ComputerWeekly.com Research Library

Powered by Bitpipe.com

Health Care Industry Research

  • Case Study: Citadelle Regional Hospital Center

    Sponsored by: Accedian

    Citadelle Regional Hospital Center, a major healthcare facility located in Belgium, relied on an in-house application for EMRs. The application was continually plagued by degradations that could not be replicated or resolved. In this case study, learn how CRHC was able to identify and fix these degradation issues with the help of Skylight.

  • Satellite Case Study

    Sponsored by: Blackberry Cylance

    In this case study learn how Blackberry Cylance was able to help Satellite Healthcare meet their security requirements and ensure uninterrupted access to electronic medical record (EMR) and clinical desktop systems healthcare professionals rely upon to provide quality care.

  • Morphisec’s 2020 Consumer Healthcare Cybersecurity

    Sponsored by: Morphisec, Inc.

    Dive into the latest 2020 Consumer Healthcare Cybersecurity Threat Index from Morphisec to uncover how aware consumers are of their healthcare data security, as well as insights for the year ahead.

  • COVID-19 in APAC:Tech industry lessons & innovations

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the impact of the COVID-19 outbreak on the APAC tech sector, what tech vendors in the region are doing to support organisations during this difficult period and how the pandemic could spur businesses to dial up their digitisation efforts.

  • Why Interoperability is Key to the Healthcare Tech Stack

    Sponsored by: Skedulo

    EHR systems are not known for their interoperability, leaving crucial health data siloed and disparate from other data locations. Side effects can include inaccurate or incomplete electronic records. Read more about the dangers of standalone EHR systems – and how to identify tools that solve interoperability concerns.

  • HPE and Qumulo Hybrid Cloud Storage

    Sponsored by: Qumulo

    New capacity demands, privacy concerns, and personal health records requirements places increased pressure on teams to provide compliant, secure, consolidated storage. Check out this datasheet to discover the 3 requirements an imaging storage system should meet and a single-tier storage solution, built on the hybrid cloud, that can do just that.

  • Morphisec Allows Citizens Medical Center to Focus on Saving Lives

    Sponsored by: Morphisec, Inc.

    In this case study, follow the journey of Citizens Medical Center, a hospital in Texas, as they partner with Morphisec to address the endpoint security needs of their increasingly distributed environment while overcoming challenges related to budgetary constraints and access to talent. Download now to learn more.

  • Guide to Zero Trust for Healthcare Organizations

    Sponsored by: Gigamon

    Healthcare organizations can no longer implicitly trust the users, devices and applications on their networks. This is the concept behind the move towards Zero Trust. In this guide, learn how healthcare organizations can design and implement Zero Trust architectures around the key concepts of network and data visibility.

  • Computer Weekly - 17 March 2020: How NHS Digital is helping support the coronavirus crisis

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to NHS Digital about how technology is supporting the health service's response to the coronavirus crisis. We examine the challenges of running a successful security operations centre. And we look at the emerging datacentre architecture based on composable infrastructure. Read the issue now.

  • White Paper: Unlock pharma’s value through cloud technology

    Sponsored by: Google

    In this white paper, discover how cloud technology can help you overcome seemingly insurmountable data challenges and increase value. Review the factors preventing many pharma organizations from maximizing their data – and learn how cloud adoption can help overcome these challenges, with case studies from Takeda, Sanofi, and Google Cloud.

  • Watch our on-demand webinar: How Roche & BrightInsight partnered to deploy a regulated digital health solution

    Sponsored by: Google

    In this webinar, hear from Paul Upham, Head of Smart Devices at Roche and Kal Patel, MD, CEO & Co-Founder of BrightInsight on the following aspects: the current landscape of biopharma & medtech with respect to IoT & Cloud, criteria for selecting digital health solution partners, the future of software as a medical device, and more.

  • Data Breach Prevention for Healthcare

    Sponsored by: Absolute Software Corporation

    Stolen medical records sell for up to $500/record on the black market, making healthcare providers the top target for cybercrime. Additionally, organizations need to ensure they are meeting increasingly strict compliance standards. Download this white paper to explore how to safeguard your patient records against data breaches.

  • A Guide to Navigating the Modern Health IT Infrastructure

    Sponsored by: Cisco Umbrella

    Ransomware is one of the most common attacks used to hold data hostage, especially in healthcare, and that helped increase the use of digital currencies like Bitcoin. In this e-guide, learn how to defend against threats like ransomware and cryptojacking and how deception technology can help.

  • Effective Healthcare Data Breach Response

    Sponsored by: Absolute Software Corporation

    Because medical data is so valuable, the FBI has warned that cybercriminals are targeting healthcare providers more than any other industry. Luckily, this white paper outlines 6 steps to effective data breach response. Read on to make sure you have the right plan of action in case of a breach.

  • Amazon healthcare strategy is built on pilot projects

    Sponsored by: SearchAWS

    In this article, learn about Amazon’s healthcare venture known as Haven, and how their entrance into the healthcare sector fits into their broader company goals.

  • The Cost of a Data Breach in Healthcare

    Sponsored by: Absolute Software Corporation

    Today’s healthcare organizations are facing constant threats from hackers attempting to steal PHI. Security teams are tasked with protecting patient data while facilitating an increasingly mobile workforce. In this white paper, take a closer look at the threats within the healthcare industry by reviewing some unfortunate breaches.

  • Zoom Customer Testimonial: Moffitt Cancer Center

    Sponsored by: Zoom Video Communications

    Moffitt Cancer Center’s mission is simple: contribute to the prevention and cure of cancer. Whether it’s Zoom Meetings or Zoom Rooms or Zoom-enabled operating rooms, Moffitt uses Zoom as its communications backbone to enable doctors, nurses, specialists, and labs to easily collaborate. Watch this short video to learn more.

  • Case study: Across Health Care’s Experiencing Working with Mitel

    Sponsored by: Mitel Networks Limited

    Across Health Home Care needed a phone system that would allow communication between coworkers and patients. In this short video, listen as Jessica Reva, CEO and Administrator of Across Health Home Care, discusses their experience using Mitel.

  • Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.

  • How Video is Shaping the Future of Telemedicine

    Sponsored by: Pexip

    As healthcare organizations embrace modern workplace trends, they need flexible collaboration tools that meet their needs both today and tomorrow. In this white paper, learn about the benefits and challenges of modern video conferencing technologies in the healthcare industry.

  • ThreatQ for Critical Infrastructure

    Sponsored by: ThreatQuotient

    Critical infrastructure attacks can have long-term impacts on vital industries like power, healthcare, defense, food production and more. In this edition of ThreatQuotient’s Industry Brief, take an in-depth look into the challenges and key statistics surrounding critical infrastructure security.

  • Computer Weekly – 21 January 2020: How to avoid becoming the next Travelex

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at the lessons learned from the ransomware attack on Travelex and how other firms can avoid the same fate. As Microsoft ends support for Windows 7, we examine the issues for the many remaining users of the operating system. And healthcare CIOs explain the tech challenges facing the NHS. Read the issue now.

  • ThreatQ for Healthcare

    Sponsored by: ThreatQuotient

    The personal health information that healthcare providers process and store make them enticing targets for hackers. The average cost of a data breach over the past 2 years is $2.2 million, and the number of attacks is increasing rapidly. Read this white paper to uncover key cybersecurity insights for the healthcare industry.

  • How UHS Identifies Root Cause and Prevents Clinician Experience Issues Across Cerner RHO & Citrix

    Sponsored by: Goliath

    Watch this brief video to find out how Joe Alexander, Sr. Software Architect at UHS Healthcare, helped the hospital face network and application availability issues head on with Goliath Technologies’ Application Availability Monitor, and explore the benefits they achieved post-implementation.

  • Computer Weekly – 26 November 2019: Why thousands of IT contractors face 'life-changing' tax bills

    Sponsored by: ComputerWeekly.com

    In this issue of Computer Weekly, we investigate HMRC's loan charge policy, a retrospective tax grab that has left thousands of IT contractors facing financial ruin. We compare the cloud storage offerings from AWS, Microsoft and Google. And we find out how retailers are turning to tech to deal with a new generation of shoppers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.