Hipaa TexasWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Hipaa Texas returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Security Policies
 •   Disaster Recovery
 •   Disk-based Backup & Storage/ RAID
 •   Backup Systems and Services
 •   Endpoint Security
 •   Security Monitoring

Related Searches
 •   Automated Hipaa Texas
 •   Case Hipaa Texas
 •   Comparing Hipaa
 •   Design Hipaa Texas
 •   Hipaa Reporting
 •   Hipaa Texas Georgia
 •   Hipaa Texas Practices
 •   Hipaa Texas Product
 •   Repair Hipaa
 •   Version Hipaa
Advertisement

ALL RESULTS
1 - 25 of 244 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Memorial Hermann Delivers Secure, Reliable Wireless for Mission-Critical Patient Care by Aerohive Networks

March 24, 2014 - (Free Research)
In this case study, learn how Memorial Hermann Health System is benefiting after upgrading to a wireless network. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Texas Tech University Requires Updated Backup & Recovery Software by CommVault Systems, Inc.

January 07, 2013 - (Free Research)
Check out this informative case study to find out which software Texas Tech University implemented to meet their environments needs. 
(CASE STUDY) READ ABSTRACT |

People-Centric Recruitment: Texas Roadhouse's Approach for Building and Preserving Company Culture by Ultimate Software

December 31, 2012 - (Free Research)
This brief case study details how restaurant chain Texas Roadhouse created and preserved a consistent organizational culture – even across multiple locations – and explores the value of the right people-centric recruiting tools. 
(CASE STUDY) READ ABSTRACT |

Robot/ SCHEDULE Enterprise: Improves Quality of Life at Farm Credit Bank of Texas by Help/Systems

October 19, 2009 - (Free Research)
Read this case study to see how FCBT used Robot/ SCHEDULE to connect and coordinate their job scheduling needs across multiple systems. 
(CASE STUDY) READ ABSTRACT |

Case Study: Compellent SAN earns an A+ in ROI for the University of North Texas by Dell Compellent

June 29, 2011 - (Free Research)
UNT needed to deploy a new SAN that could meet the performance, ease-of-management, and cost requirements. In the search for the right solution, they went through an extensive cost of ownership analysis of the competing vendors. Read this Case Study to learn more about the solution they found. 
(CASE STUDY) READ ABSTRACT |

Mastering the Multicore Challenge: An Elegant and Efficient Approach to Exploiting the Power of Parallelism by Texas Multicore Technologies, Inc.

August 26, 2010 - (Free Research)
Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments. 
(WHITE PAPER) READ ABSTRACT |

GeoEnergy Experiences a Seismic Shift in Data Processing Throughput with sTec Enterprise SSDs by sTec | HGST

October 10, 2013 - (Free Research)
In this short case study, discover how a specialized seismic processing company, based in Houston, Texas, deployed innovative enterprise SSD solutions for up to ten-times-faster job performance and consistent, reliable project execution. 
(CASE STUDY) READ ABSTRACT |

Major Healthcare Provider Protects Against Natural Disasters and Ensures 24/7 Desktop Access with AppSense by AppSense

November 17, 2010 - (Free Research)
This video discusses the benefits of desktop virtualization for a number of reasons including its ability to allow employees to access their desktop from anywhere and to ease virtual IT support. 
(VIDEO) READ ABSTRACT |

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye by FireEye

December 31, 2013 - (Free Research)
With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system. 
(WHITE PAPER) READ ABSTRACT |

Strategic Brief – HIPAA by Alliance Storage Technologies

November 23, 2010 - (Free Research)
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) enacted reform and standardization in the healthcare industry to protect patient confidentiality. Continue reading to learn more about the goals of HIPAA. 
(WHITE PAPER) READ ABSTRACT |

Take Back the Endpoint by Kaspersky Lab

February 08, 2011 - (Free Research)
During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495. 
(WHITE PAPER) READ ABSTRACT |

State Agency Boost Security and Reduces Costs with GoToMyPC Corporate by Citrix Online

January 2005 - (Free Research)
The Texas Department of Family and Protective Services gives top priority to securing the information gathered for its investigations and cases. 
(CASE STUDY) READ ABSTRACT |

Dell Protects Cloud-based Desktop Services with On Demand Networking from Vyatta by Vyatta Inc.

February 2011 - (Free Research)
Well known for its PCs and servers, Dell, based in Round Rock, Texas, also offers cloud-based services to enterprises, providing them the technology they need, without the burdens of upfront costs and complex maintenance, through services that feature on-demand scalability. 
(CASE STUDY) READ ABSTRACT |

Disaster recovery planning for HIPAA compliance by HP & Intel®

September 2011 - (Free Research)
The HIPAA Security Rule requires all HIPAA covered entities to create a plan for first protecting and then restoring confidential patient data in the event of a disaster. Unfortunately, HIPAA does not say much about what should go into such a disaster recovery plan. Inside this e-guide, find tips for a compliant disaster recovery plan. 
(EGUIDE) READ ABSTRACT |

Health Care Organization Gets Proactive with Virtual Instruments by Virtual Instruments

November 2010 - (Free Research)
Plagued by frequent unplanned outages in a relatively simple SAN environment, a Texas health care facility turned to Virtual Instruments to provide the requisite insight and visibility for its new, much larger and complex virtualized SAN infrastructure. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

The CIO’s Guide to HIPAA Compliant Text Messaging by Imprivata

December 2013 - (Free Research)
This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation. 
(WHITE PAPER) READ ABSTRACT |

Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization by McAfee, Inc.

March 2010 - (Free Research)
This document takes a look at several aspects of data protection and HIPAA compliance and explains how a Data Loss Prevention (DLP) solution can help IT professionals discover sensitive data at rest, monitor traffic in real time, and capture events for after-the-fact investigations. 
(WHITE PAPER) READ ABSTRACT |

How to select a KVM over IP system to assist with HIPAA compliance by Avocent

February 2008 - (Free Research)
Effective security for health care information requires a multi-layered approach. Physical, logical and operational security are essential ingredients for successful compliance with HIPAA. 
(WHITE PAPER) READ ABSTRACT |

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 2009 - (Free Research)
SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements. 
(WEBCAST) READ ABSTRACT |

Essential Guide to Solid-State Storage Implementation Choices by SearchStorage.com

September 2011 - (Free Research)
This expert e-guide details what you need to know about solid state storage, including pros and cons, case studies, vendor information, and more. 
(EGUIDE) READ ABSTRACT |

Storage Magazine June 2010: Solid State vs. Disk by SearchStorage.com

June 2010 - (Free Research)
The June 2010 cover story of Storage magazine provided insights on where solid state makes sense in today’s storage environments. This month’s issue also reveals the winners of our latest Quality Awards survey for backup and recovery software, best practices from W. Curtis Preston for backing up Microsoft SharePoint and much more. 
(EZINE)

Construction Firm Integrates Business Systems with Comprehensive Solution by Microsoft Dynamics

June 2008 - (Free Research)
Over the years this facility services and specialty construction firm (HVAC, electrical, plumbing and other building systems) has extended their ERP system to 500 employees, helping the company become one of the "100 Best Companies to Work For". 
(WHITE PAPER)

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study by Sybase, an SAP company

November 2010 - (Free Research)
This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence. 
(WHITE PAPER) READ ABSTRACT |

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops by Red Hat and JBoss

October 2009 - (Free Research)
This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility. 
(WHITE PAPER) READ ABSTRACT |

On-Demand Hosting Provider SoftLayer Relies On Adaptec by Adaptec, Inc.

October 2009 - (Free Research)
When On-Demand Hosting Provider SoftLayer needed a single provider of SATA/SAS who offered the flexibility they needed, they turned to Adaptec. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 244 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts