phi

Results 1 - 25 of 1914Sort Results By: Published Date | Title | Company Name
Published By: Imprivata     Published Date: Mar 06, 2015
This whitepaper details ten ways Imprivata Cortext helps organizations meet all of the standards laid out for electronic communication of PHI.
Tags : 
    
Imprivata
Published By: Citrix     Published Date: Jun 25, 2015
Data security in the healthcare industry is vital. Healthcare practices must ensure the privacy and security of protected health information (PHI) and electronic protected health information (ePHI) as defined by the Health Insurance Portability and Accountability Act (HIPAA), and they may face punitive consequences if they don’t. Read this whitepaper to learn how to securely exchange sensitive data, while staying compliant.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 25, 2015
When you need to exchange medical records with referring practices, patients or insurance providers or allow a doctor to have secure mobile access to patient files, you need a trusted solution. ShareFile is affordable, easy to use and secure — customers that handle PHI can sign a BAA with ShareFile and have all data placed in a community cloud dedicated only to our healthcare customers called the ShareFile Cloud for Healthcare. Read this eBook to learn more!
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 25, 2015
The 21st century is facing an uphill battle for better data security, and the healthcare industry is at the front lines. Healthcare providers deal with tremendous amounts of sensitive, legally protected data labeled protected health information (PHI), which requires certain security measures as defined by the Health Insurance Portability and Accountability Act (HIPAA). Mid-sized healthcare practices, face the difficult task of ensuring that all PHI is handled, transferred and stored properly. Read this whitepaper to learn how.
Tags : 
    
Citrix
Published By: Privacy Analytics     Published Date: Jun 18, 2015
De-Identification 101, your first steps into understanding the need and use of de-identified data for secondary purposes. Learn how to unlock PHI safely and securely.
Tags : 
    
Privacy Analytics
Published By: Ascom     Published Date: May 17, 2012
Unite is Ascom's vital communication platform that links systems with sophisticated, Mission-Critical working processes.
Tags : 
    
Ascom
Published By: Dell EMC     Published Date: May 08, 2019
Greater performance, agility and security are the new imperatives of the modern data center, and according to the Edison Group, Dell EMC PowerEdge servers outperform HPE servers. PowerEdge servers?with Intel® Xeon® Scalable processors? have customer-centrice innovation that is better able to meet the advance demands of IT Transformation, today and tomorrow. Download this infographic to learn the 5 reasons why.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Disaster recovery (DR) and long-term retention of data, for security as well as regulatory compliance, can be very challenging for mid-sized organizations. Keeping a secondary site up for DR can get very expensive and dealing with tape can be slow and costly. As a result, many mid-sized organizations are looking to the efficiencies of the cloud, such as scale, elasticity, agility, and lower initial storage costs, to expand their data protection environments. Check out this easy-to-absorb infographic to learn how to achieve powerful, converged, easy to deploy and manage, cloud-ready data protection.
Tags : 
    
Dell EMC
Published By: Intel     Published Date: Jul 17, 2019
Managing a large, diverse, and geographically dispersed fleet of client systems can be complex and time-consuming. With the increasing prevalence of smart, connected devices that are beginning to appear within the enterprise across industries, technology service organizations will face an explosive demand for a consistent approach to device management and security. Using Intel AMT, service organizations can take simple and effective steps to enable more manageable client systems. They can streamline operations and create a consistent approach to managing a broad spectrum of devices. Powerful platform capabilities can help service organizations meet user needs, minimize downtime, and safeguard the enterprise. Service organizations can draw upon available solution reference architectures, implementation guides, and readily available tools from Intel and others to successfully activate Intel AMT and begin to realize its major benefits.
Tags : 
    
Intel
Published By: Intel     Published Date: Jul 17, 2019
The need for identity protection has never been stronger. Identity theft accounted for 74 percent of all data breaches in the first half of 2017, and costs associated with cybercrime are expected to reach $6 trillion annually by 2021. Any time an employee's username and password are compromised, your business is vulnerable. Eight-character passwords that changed every 90 days worked well a decade ago, but increasingly commonplace attack methods like password cracking, phishing, or screen scraping call for a new kind of protection.
Tags : 
    
Intel
Published By: Workplace by Facebook     Published Date: Jun 24, 2019
When employees aren’t happy, Comms is the first to know. But how do you: Create more engagement Reach the front line Understand what people are thinking Simple: you start by getting connected. Download this infographic to find out why connected employees are essential to any great business.
Tags : 
    
Workplace by Facebook
Published By: Workplace by Facebook     Published Date: Jun 24, 2019
HR leaders know that work isn’t working for millions of employees. But how do you drive engagement? Improve onboarding processes? Or keep hold of your best people? Simple: you start by getting connected. Because when people get connected, businesses get closer, faster and stronger. Download this info graphic to find out more on how HR departments are fixing workplaces.
Tags : 
    
Workplace by Facebook
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr für einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafür, dass es einfacher wird. Bei so vielen Datenverstößen, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschärften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu überdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenüber ihren Kunden und Aktionären verp?ichtet, Daten zu schützen und ihre Gefährdung nicht nur gegenüber externen Angreifern, sondern auch gegenüber Mitarbeitern zu minimieren. Die im Jahr 2017 am häu?gsten genutzte Methode für Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenverstößen im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: Über 80% der erfolgreichen Cyber-An
Tags : 
    
Infinidat EMEA
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing
    
Coyote Point Systems
Published By: Adobe     Published Date: Jun 26, 2019
1994. The first-ever banner ad launched. The first “click here.” Now, 25 years later, spending on digital advertising is big business — and it’s becoming more sophisticated, more customer-focused, and more dynamic. That’s exciting. At Adobe, we've been there from the early days — providing designers with digital creation tools to build ads. And offering advertisers an industry-leading, independent ad platform to ensure ads effectively reach target audiences across channels. We're proud to be part of advertising history and to be helping our customers succeed. We can't wait to help lead the next 25 years of digital advertising.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Jun 26, 2019
1994. The first-ever banner ad launched. The first “click here.” Now, 25 years later, spending on digital advertising is big business — and it’s becoming more sophisticated, more customer-focused, and more dynamic. That’s exciting. At Adobe, we've been there from the early days — providing designers with digital creation tools to build ads. And offering advertisers an industry-leading, independent ad platform to ensure ads effectively reach target audiences across channels. We're proud to be part of advertising history and to be helping our customers succeed. We can't wait to help lead the next 25 years of digital advertising.
Tags : 
    
Adobe
Published By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: OneUpWeb     Published Date: Jun 16, 2010
Could your website be doing more? Find out in Oneupweb's latest study. Today, the design and usability of your website directly affects your bottom line. Discover if it's driving sales, or driving them away with the new measurement you need to determine the success of your site's design.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design
    
OneUpWeb
Published By: OneUpWeb     Published Date: Jul 27, 2010
Separate fact from fiction with Oneupweb's new white paper on social media. By now you've heard the buzz about social media, and it's true, it is a cornerstone for branding, sales growth and PR.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design, social media, marketing plans, growth
    
OneUpWeb
Published By: OneUpWeb     Published Date: Nov 23, 2010
Does social media marketing really work? How do you separate fact from fiction as you navigate your way through the buzz about "going viral"? Amidst the chatter about Twitter, Facebook, FourSquare, Digg, Delicious, and Linked In-what will really get your business ahead? Tune in to find out as Oneupweb CEO Lisa Wehr and Social Media Director, Maureen Michaels team up to unveil the truth.
Tags : 
oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design, social media, marketing plans, growth
    
OneUpWeb
Published By: DocuSign     Published Date: Jul 12, 2019
If you’re in charge of your company’s recruiting and onboarding, you know that attracting and retaining top talent is more difficult than ever. This is no surprise: Job seekers have an abundant choice of employers. According to the U.S. Bureau of Labor Statistics, today there are fewer unemployed Americans (6.2 million)1 than there are available jobs (7.6 million).2 In order to attract top talent, companies need modern, sophisticated—and digital— recruiting and onboarding processes. Millennials, who now make up the majority of the workforce, and Gen Z are digital natives who expect their work environments to reflect a hyper-connected world.3 In a Microsoft survey, 93 percent of millennials said that the latest technology was important to them when choosing an employer.4 However, despite the increasing need for digitization in recruiting and onboarding, many companies still have highly manual processes and legacy systems of agreement. Consequently, HR staff slogs through hours using ana
Tags : 
    
DocuSign
Published By: SAP     Published Date: Mar 02, 2017
HCM suite vendors are building out their offerings to address administrative, strategic and operational needs of users in multiple geographies, but solutions still vary. HR IT leaders should use this research to identify best-fit vendors based on their own critical product and service/support needs.
Tags : 
    
SAP
Published By: Cisco EMEA     Published Date: Jun 19, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses.
Tags : 
    
Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.