Compliance (Systems Operations) Research
-
Managing identities and access in the cloud
Sponsored by: IBMThis white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
-
Take Control of Your PST Problem
Sponsored by: Dell SoftwareFind out best practices for migrating PST file data to a more secure Exchange or Office 365 environment, and get suggestions for tools that can help ensure your migration is successful. Read the White Paper >>
-
Molina Healthcare Minimizes Risk and Achieves Compliance with Symantec Solutions
Sponsored by: Symantec CorporationView this webcast to learn which cost-effective solution Molina Healthcare chose to help them maintain continuous compliance with a variety of regulations.
-
Focused IT Compliance at Barnabas Health
Sponsored by: Symantec CorporationIn this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
-
Simplify implementation of the HITRUST Common Security Framework
Sponsored by: Symantec CorporationClick through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
-
Industry Perspectives: The Impact of HIPAA and HITECH
Sponsored by: Symantec CorporationThis white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
-
HIPAA Compliance in a BYOD Environment
Sponsored by: ImprivataAccess this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.
-
Avoid HIPAA Compliance Violations Amid the Rise of BYOD
Sponsored by: ImprivataThis expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
-
Secure Virtual Desktop Infrastructure for HIPAA Compliance
Sponsored by: ImprivataThis white paper explores the benefits of a virtual desktop infrastructure (VDI) for healthcare facilities trying to implement mobile devices for improved secure patient data access.
-
Improved Scalability and Availability are the Keys to Better Storage Management
Sponsored by: EMC & ArrowThis white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
-
E-Discovery Cross-Border Data Compliance
Sponsored by: ExterroThis white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
-
HIPAA Compliance Statement
Sponsored by: TigerText, Inc.This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
-
Imprivata Cortext: HIPAA Compliant Texting for Clinicians
Sponsored by: ImprivataThis white paper reveals the top 2 best practices to ensure secure, HIPAA-compliant text messaging for the healthcare industry.
-
Stock Yards Bank and Trust Makes Employees Productive and Keeps Data Secure
Sponsored by: ImprivataThis case study features one large, trusted U.S. bank's experience with a simplified authentication solution that enabled increased productivity, compliance, and security levels.
-
The CIO’s Guide to HIPAA Compliant Text Messaging
Sponsored by: ImprivataThis resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
-
Real Time Endpoint Compliance for Continuous Diagnostics and Mitigation
Sponsored by: IBMAccess this white paper to explore an endpoint management solution that will help federal agencies continuously monitor, manage, and detect vulnerabilities across their critical networks.
-
Avoiding Compliance and Shadow IT Risks in the Cloud
Sponsored by: CloudPassageThis expert e-guide from SearchSecurity.com offers advice on maintaining compliance and controlling issues with shadow IT when you move your critical business applications to the cloud.
-
Executive Guide to SYSPRO Security for Auditing Assurance and Control
Sponsored by: SysproThis white paper introduces an enterprise resource planning (ERP) system with the governance, risk, and compliance functionality you need to satisfy regulatory requirements and fuel security success.
-
Strategies For Securing Virtualized Environments
Sponsored by: SourcefireThis whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
-
Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
Sponsored by: NetIQThis resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
-
Best practices in managing requirements in Energy and Utilities industries
Sponsored by: IBMThis webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
-
How to Protect the Increasingly Vulnerable Energy Industry
Sponsored by: IBMLearn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
-
Breaking Through the GRC Value Ceiling
Sponsored by: EMC CorporationThis paper uses the RSA Archer GRC Reference Architecture to illustrate the value of operational technologies while acknowledging there is a ―Value Ceiling‖ for some niche operational tools, highlighting the missed opportunity for broader value.
-
2013 Data Governance Survey Results
Sponsored by: Rand Secure DataCheck out this informative paper to explore the concept of data governance and why so many of today's organizations lack adequate solutions to this increasingly-difficult challenge. Find out key steps to improve your company's data governance and discover one solution that could perfect your strategy. Read on to learn more.
-
A Clinically-Driven Approach to ICD-10
Sponsored by: NuanceThis resource explores a web-based platform solution that can help healthcare facilities transition to meet the ICD-10 rollout in October, 2015.