ComputerWeekly.com Research Library

Powered by Bitpipe.com

HIPAA Compliance Research

  • E-Guide: FAQ: What is Health Data Archiving?

    Sponsored by: BridgeHead Software

    Read this E-guide to learn more about the regulations involved in storing health data, how a SAN can improve data archiving and how to weigh the pro's and con's to achieve the most efficient data archiving strategy for your organization.

  • Engineering the Wireless Hospital

    Sponsored by: Aerohive Networks

    Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. However, there are security, infrastructure, and connectivity obstacles to overcome. Check out this e-book to learn more.

  • Presentation Transcript: Overcoming the Challenges with Configuration and Patch Mgmt

    Sponsored by: BigFix

    In this presentation transcript, you’ll gain insight on how to improve your asset discovery processes, determine the patch level of the machines in your environment, and improve testing and deployment processes to keep pace with Patch Tuesday and quarterly Oracle and Adobe releases.

  • E-Guide A Decision Maker’s Guide to Log Management

    Sponsored by: ArcSight, an HP Company

    While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.

  • E-Book: Encryption - What, Where and How

    Sponsored by: SearchHealthIT.com

    This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more!

  • E-Guide: Information Security Essential Guide to Compliance

    Sponsored by: Information Security Magazine

    Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.

  • Improving Clinician Workflows with One-Touch Desktop Roaming

    Sponsored by: Imprivata

    The move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both.

  • E-Book: New Rules for HIPAA

    Sponsored by: SearchSecurity.com & SearchCompliance.com

    Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.

  • IDC White Paper: Effective Information Security

    Sponsored by: CA (India) Technologies Pvt. Ltd

    Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility...

  • E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH

    Sponsored by: SearchHealthIT.com

    Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.

  • Virtualization Security: Achieving Compliance for the Virtual Infrastructure

    Sponsored by: Trend Micro

    What’s top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren't articulating the ways in which their products can help enterprises address compliance concerns. Read this paper to learn about top trends in virtualization security, how virtualization poses unique challenges to compliance, and more!

  • Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’

    Sponsored by: Information Security Magazine

    This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

  • E-Book: IT in the Electronic Hospital

    Sponsored by: Imprivata

    The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.

  • eBook: IT in the Electronic Hospital

    Sponsored by: SearchCIO.com and SearchSecurity.com

    The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more.

  • Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops

    Sponsored by: Red Hat and JBoss

    This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.

  • Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network

    Sponsored by: Code Green Networks, Inc.

    Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.

  • Protecting Healthcare Organizations from Patient Data Loss

    Sponsored by: Code Green Networks, Inc.

    Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.

  • The New Age of Compliance: Preparing Your Organization for a New Era of Increased Accountability and Enforcement

    Sponsored by: Mimosa Systems

    This white paper examines the current state of regulatory compliance and the impact of non-compliance. It also addresses the current political environment and the shift in the compliance landscape and compliance enforcement for which organizations need to be prepared. Finally, it discusses some best practices that can be applied to streamline..

  • Web Application Security Trends Report Q3-Q4, 2008

    Sponsored by: Cenzic

    Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.

  • Riverbed Steelhead Product Family Data Sheet

    Sponsored by: Riverbed Technology, Inc.

    What's the Riverbed difference? Speed. Scalability. And simplicity. Discover it for yourself and get the facts about the entire family of Steelhead solutions from Riverbed. Companies of all sizes depend on the Riverbed Steelhead product family to accelerate the performance of applications over the WAN.

  • Addressing Compliance Initiatives with Center for Internet Security Benchmarks

    Sponsored by: Tripwire, Inc.

    This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.

  • Profiting from PCI Compliance

    Sponsored by: IBM

    This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.

  • Laws, regulations and compliance: Top tips for keeping your data under your control

    Sponsored by: Sophos

    This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.

  • Achieving Compliance in a Virtualized Environment

    Sponsored by: Tripwire, Inc.

    The goal of this paper is to present the unique considerations that virtualization presents to regulatory and standards compliance, and then prescriptively describe how to mitigate risks.

  • SenSage Event Data Warehouse

    Sponsored by: Hexis Cyber Solutions Inc

    This document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.