- Capitalizing On Big Data: Managed Services Help Financial Firms Accelerate Big Data Projects
- Advanced Cyber Attacks - Is Your Org Ready?
- Stop Attackers from Getting What They Want with Context-Based Authentication
- Malware Detection with Network Monitoring: Not Quite Enough
- Are Insurers Ready For The Nextgen Digital Consumer Experience?
August 2011- In France, the contrat de bon usage du medicament (CBUM) promotes the computerization of medical practices. Committed to the CBUM and continuously delivering on its longstanding policy of improving the quality and safety of patient care, CESH set a goal of completely eliminating its paper-based processes by the end of 2010. In 2005 the clinic implemented Ware Systeme's Sharegate medical records software but required a comprehensive mobility solution to optimize all of Sharegate's functions in real time, ...
August 2011- This case study highlights how Nurtingen Hospital secured its EMR data, realized a 40% productivity increase on routine processes, and reduced errors by leveraging tablet PCs to access key hospital information systems. This initiative has also helped to improve interaction, communication, and delivery of care to patients.
January 2012- Read this solution brief outlines the benefits of protecting your clinical IT infrastructure with AlwaysOn Point of Care. This validated solution architecture combines products and services from VMware, VCE and other providers to meet stringent requirements for availability, security, elastic scaling, rapid and automated provisioning, high capacity, and low latency with no single point of failure.
The move from paper-based medical records systems to electronic medical records (EMR) technology is meant to patient outcomes, increasing clinician productivity, and lowering costs. However, access to patient information must not only be secure, but also fast, convenient and reliable. Technologies that provide security but frustrate clinicians will slow EMR adoption to a crawl.
In this white paper, you'll learn how you can solve this "last mile" problem and maximize user adoption by ...
February 2012- If you're an IT exec at a healthcare organization responsible for maintaining systems and end users, smoothing out electronic medical records implementations, and modernizing your mobility and desktop solutions, take a dose of this Windows 7 desktop migration strategy. You'll have happy healthcare systems and improve patient care!
This Informatica sponsored study, conducted by the Ponemon Institute, surveyed 437 senior IT professionals in the financial services industry whose organizations have been engaged in application testing and development in order to better understand if the risk of using real data in development is being addressed.
An overlooked privacy risk for financial services organizations is the vulnerability of personal and business information used for testing and application development. During the test and development phase ...
October 2010- In an industry flooded with digitized information and disjointed acronyms — HITECH, HIPAA, PHI, to name but a few — the critical need for visual privacy can easily be swept away. Learn how to keep patient information safe and your organization healthy.
September 2010- Firewalls are designed to provide access control. Although there is risk associated with any access, by limiting what access is permitted the risk is limited and understood and can be evaluated against business need to effectively justify the risk. However, poor firewall management defeats this purpose by ineffectively controlling access and limiting visibility into what access is actually permitted; poor management also increases the cost associated with security management. The result of poor management is ...
August 2010- Learn how to develop a multi-phased information security and risk management (ISRM) strategy from John P. Pironti, CISA,CISM, CGEIT, CISSP, ISSAP, ISSMP, president of IP Architects LLC and security conference track chair at Interop. an ISRM provides a road map for information and information infrastructure protection with goals and objectives that ensure capabilities provided are aligned to business goals and the organization’s risk profile. Traditionally, ISRM has been treated as an IT function ...
August 2010- Today's evolving threat landscape has made IT security a top priority for healthcare organizations. Top medical centers targeted by virus and advanced threats need a proactive approach to endpoint security. The HITECH Act further prioritizes privacy and security - with significant potential monetary benefit. Find out how healthcare IT professionals are securing patient data and their enterprise.
June 2010- This is a new approach to tokenize data that eliminates challenges associated with standard centralized tokenization. Particularly in high-volume operations, the usual way of generating tokens is prone to issues that impact the availability and performance of the data. From a security standpoint, it is critical to address the issue of collisions caused when tokenization solutions assign the same token to two separate pieces of data. This next-generation tokenization solution addresses all of these issues. ...
July 2010- Through process automation and security control enforcement, Lumension eases the healthcare IT security compliance burden by delivering on the six elements of compliance economy: agility, consistency, efficiency, transparency, accountability, and security.
July 2010- As the electronic medical records revolution takes hold of the healthcare industry, the benefits and drawbacks of digitized health documentation are being revealed.
March 2010- Organizations of all sizes and industries maintain extensive financial, customer and mission-critical business data. When sensitive information is misused or compromised, organizations often pay a heavy price. Recent high-profile security breaches have cost organizations millions in revenue and lost opportunities. These fears, along with new security standards and regulations, have driven IT professionals to deploy encryption more broadly. In this model, the encryption keys used to secure data become the figurative “keys to the kingdom.” ...
March 2010- Health Information Exchange (HIE) is the mobilization of healthcare information electronically across organizations within a region or community. Understand the challenges and regulatory requirements healthcare delivery networks face and get security best practices to achieve high-quality, safe, and efficient healthcare services while maintaining the privacy, security, and confidentiality of personal health information.
March 2010- While electronic health records (EHR) will ultimately lead to more efficient patient care, they also increase the criminal appeal of attack and an institution’s vulnerability to large-scale ePHI breach. Learn how Trend Micro Enterprise Security provides cost-effective solutions that ensure compliance, maximize protection, and enable strategic business and IT initiatives.
December 2005- Healthcare organizations are in the midst of a complete turnaround in regard to information security and privacy. Times have changed. Through the onslaught of regulations and privacy liability, healthcare organizations are changing course. Learn how Intrusion Prevention Systems (IPS) can address the challenges of today’s healthcare organizations.
December 2005- The degraded service and lost business from a Denial of Service (DoS) attack can lead to staggering costs both during and after an attack. Beyond the immediate costs, the lasting effects of a successful DoS attack include lost customers, loss of faith in the service’s dependability, and damage to the corporate brand. This white paper focuses on how Intrusion Prevention Systems (IPS) can address these challenges.
January 2009- There is some confusion in the marketplace about intrusion-security systems. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have similar names. Download this white paper provided by TippingPoint to learn the difference between the two solutions and the eight questions to ask about Intrusion Prevention Systems (IPS).
October 2009- Firewall rules that provide access to a wide array of services in a large network, while at the same time securing the critical assets from attacks, tend to become very large in size and redundant in functionality. As rule bases become large, administrators become hesitant to modify existing rules and instead add new rules for fear of causing an adverse impact on existing service availability. Over time, rule bases become very bloated, requiring not only ...
The Health Information Technology for Economic and Clinical Health Act (HITECH) imposed more stringent regulatory and security requirements to the privacy rules of HIPAA. Compliance with the letter of the guideline can be difficult for organizations without strong access governance processes and policies.
Healthcare organizations often struggle to maintain a consistent approach to govern user access across information resource, and as a result, may have an incomplete or fragmented posture of compliance throughout ...
August 2009- Few managers realize the security and management risks that have blossomed in their organizations with the prevalent use of FTP. This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability, while decreasing security exposures and adhering to growing compliance/auditing requirements.
August 2009- Few managers realize the security and management risks that have blossomed in their organization with the prevalent use of FTP. This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
June 2009- This paper covers what PDF security vendors are not telling you about their products and solutions, and what questions you should be asking. Is the PDF security software you are looking to purchase really secure? If the PDF DRM protection software you are evaluating can be simply broken then you might as well save your money.
July 2009- As more and more companies migrate portions of their information technology portfolio into Enterprise Resource Planning (ERP) software application suites such as SAP, the question of how best to implement automated controls over the information and processes embodied by the ERP module(s) requires careful consideration. This paper explores several critical factors that must be evaluated in order to construct a control framework that will satisfy current and future company, audit, governance, compliance, and regulatory ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services