HIT Consultant Insightful coverage of healthcare innovation
 

it compliance

Results 251 - 275 of 1507Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance, oracle
    
Oracle
Published By: IBM     Published Date: Jun 16, 2015
This white paper highlights IBM’s vision for the next-generation data center, its potential to be truly revolutionary and the prescribed pathway for getting there.
Tags : 
data center, mobility, software defined environment, service optimization, business solutions, data center security, compliance, automating protective measures, virtualization
    
IBM
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Fear of data misuse has led to both general and industry-specific data-privacy regulations worldwide that many organizations now must meet, and it’s important to embrace their requirements. The role of data-holding organizations has increasingly shifted to being stewards of information, in particular in the United States and the European Union (EU). And failure to comply with regulations can mean not only reputational damage, but substantial fines and even jail time. Just meeting compliance mandates, though, may not help you actively spot and stop a data breach.
Tags : 
data misuse, security, privacy regulations, data breach, compliance mandates
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 17, 2018
IBM Security Guardium tools can be the cornerstone of an enterprise’s compliance initiative for GDPR personal data protection requirements.
Tags : 
gdpr, compliance, data protection, personal data
    
Group M_IBM Q1'18
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : 
byod, device discovery, data privacy, data security, it security
    
Kaspersky Lab
Published By: mindSHIFT     Published Date: Nov 29, 2007
A millisecond of downtime can mean millions of dollars. Maintaining compliance while ensuring your firm has the required speed and uptime can be daunting. Learn what you can do with your email and instant messages to prepare for your next regulatory audit.
Tags : 
secure im, secure instant messaging, audit, security audit, auditing, compliance, email security, high availability, mindshift
    
mindSHIFT
Published By: mindSHIFT     Published Date: Nov 29, 2007
Have you adjusted your data retention policies and electronic discovery procedures to comply with the new Federal Rules of Civil Procedure (FRCP)? Learn how email archiving can help you with these electronic discovery requirements.
Tags : 
frcp, secure content, secure data, data protection, database security, compliance, frcp compliance, data governance, e-discovery, legal, law firm, mindshift
    
mindSHIFT
Published By: NetApp     Published Date: Feb 22, 2010
Centralize storage to reduce costs, achieve compliance, and provide disaster recovery.
Tags : 
netapp, operating cost, it management, tco, centralize storage, compliance regulations, disaster recovery, business agility, automobile association
    
NetApp
Published By: EMC Corporation     Published Date: Feb 13, 2015
Clutch Group provides litigation, compliance, and legal services to major Fortune 500 companies in sectors with large legal exposure (Finance, Life Sciences, Natural Resources, etc.). By using purpose-built technology solutions to extract deep insights from large data volumes, the company transformed its business approach of helping client firms make better legal decisions.
Tags : 
all-flash-array, purpose-built technology, large data volumes, business approach, legal decisions
    
EMC Corporation
Published By: RES Software     Published Date: Jul 03, 2012
George Curtis, CIO of URMC, was looking for a way to keep his team from needing to touch desktops every day. He was in search of solution that would simplify desktop management, and when he learned about RES Software, he was immediately hooked. After only a few months of beginning the implementation of RES, George and his team began seeing major benefits.
Tags : 
res software, technology, healthcare it, healthcare technology, compliance, desktop management, desktop migration, networking solutions, health analytics, business intelligence, enterprise content management, health information exchange (hei)
    
RES Software
Published By: RES Software     Published Date: Jul 06, 2012
Today's IT managers face tough challenges. There's pressure to reduce IT costs, end user demand for flexible yet secure working, and the constant need to maintain regulatory compliance. Join the IT managers around the world who are solving their biggest challenges with RES Software. Learn how organizations in every sector are giving end users the freedom to work the way they want, in any location and via multiple devices, while drastically reducing demand for hands-on IT professionals.
Tags : 
technology, res software, healthcare, desktop, healthcare it, medical device, it management, desktop migration, reduce it costs, res automation software, windows migration, health analytics, enterprise content management, health information exchange (hei)
    
RES Software
Published By: RES Software     Published Date: Jul 11, 2012
In this web seminar you'll learn how RES Software will help to find the perfect balance between your needs and those of your clinicians, administrators and regulators. Healthcare professionals will be able to access applications and data in any system, via multiple devices and from wherever they need: operations rooms, wards, clinics or even at home, without putting compliance requirements at risk.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, it clinicians, health analytics, business intelligence, enterprise content management
    
RES Software
Published By: RES Software     Published Date: Mar 26, 2013
IT departments today are finding themselves squarely at the epicenter of healthcare compliance scrutiny.
Tags : 
ehr, healthcare records, patient data, meaningful use, healthcare, trends, electronic health records, data warehousing, network infrastructure, privacy and security, workforce management, enterprise content management
    
RES Software
Published By: Oracle     Published Date: Nov 14, 2012
The impact of the global financial downturn has changed the liquidity risk landscape for financial services organizations, especially for banks.
Tags : 
oracle, liquidity, risk, compliance, lcr
    
Oracle
Published By: Oracle     Published Date: Nov 14, 2012
The impact of the global financial downturn has changed the liquidity risk landscape for financial services organizations, especially for banks.
Tags : 
oracle, liquidity, risk, compliance, lcr
    
Oracle
Published By: CDW     Published Date: Nov 12, 2012
Data center priorities have been consistent for some time: Improve efficiency, increase uptime and meet compliance regulations are IT mantras.
Tags : 
data centers, infrastructure, it infrastructure, data center convergence
    
CDW
Published By: EMC     Published Date: Apr 18, 2013
The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
rsa, business continuity, disaster recovery, bcm, regulatory, compliance
    
EMC
Published By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : 
risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc
    
EMC
Published By: BMC Software     Published Date: Jul 24, 2014
With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. Discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Read the whitepaper today to put the trust back into your data center.
Tags : 
intelligent, compliance, breach, security, data center, control
    
BMC Software
Published By: RSA Security     Published Date: Nov 06, 2013
See a visual representation of the GRC framework needed within an organization to meet today's governance, risk and compliance needs, as well as how an organization should view GRC, its guiding principles and final objectives.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC has received the highest rating of “Strong Positive” in Gartner MarketScope for IT Governance, Risk & Compliance Management (IT GRC) 2013 for the fifth consecutive time.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: RSA Security     Published Date: Nov 06, 2013
RSA, the security division of EMC, was positioned by Gartner in the Leader’s quadrant of the 2013 Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms based on completeness of vision and ability to execute.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : 
mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
    
McAfee
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.