privacy

Results 1 - 25 of 350Sort Results By: Published Date | Title | Company Name
Published By: Citrix     Published Date: Jun 25, 2015
Data security in the healthcare industry is vital. Healthcare practices must ensure the privacy and security of protected health information (PHI) and electronic protected health information (ePHI) as defined by the Health Insurance Portability and Accountability Act (HIPAA), and they may face punitive consequences if they donít. Read this whitepaper to learn how to securely exchange sensitive data, while staying compliant.
Tags : 
    
Citrix
Published By: Health Data Management     Published Date: May 13, 2015
The recent Anthem Health data breach provided a jarring alarm-clock like jolt to the healthcare industry. Learn what healthcare companies are doing to prevent such breaches and how they are protecting themselves.
Tags : 
    
Health Data Management
Published By: Privacy Analytics     Published Date: Jun 18, 2015
De-Identification 101, your first steps into understanding the need and use of de-identified data for secondary purposes. Learn how to unlock PHI safely and securely.
Tags : 
    
Privacy Analytics
Published By: Privacy Analytics     Published Date: Jun 18, 2015
De-identification 201 builds on the fundamentals of health data de-identification, including: understanding the risk in a dataset, and major differences between masking and de-identification.
Tags : 
    
Privacy Analytics
Published By: Privacy Analytics     Published Date: Jun 18, 2015
Re-identification attacks pose serious risks not only for the organizations that have been attacked but also for the individuals whose personal information has been compromised.
Tags : 
    
Privacy Analytics
Published By: Privacy Analytics     Published Date: Jun 18, 2015
The answer to re-identification risk is not to limit the sharing of data; rather, it is to apply the science and use methods that ensure data is reliably de-identified.
Tags : 
    
Privacy Analytics
Published By: Proofpoint     Published Date: May 22, 2012
Here's what you need to know about the latest security, privacy and data breach regulations that apply to private healthcare information.
Tags : 
    
Proofpoint
Published By: Akamai Technologies     Published Date: Jul 02, 2019
The stakes are high for consumer brands in todayís data privacy landscape. Sophisticated cyberattacks and front-page data privacy breaches threaten to compromise customer data and damage brand trust. To succeed today, brands must implement a data security and privacy strategy that prioritizes customer trust. Are you up to the challenge? Use Forrester Researchís ďData Security and Privacy Maturity AssessmentĒ to gauge your brandís competencies and identify areas for improvement. You will learn: ? The four key data security and privacy competencies B2C brands must master ? How you measure up against Forrester Researchís recommended best practices ? Tips to make your data security and privacy culture a competitive differentiator
Tags : 
    
Akamai Technologies
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
Astaro
Published By: Cisco EMEA     Published Date: Jun 19, 2019
The EUís General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand. Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
The EUís General Data Protection Regulation (GDPR) became enforceable on May 25, 2018, and privacy laws and regulations around the globe continue to evolve and expand.
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Dec 11, 2018
The goal of this review is to educate customers on the capabilities that Ciscoís SD-WAN solution provides when working with Amazon Web Services (AWS). ESG describes Ciscoís solution and highlights the business value it can deliver to customers via its integration with AWS. ESG completed this summary as part of an AWS-commissioned report to review nine SD-WAN vendors. Readers should use this review as a starting point when investigating how they can leverage the combination of AWS and Cisco for business advantage. I would like to receive email communications about products & offerings from Cisco & its Affiliates. I understand I can unsubscribe at any time. For more information on how Cisco collects and uses personal information, please see the Cisco Online Privacy Statement.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
You need to be ready to host any application anywhere. Our solution adapts to support all of your applications with the simplicity of hyperconvergence. If your IT organization is like most, you are stretched thin to support your developers as they create multicloud-native applications that they deploy across public and private clouds. And you still need to support line-of-business managers with traditional applications as they use both monolithic and cloud deployment models. I would like to receive email communications about products & offerings from Cisco & its Affiliates. I understand I can unsubscribe at any time. For more information on how Cisco collects and uses personal information, please see the Cisco Online Privacy Statement.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 11, 2018
Hyperconverged infrastructure solutions are making substantial inroads into a broader set of use cases and deployment options, but limitations exist. I&O leaders should view HCI solutions as tools in the toolbox, rather than panaceas for all IT infrastructure problems. I would like to receive email communications about products & offerings from Cisco & its Affiliates. I understand I can unsubscribe at any time. For more information on how Cisco collects and uses personal information, please see the Cisco Online Privacy Statement.
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Encryption technology has enabled much greater privacy and security for enterprises that use the Internet to communicate and transact business online. Mobile, cloud and web applications rely on well-implemented encryption mechanisms, using keys and certificates to ensure security and trust. However, businesses are not the only ones to benefit from encryption.
Tags : 
anomaly detection, trust modeling, event classification, entity modeling, relationship building, internet scrapers
    
Cisco EMEA
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
This report explores the challenges that global businesses face when addressing the complex and fluctuating policy environment and offers a set of best practices that companies can follow to meet evolving privacy and security demands. Download now!
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
As the use of cloud solutions in government increases, both business and IT leaders are recognizing that the safety and success of their business depend on finding ways to take full advantage of cloud innovation while ensuring consistent service levels, data management and privacy, and user experiences. Hybrid IT management includes aligning the organization around service levels, cost control, security, and IT-enabled innovation.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last yearís study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This yearís research updates those findings and explores the benefits associated with privacy investment. Ciscoís Data Privacy Benchmark Study utilizes data from Ciscoís Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Workplace by Facebook     Published Date: Sep 27, 2018
A critical part of our mission to make the world more open and connected is providing a secure community for everyone who uses Workplace by Facebook. Decisions we make always involve answering questions upfront about how a new product, feature, or process impacts security and privacy. Every decision we make is reviewed with this lens. Itís simply part of our culture at Facebook. Download this whitepaper now to see how Workplace by Facebook ensure the security of information on Facebook at the very heart of everything we do.
Tags : 
collaboration software, collaboration portal, business communication, workforce management, project management, team work
    
Workplace by Facebook
Published By: Workplace by Facebook     Published Date: Dec 21, 2018
A critical part of our mission to make the world more open and connected is providing a secure community for everyone who uses Workplace by Facebook. Decisions we make always involve answering questions upfront about how a new product, feature, or process impacts security and privacy. Every decision we make is reviewed with this lens. Itís simply part of our culture. Download this whitepaper now to see how Workplace by Facebook ensures that the security of information is at the very heart of everything we do.
Tags : 
    
Workplace by Facebook
Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Despite momentous benefits, cloud computing has its own set of challenges that must be addressed. The primary concern that many enterprises and end users have is related to security, especially data protection and privacy and loss of control. This article discusses the several challenges associated with security for cloud-based video conferencing and how organizations can remove these barriers by adopting solutions that implement security as a key tenet.
Tags : 
cloud, video conference, protection, security, management
    
LifeSize, a division of Logitech
Published By: Samsung     Published Date: Dec 18, 2015
This paper will outline the value of the Internet of Things, highlight several key use cases, address the issues of privacy and security, and offer best practices for achieving success.
Tags : 
    
Samsung
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE ó thanks to a unique shared memory and vertical scale architecture ó make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.