health information

Results 101 - 125 of 148Sort Results By: Published Date | Title | Company Name

Sans Healthcare

Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys

Children's Hospital Boston Implements Coveo to Ensure Optimal Patient Care

Published By: Coveo     Published Date: Nov 13, 2013
In the health-care industry, every second counts. Learn how the Children’s Hospital of Boston uses Coveo to ensure clinicians and hospital staff easily local precise, critical patient care information.
Tags : 
internal knowledgebase, enterprise search, enterprise search solutions, unified search, search engines
    
Coveo

The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi
    
Tripwire

Improve healthcare and life sciences with a Smarter Process approach

Published By: IBM     Published Date: Mar 04, 2014
A Smarter Process vision for healthcare. We live in an era in which customers expect perfection from their service providers. With competitors only a click (or tap) away, companies have a strong incentive to deliver flawless operations. Online retailers have set a high bar - in the way they engage customers throughout the entire sales process -not just during the commercial transaction, but before, during and after the transaction. Can healthcare and life sciences meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, healthcare, smarter process, life sciences, health plan
    
IBM

Big Data Integration and Governance Considerations for Healthcare

Published By: IBM     Published Date: Aug 05, 2014
There is a lot of discussion in the press about Big Data. Big Data is traditionally defined in terms of the three V’s of Volume, Velocity, and Variety. In other words, Big Data is often characterized as high-volume, streaming, and including semi-structured and unstructured formats. Healthcare organizations have produced enormous volumes of unstructured data, such as the notes by physicians and nurses in electronic medical records (EMRs). In addition, healthcare organizations produce streaming data, such as from patient monitoring devices. Now, thanks to emerging technologies such as Hadoop and streams, healthcare organizations are in a position to harness this Big Data to reduce costs and improve patient outcomes. However, this Big Data has profound implications from an Information Governance perspective. In this white paper, we discuss Big Data Governance from the standpoint of three case studies.
Tags : 
ibm, data, big data, information, healthcare, governance, technology, it management
    
IBM

Smart Paper: Beyond the EMR: Optimizing Healthcare IT Investments for Better Business/ Care Outcomes

Published By: IBM     Published Date: Jul 22, 2015
Healthcare enterprises seek new ways to realize value beyond their EMR investments by identifying strategic IT initiatives.
Tags : 
it healthcare, healthcare enterprise, it initiatives, technology leverage, information integration, interactive technology, case-aware analytics, it investments
    
IBM

How to Solve Downtime Challenges to Patient Care, Operations & HIPAA Compliance

Published By: Vision Solutions     Published Date: Jan 22, 2009
This white paper shows how information availability solutions ensure the availability and accessibility of data and applications, regardless of planned or unplanned interruptions. They transform costly unproductive downtime into value producing uptime and help IT managers solve the challenges of automated patient care and compliance.
Tags : 
vision solutions, healthcare it manager, downtime challenges, information availability, hippa, enterprise applications, hipaa compliance, as/400
    
Vision Solutions

A Prescription for Privacy

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : 
verisign, health, ehr, security, breaches, risks, web-based, information
    
VeriSign Authentication Services, now a part of Symantec Corp.

Mission critical (Intel/OST/EPIC)

Published By: HP-Intel®     Published Date: Nov 19, 2012
Healthcare organizations nationwide are moving quickly to implement electronic medical records (EMR) and other advanced information technologies to improve the quality and efficiency of patient care.
Tags : 
intel, healthcare, ost, epic, unix/risc, david spieker, business technology
    
HP-Intel®

Five Strategies for Email Data Loss Prevention

Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security
    
SilverSky

Rochester General Hospital MOVEit Case Study

Published By: Ipswitch     Published Date: Mar 14, 2014
In this case study, you’ll learn how Rochester General Hospital leveraged MOVEit’s point and click simplicity to set up, manage and track more than 70 different file transfer operations between hospital servers and the systems used by payers and outside healthcare providers.
Tags : 
ipswitch, moveit, sensitive data, managed file transfer solution, file transfer, file transfer systems, records management, data security
    
Ipswitch

VIVA Health MOVEit Case Study

Published By: Ipswitch     Published Date: Mar 14, 2014
Due to the massive volume and complexity of the information – compounded by the use of cumbersome DOS scripts – Viva Health needed to simplify and automate their file transfer processes while also remaining in compliance of various regulations. See how they accomplished both objectives with MOVEit Central.
Tags : 
ipswitch, moveit, information management, automation, file transfer, file transfer process, regulatory compliance, file transfer system
    
Ipswitch

Why HIPAA Compliance Is Vital For Your Business

Published By: Auth0     Published Date: May 12, 2016
HIPAA is the Health Insurance Portability and Accountability Act. It’s the legislation that makes sure your protected health information (PHI) is kept private and kept secure. It covers how healthcare providers and associated businesses should keep handle your data and protect your health information, and provides the standards needed to ensure PHI data stored, handled, and accessed correctly at all times.
Tags : 
auth0, hipaa, compliance, health insurance, legislation, business technology
    
Auth0

White Paper: Market to Medical Groups

Published By: Medical Group Management Association (MGMA)     Published Date: Mar 16, 2009
Read this white paper from the Medical Group Management Association (MGMA) – the most respected association for the leaders of medical group practices. You’ll learn how you can take advantage of this niche audience and about technologies that these small and medium-sized businesses dedicated to health care need to run smoothly.
Tags : 
mgma, technology, service, medical groups, medical group management association, smb, healthcare, health-care information technology
    
Medical Group Management Association (MGMA)

AlienVault® USM™: The Perfect Rx for HIPAA Compliance

Published By: AlienVault     Published Date: Oct 20, 2017
The security-oriented rule of the Health Insurance Portability and Accountability Act (HIPAA) is designed to ensure the confidentiality, integrity, and security of ‘electronic protected health information’ (ePHI). However, to comply with the Security Rule and to demonstrate that security controls are in place and working is no easy task, especially for today’s resource-constrained IT security teams. AlienVault® Unified Security Management™ (USM) helps you to accelerate your path to HIPAA compliance and simplifies maintaining your HIPAA certification thereafter. With multiple essential security capabilities together into a single platform, AlienVault USM gives you an affordable and easy-to-use solution to satisfy the HIPAA Security Rule, and provides highly customizable, predefined HIPAA compliance reports out of the box, making it fast and simple to get the visibility you need to maintain your organization’s security posture.
Tags : 
    
AlienVault

Helping to Enable More Efficient, Client-Focused Healthcare with Web Portals

Published By: IBM     Published Date: May 30, 2008
Many healthcare providers have gone through several challenging years of organizing their electronic records systems. And during that time, consumer-driven healthcare has gained momentum. This executive brief explains how an IBM WebSphere Portal software–based solution can provide a flexible and valuable long-term solution compared to other options, with personalized user experiences that help deliver agile, security-rich access to relevant information.
Tags : 
healthcare, hospital, medicine, medical, websphere, ibm, ep campaign, ibm ep
    
IBM

The Quest to Achieve Best Practices in Healthcare Information Security

Published By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : 
ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy
    
IBM

The Value of Enterprise SSO to HIPAA Compliance

Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa
    
Imprivata

From Policy to Practice: A Practical Guide to Implementing HIPAA Security

Published By: PKWARE     Published Date: Aug 21, 2009
Any organization that stores or transfers health or insurance records electronically must comply with HIPAA, from health care facilities to HR departments. PKWARE offers straightforward strategies for managing protected health information.
Tags : 
compliance, hipaa compliance, hipaa, healthcare, privacy, health, health information management, him
    
PKWARE

Addressing HIPAA Compliance Issues

Published By: Sigaba     Published Date: Aug 21, 2009
This document details the mandated and proposed rules generally referred to as the "HIPAA requirements" and how they affect healthcare organizations and their business partners transmit medical information electronically.
Tags : 
compliance, policy based management, business management, hipaa compliance, health, hipaa, privacy, sigaba
    
Sigaba

Making the Case for an Interoperable, Multi-scale Hospital/Healthcare Knowledge Domain

Published By: Baystate Health / Baystate Medical Center     Published Date: Jul 16, 2007
Get this free white paper to read why mass casualty and other public health emergencies create a demand for information within hospitals, between hospitals, between hospitals and local incident command centers, and between local, statewide and multi-state incident command centers and agencies.
Tags : 
hospital, healthcare, health care, medical records, fema, disaster, natural disaster, business continuity
    
Baystate Health / Baystate Medical Center

Practical Guide to Implementing HIPAA IT Security Standards

Published By: Ecora Software     Published Date: Aug 15, 2007
Do you need to implement corporate policies regarding security and confidential health information? Learn: How to use IT documentation to prepare for and pass Security audits; What IT data is critical for Security Standards; What is the difference between Security and IT Audits. You can implement a sustainable HIPAA Security Standard – Read this paper to learn more.
Tags : 
hipaa, hippa, health care, healthcare, compliance, privacy, consumer data, data privacy
    
Ecora Software

UT Health Science Center at Houston Safeguards Personal Health Information with NeoScale

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.

LogRhythm for Health Insurance Portability and Accountability Act (HIPAA)

Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology
    
LogRhythm

Regional Healthcare Provider Uses AutoMateTM Software for Complex Data Processing & Transmission

Published By: Network Automation     Published Date: Dec 08, 2008
In order to deliver quality patient care, Health First must exchange information with a large number of partners, customers, and vendors on a timely basis. Complicating this enormous task is the fact that Health First has over 15 business units using a variety of mission-critical applications.
Tags : 
network automation, mission critical applications, process automation, automate, it management, network management, network performance management, application performance management
    
Network Automation
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.