HIT Consultant Insightful coverage of healthcare innovation
 

it protection

Results 376 - 400 of 1590Sort Results By: Published Date | Title | Company Name
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
Patients trust healthcare organisations with vast amounts of their sensitive data – not just details on their medical and social wellbeing, but also personally identifiable information such as dates of birth and residential addresses. People will always make mistakes – and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help overcome this to avoid mistakes, sensitive patient information remains at risk.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: Carbonite     Published Date: Oct 05, 2017
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection. IT pros need confidence that the protection they deploy can: •Ensure long-term survivability of historical data •Deliver data securely to different waypoints. •Extend protection as environments change.
Tags : 
data protection, data security, carbonite, data recovery, data resiliency, data backup
    
Carbonite
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
Most businesses have experienced an IT or technology outage in the past five years. Outages and disruptions result in business and IT challenges. Business continuity and disaster recovery (BCDR) plans ensure a company's ability to continue business uninterrupted and survive unforeseen disruptions. By adopting network diversity, IT pros expect to experience a variety of business and IT benefits, including protection against unexpected disruptions. Check out this easy-to-absorb infographic, based on Forrester survey data, to learn how your peers view the importance and structure of BCDR strategies.
Tags : 
    
Spectrum Enterprise
Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks
Published By: Inspirus     Published Date: Oct 04, 2017
When we set out to conduct this study, we thought there would be quite marked differences between needs and expectations of employees from different countries and generations. In the end, we found that to be untrue." Sodexo Benefits and Rewards Services conducted a study across five countries comparing Millennials and non-Millennials in the workplace and found that the top five expectations of each group were exactly the same: Security and protection for their future, health and family Manage own time/work-life balance Monetary recognition for personal contribution Career development, regular and ongoing feedback Personal development inside as well as outside of the workplace Read the study now to learn more!
Tags : 
    
Inspirus
Published By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : 
data breaches, data privacy, hipaa, finra, byod, pii, phi
    
Druva
Published By: Druva     Published Date: Sep 27, 2017
Virtualization tools are providing storage pros with the ability to overcome the limitations of physical servers and gain more flexibility. While hypervisors are allowing them to leap over these boundaries, they’re simultaneously crumbling traditional data protection walls. It’s time to rethink how we handle backup. Inside, discover 8 essential real-world practices to put in place for hypervisor backup, archiving, and disaster recovery.
Tags : 
vmware, virtualization, hypervisors, data protection, archiving, disaster recovery
    
Druva
Published By: Cisco     Published Date: Sep 21, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive. Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex Download this eBook to find the elements of complexity we have to deal with today.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
Published By: Cisco     Published Date: Sep 20, 2017
Våra två säkerhetsexperter Chung-wai Lee och Håkan Nohre diskuterar aktuella hot som Ransomware och mer avancerade attacker, och vad man bör tänka på för att skydda sig. Vi berättar om en kund från fastighetsbranschen som blev attackerad och hur de hanterade IT-incidenten.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
Published By: RSA     Published Date: Sep 19, 2017
This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.
Tags : 
rsa, rsa security, data breach, data protection, gdpr
    
RSA
Published By: RSA     Published Date: Sep 19, 2017
This must-read report featuring insights from respected legal and security experts outlines specific GDPR compliance challenges you probably haven’t considered.
Tags : 
rsa, rsa security, gdpr, data protection, compliance
    
RSA
Published By: RSA     Published Date: Sep 19, 2017
Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.
Tags : 
rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr
    
RSA
Published By: CA Technologies     Published Date: Sep 13, 2017
"The Implications for Test Data Management The GDPR is set to have wide-ranging implications for the type of data which can be used in non-production environments. Organizations will need to understand exactly what data they have and who’s using it, and be able to restrict its use to tasks where they have consent. Learn more about how you can protect the data that matters most and comply with the GDPR."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"Companies have complied with data protection directives and regulations for more than two decades. But the General Data Protection Regulation (GDPR), an overhaul of existing European Commission data protection legislation, aims to strengthen and unify those laws for EU citizens. Primary GDPR objectives are to give citizens back control over their personal data and simplify the regulatory environment for international business. For organizations already compliant with Directive 95/46/EC, what do they need to do from a technology perspective to comply with GDPR? Read this solution brief to see how CA can help you with GDPR compliance."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe with global impact that will come into force on May 25th, 2018. Its objective is to further strengthen data protection. Enforcement will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. In this webinar, CA experts will share some thoughts around the journey organizations are on and discuss some real life examples.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"There's new legislation in place, that's expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across testing and development environments. It's the General Data Protection Regulation (GDPR). Are you ready for it? In this session, we’ll demonstrate how CA Test Data Manager helps to both mask your production data and to generate synthetic test data; a powerful combination to help you meet compliance needs and deliver quality applications. There will be a short section on the future of the tester self-service model that will enable testers to efficiently get access to the right test data."
Tags : 
    
CA Technologies
Published By: BlackBerry Cylance     Published Date: Sep 13, 2017
Streamline your endpoint security stack and your team's workload with predictive, AI based, pre-execution malware protection plus prevention based EDR. CylancePROTECT combined with CylanceOPTICS = real-time, predictive threat prevention.
Tags : 
    
BlackBerry Cylance
Published By: Akamai Technologies     Published Date: Sep 11, 2017
How safe is your customer's sensitive data? Is your organization protected from credential stuffing? Take Akamai's interactive security quiz and discover more about credential stuffing and how to protect your business.
Tags : 
customer security, credential protection, akamai
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
There are many reasons why bots pose the most complicated threat to your online business - access to pools of IP addresses, ability to stay under the radar, highly persistent. Read what you need to know to stay in the know.
Tags : 
credential stuffing, ip security, threat protection
    
Akamai Technologies
Published By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
Mobility is exploding. Workers and businesses fully expect to work anywhere, any time, from any device. Riding right alongside this growth is the amount of data created and consumed on mobile devices. While this presents organizations with an attractive means of empowering flexibility and productivity, the security risks are real and daunting. Unfortunately, while enterprise mobility management tools can provide valuable administrative capabilities and protect the organization from phone loss, accidental data loss or weak passwords, they lack the necessary visibility into today’s modern security risks, including malware and other device-centric attacks
Tags : 
mobile security, enterprise mobility, mobile security risks, mobile management tools, data protection
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions.This whitepaper highlights some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
mobile threats, mobile security, mobile protection, enterprise mobility management, mobile security solutions
    
Lookout
Published By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : 
enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
    
Lookout
Published By: IBM     Published Date: Aug 23, 2017
Banks today are continuously challenged to meet rigorous regulatory requirements. They must implement strict governance programs that enable them to comply with a wide variety of regulations stemming from the financial crisis that began in 2007, including the DoddFrank Act, Basel Committee on Banking Supervision regulations, the General Data Protection Regulation (GDPR), the Revised Payment Services Directive (PSD2) and the revised Markets in Financial Instruments Directive To keep pace with regulatory changes, many banks will need to reapportion their budgets to support the development of new systems and processes. Regulators continually indicate that the banks must be able to provide, secure and deliver high-quality information that is consistent and mature.
Tags : 
risk mitigation, data aggregation, risk reporting, banking
    
IBM
Published By: Datastax     Published Date: Aug 23, 2017
Banks deal with mountains of data and complex transactions that far too often don’t capitalize on the power of an always-on, real-time data management platform to provide both financial insights and peace of mind. Today’s cloud applications require a new, far more holistic approach to data management and data protection. This eBook explains why the scalability, 100% availability, enterprise-grade security, and real-time insights of DataStax Enterprise are essential for banking in the modern world.
Tags : 
transactions, modernizing, financial insights, data management
    
Datastax
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.