy next-generation security and speed time to the market.
Tags : 
    
Hitachi Vantara
By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf
By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
By: Lookout     Published Date: Apr 18, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
By: Redstor UK     Published Date: Mar 12, 2018
Backup and recovery have been a constant for organisations over the years, often not seen as glamorous aspects of an IT environment but as solutions that are necessary all the same. Environments have changed over the years and the focal use for backups have changed with them, although your solutions may not have. Taking a simple off-site backup, whether this be to disk, tape or other removable media, would once have been the last line of defence for data protection. Solutions were reliable and ensured data could be recovered in a timely manner.
Tags : 
recovery, backup, infrastructure, security, data
    
Redstor UK
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.