> Health IT Security White Papers

Health IT Security White Papers

Health IT Security, HIPAA, Health Information Exchange Security White Papers

Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. With ExtraHop, the IT team at Seattle Children’s accelerated more »

McKesson Managed Services deployed ExtraHop to improve its ability to deliver hosted applications to hospitals. With ExtraHop, McKesson identified the root cause more »

Think about the last time your information on systems were down. Patient admissions, medical records, and other data collection on had to more »

Healthcare organizations store vast amounts of healthcare records. What may come as a surprise to some, healthcare records are more valuable to criminals than more »

There’s a lot of buzz about the power of big data to transform healthcare, but many healthcare delivery organizations expect their path more »

Learn all key aspects of a solution including technical requirements, key functionality concerns, and how to determine a vendor’s proven success record more »

In this 1 hour webcast IT professionals at two local hospitals talk about how they’ve used encryption solutions to help provide a “safe more »

With the recent changes to the HIPAA Omnibus Rule, organizations and their business associates must address how they’re compliant and what changes more »

The rise of mobile devices in the workplace, specifically healthcare facilities, has forced providers to look for ways to utilize mobile technology more »

Efficient communication and collaboration amongst physicians, nurses and other providers is critical to the coordination and delivery of patient care, especially given more »

Text messaging via mobile devices has become a general means of communication within our culture and workplace. However, traditional text messaging methods have more »

Evaluating Secure Text Messaging solutions can cause anyone’s eyes to glaze over in dreaded anticipation. But the process doesn’t have to be more »

This webcast concentrates on the HIPAA Omnibus Final Rule’s new requirements for BAs and the changes to business associate agreements (BAAs) that more »

IT professionals need to provide clinicians with an easy, efficient, secure way to access and share patient records and medical files. While more »

Not taking action is not an option in today’s mobile and consumer-driven IT environment. If you ignore the need for mobile access, more »

This IDC Health Insights white paper, sponsored by Imprivata, presents key findings of interviews with three healthcare IT executives at Atlantic Health System, more »

The healthcare sector is adopting enterprise hybrid cloud across the provider, payer, and life sciences segments with the goal of improving the more »

You know VMware as the virtualization company that has been the market leader for the past 11 years. In fact, according to more »

As virtualization continues to mature, organizations look to virtualizing desktop and laptops. Companies such as Citrix continue to improve management features, while service more »

Virtualization provides organizations with many costs savings and significant business agility. Among the most efficient data center operators are service providers, such as more »

Virtualization provides organizations with many costs savings and significant business agility. One virtualization technology that many organizations take advantage of is called virtual more »

Whether your organization has been compliant with the HIPAA Omnibus Rule for months or it’s still shoring up some compliance gaps, there more »

The risks associated with sending Electronic Protected Health Information (ePHI) via unencrypted text messaging are significant, especially given the climate of rising more »

This paper offers guidance for healthcare organizations that are planning for or evaluating their options for ePrescribing for controlled substances. Click here more »

If deployed properly, the right single sign-on (SSO) and strong authentication solution can replace forcing end users to manually enter their names more »


no, thanks

Sign up for our free newsletter and stay up to date with tips and advice on:

  • BYOD
  • Data Security
  • VDI
  • Cloud Security

Our privacy policy