Device Secure RecordWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Device Secure Record returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Endpoint Security
 •   Wireless Technologies and Mobile Computing
 •   Application Security
 •   Wireless Security
 •   Storage Management
 •   Mobile Device Management
 •   Security Policies
 •   Records Management

Related Searches
 •   Cost Device Secure
 •   Device Billing
 •   Device Secure Enterprise
 •   Device Secure Georgia
 •   Device Secure Record Address
 •   Device Secure Record Schemas
 •   Device Secure Record Training
 •   Device Secure Research
 •   Frameworks Device Secure
 •   Indian Device Secure Record
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Applications and best practices to keep your mobile devices secure by SearchSecurity.com

March 06, 2012 - (Free Research)
Uncover best practices for keeping your mobile devices and applications secure. 
(EGUIDE) READ ABSTRACT |

Anywhere, Any Device Secure Access to Enterprise Storage with EMC Atmos and Oxygen by Intel

October 27, 2011 - (Free Research)
This white paper outlines the fundamental steps to take to build a scale-out storage cloud architecture in your enterprise. In addition, this resource offers insights on cloud topology, reducing the learning curve, and much more. 
(WHITE PAPER) READ ABSTRACT |

Anywhere, Any Device Secure Access to Enterprise Storage with EMC Atmos and Oxygen by Intel

October 05, 2011 - (Free Research)
The emergence of cloud computing and increased growth of data has driven new usage models for how storage is used and deployed. This resource defines a scale-out storage cloud reference architecture that can help to simplify the deployment of your first cloud infrastructure. 
(WHITE PAPER) READ ABSTRACT |

6 Reasons Why Software-Based Encryption Doesn’t Stack Up by MXI Security

April 30, 2010 - (Free Research)
Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them by GroupLogic

September 15, 2011 - (Free Research)
Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows. 
(WHITE PAPER) READ ABSTRACT |

Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You by Insight

May 06, 2013 - (Free Research)
Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more. 
(WHITE PAPER) READ ABSTRACT |

Customer Spotlight: The Journey to Fast EMR Access via VMware View “Follow me” Desktops and Walk-Away Security by Imprivata

January 27, 2011 - (Free Research)
Learn about Memorial Healthcare’s latest approach to ensure that its clinicians have fast and secure access to critical patient information. You will learn about secure “follow me” desktops to provide doctors and nurses with patient information at their fingertips - from any workstation or personal device. 
(WEBCAST) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

The 10 “must-haves” for secure enterprise mobility by Citrix

February 28, 2013 - (Free Research)
This whitepaper provides a security framework and evaluator's checklist you can use to make sure you are securing mobile devices and data properly, including the 10 "must haves" for secure enterprise mobility. 
(WHITE PAPER) READ ABSTRACT |

Why Managing Mobility Matters by SAP America, Inc.

January 05, 2011 - (Free Research)
Mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment. 
(WHITE PAPER) READ ABSTRACT |

5 Ways To Secure Removable Media: Which Is Best For Your Enterprise? by WinMagic

March 14, 2010 - (Free Research)
This paper reviews the steps some organizations are taking to draft, implement, and enforce risk mitigation policies for removable media, and how technologies available today, and appearing on the horizon, are helping. 
(WHITE PAPER) READ ABSTRACT |

CIO Perspective: BlackBerry Security by BlackBerry

October 2006 - (Free Research)
In this question and answer session, learn how Dr. John D. Halamka. MD, of the Harvard Medical School, depends on a BlackBerry Solution to keep his patient and student records secure. 
(WHITE PAPER) READ ABSTRACT |

Securing Medical Devices by McAfee, Inc.

May 2012 - (Free Research)
This white paper highlights a centralized, efficient and effective risk mitigation solution for the health care industry. Within, discover how to implement the necessary controls to significantly reduce the potential compromise of sensitive patient information. 
(WHITE PAPER) READ ABSTRACT |

802.1X: Port-Based Authentication Standard for Network Access Control (NAC) by Juniper Networks, Inc.

March 2007 - (Free Research)
This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network. 
(WHITE PAPER) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

The Economic and Productivity Impact of IT Security on Healthcare by Imprivata

May 2013 - (Free Research)
This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Improving Clinician Workflows with One-Touch Desktop Roaming by Imprivata

May 2010 - (Free Research)
The move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both. 
(WHITE PAPER) READ ABSTRACT |

Imprivata OneSign Streamlines Workflows at Augusta Health by Imprivata

June 2013 - (Free Research)
This brief video explores how Augusta Health leveraged a single sign on technology to increase care providers' efficiency while also improving the protection of patients' confidential information. 
(VIDEO) READ ABSTRACT |

Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming by VMware, Inc.

January 2012 - (Free Research)
Learn how to maximize electronic medical records (EMR) user adoption by providing fast, convenient, secure access to EMR data across multiple clients, where and when the clinician requests it. 
(WHITE PAPER) READ ABSTRACT |

American Stock Transfer & Trust Company: A New Plan for Records Protection by Iron Mountain

April 2014 - (Free Research)
The following case study reveals the records management solution that AST used to address its needs around regulatory compliance, secure offsite storage, and proper disposal of data. 
(CASE STUDY) READ ABSTRACT |

How To Secure Electronic Healthcare Records Effectively by HP & Intel®

June 2012 - (Free Research)
This white paper highlights important ways to prevent intrusion and block attacks with a security approach that’s comprehensive, automated, and proactive. That way, your organization can ease the worry of facing hefty financial penalties in the face of a data breach. 
(WHITE PAPER) READ ABSTRACT |

Overcoming the Modern Challenges to Corporate Records Management by Iron Mountain

August 2012 - (Free Research)
In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends. 
(PODCAST) READ ABSTRACT |

The Problem of Enterprise Records Management by EMC Corporation

October 2006 - (Free Research)
This white paper explains how records management solutions can be deployed flexibly and cost-effectively across the enterprise to meet the full spectrum of records management needs. 
(WHITE PAPER) READ ABSTRACT |

How to Effectively Secure Electronic Health Records by HP and Intel

February 2012 - (Free Research)
In the ongoing effort to reach HIPPA Electronic Medical Record (EMR) compliance standards, one of the biggest concerns is security. Download this whitepaper to see how to develop a blanket of security for patients and your reputation through leveraging best practices for automated threat protection! 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts