HIT Consultant Insightful coverage of healthcare innovation
 

industry standard

Results 51 - 75 of 142Sort Results By: Published Date | Title | Company Name
Published By: Zebra Technologies     Published Date: Jun 27, 2017
This eight-page overview highlights Zebra’s portfolio of solutions for the healthcare industry, including asset tracking, inventory management and access control. Harnessing the potential of cloud computing and the Internet of Things (IoT), and combining technologies such as barcoding, RFID and mobile computing, Zebra’s advanced healthcare technology solutions go beyond standard machine-to-machine communication to create a seamlessly integrated solution that facilitates best practices.
Tags : 
zebra technologies, healthcare, inventory management, cloud computing, mobile computing, internet of things
    
Zebra Technologies
Published By: Infosys     Published Date: Jun 12, 2018
Digital technologies are rewriting the rulebooks across industries. They are not only having a profound impact on how organizations work, but are also redefining the parameters of productivity and success. Organizations that can evolve and embrace this fast paced, digital world that we live in are more likely to be successful. However, given the rapid pace at which digital trends are evolving, what might be an industry standard at one moment can be displaced the next. This means that for enterprises, simply striving to keep up might no longer be enough, as businesses need to lead the way with new technology in their industries. Infosys commissioned an independent market research company, Vanson Bourne, to investigate the use of digital technologies and key trends in nine industries. This exclusive report covers: The surging tide of digital technology adoption in organizations – what is used and where? The promised land of digital technology use, and the hurdles organizations face to
Tags : 
digital, technology, organization, enterprises
    
Infosys
Published By: Cisco     Published Date: Jul 11, 2016
Customer Name: Stanley Black & Decker, Inc. Industry: Manufacturing Location: Reynosa, Mexico Number of Employees: 52,000 worldwide Challenges: • Transparency of real-time production to schedule • Actual labor costs exceeding standard costs • Understanding effects of shift changes and resource shifts from line to line • Visibility to real-time overall equipment effectiveness and line productivity and reducing production line change over time
Tags : 
    
Cisco
Published By: Dell Windows Server     Published Date: Jan 16, 2009
The Windows Server 2008 OS promises to supercharge enterprise computing by providing a solid foundation to support critical workloads and deliver rich Web-based experiences—all in an exceptionally secure, industry-standard operating environment. Dell smoothes the way by providing business-ready platforms optimized for Windows Server 2008 together with Structured Solution Designs to make the migration flexible, simple, and green.
Tags : 
dell, microsoft windows server 2008, structured solution designs, windows migration
    
Dell Windows Server
Published By: NetIQ     Published Date: Dec 23, 2010
The Payment Card Industry Data Security Standard (PCI DSS) establishes standard requirements protecting cardholder information. It applies to all entities that store, process, or transmit cardholder data, such as retail merchants, payment processors, and banks.
Tags : 
netiq, roi, pci dss, compliance
    
NetIQ
Published By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : 
netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection
    
NetIQ
Published By: Red Hat     Published Date: Mar 16, 2015
Industry analyst firm IDC recently conducted primary research, commissioned by Red Hat, to determine the total cost of ownership (TCO) benefits Red Hat Enterprise Linux provides in the long term versus running mixed environments or primarily non-paid Linux distributions. The results of this analysis are clear: Organizations that standardize on Red Hat Enterprise Linux recover their up-front subscription costs faster through more efficient operations, less downtime and a more productive IT staff. Key findings include: Organizations that standardize on Red Hat Enterprise Linux have more efficient IT staffs Red Hat Enterprise Linux customers experience about one-fifth the amount of downtime as organizations using primarily non-paid Linux distributions Organizations that heavily use non-paid Linux have almost double the total operational costs Time to market for new application deployments can be greatly reduced with Red Hat Enterprise Linux
Tags : 
total cost of ownership, up-front subscription costs, productive it staff, application deployments
    
Red Hat
Published By: GFI Software     Published Date: Mar 21, 2011
This white paper examines the necessary requirements to adhere to PCI DSS, the implications of non-compliance as well as how effective event log management and network vulnerability management play a key role in achieving compliance.
Tags : 
gfi, pci dss, credit card, event log management, network vulnerability management, compliance
    
GFI Software
Published By: IBM     Published Date: Mar 04, 2009
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
Tags : 
ibm, pci dss, compliance
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
    
IBM
Published By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : 
ibm mmdg, credit card security, pci compliance, secure network, cardholder data
    
IBM
Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection, ebusiness, customer relationship management, software compliance, security management, security policies, secure computing, securecomputing
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, tjx
    
Secure Computing
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Fault Tolerant is a pretty common term in the world of IT, also an often misused and misleading term.  For 3 decades, Stratus Technologies has been engineering and manufacturing purpose built Fault Tolerant solutions. Check out this short video to understand what it takes to be REAL Fault Tolerant.
Tags : 
stratus, virtualization, fault tolerance, real fault, it management, industry standard components, disaster prevention
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Terry Bass, V Series and OpenVOS Product Manager, discusses the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the world’s most reliable operating system. VOS is now OPEN.
Tags : 
stratus, openvos, open source applications, unix, linux, gnu tools, debugging tools, industry standard, ipsec, ntp, openssh, radius, samba
    
Stratus Technologies
Published By: Vendor Safe Technologies     Published Date: Jan 21, 2010
The Most Common PCI Compliance Mistakes of Brick-and-Mortar Locations
Tags : 
vendor safe technologies, pci security deficiency, firewall, remote access, authentication, wireless network, point of sale software, credit card
    
Vendor Safe Technologies
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit
    
Tripwire, Inc
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
    
CDW-Trend Micro
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper contains 12 PCI DSS requirements that have been organized into six (6) logically related groups.
Tags : 
gfi software, sunbelt, pci-dss compliance, data security, american express, discover financial services, jcb international, mastercard worldwide, visa
    
GFI Software
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: AlienVault     Published Date: Oct 21, 2014
The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.
Tags : 
communication, government, reducing cost, digital, network, public sector, logical, industry, standards, performance, security, management, unified, solution
    
AlienVault
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Rackspace
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.