Privacy Resources

Privacy news and support resources, featuring the hottest solutions, technologies and vendors in the Privacy world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Privacy"

Microsoft Introduces the Azure IoT Hub IP Filter

Microsoft
As more businesses turn to the Internet of Things (IoT), security and privacy are often top of mind. Our goal at Microsoft is to keep our customers’ IoT solutions secure. As part of our ongoing security efforts, we recently launched the Security Program for Azure IoT, which provides customers with a choice of security auditors […]

Citrix: Cerner Customers Reach New Levels Of Scalability And Cost Efficiency With Citrix and Nutanix (NASDAQ:CTXS)

Citrix Systems
Drives Reduced Costs, Increased Security In Healthcare By Virtualizing Clinical Applications with Citrix XenDesktop and Nutanix Enterprise Cloud Healthcare IT organizations are tasked with supporting enhanced clinical workflows and have trouble finding the right secure data storage and delivery options for their business. Security, scalability and cost efficiency are top of mind when selecting the […]

Comparing AWS and OpenStack Database as a Service

HP Enterprise
Our company is all about delivering our Tesora Database as a Service (DBaaS) Platform, which is based on OpenStack Trove and can run with Helion OpenStack. Because so many people are familiar with Amazon Web Services (AWS), we often find ourselves having to explain how DBaaS on OpenStack compares to Amazon’s data services like the […]

Citrix Video: Security in the Digital Workspace: Customer Insight

Citrix Systems
As a digital workspace customer says, “security is paramount,” especially in highly regulated industries like healthcare, financial services/insurance, government, law and energy. A Citrix digital workspace empowers IT to address privacy, compliance and risk management priorities without compromising productivity. Citrix Workspace Suite customers provide business mobility on any device and from any location, yet meet […]

Natural Langauage User Interfaces are making their way into useful products

Liquidware
As the desktop virtualization space matures, the main platforms have grown their feature set to include many features that used to require third party software. This has been good for us, because the third party vendors are pushed towards the fringe to find unique solutions to problems that present themselves as opposed to resting on […]

Upgrading SSL certificates should be at the top of your year-end to-do list

ManageEngine
The year is quickly coming to a close, and it’s that time again for IT administrators to prepare a list of tasks to complete before the new year begins. If you are one such administrator, or a webmaster managing public facing websites, here’s an important tip: if any of your websites use SHA-1 (Secure Hash […]

How to unlock your MacBook with your Apple Watch

With MacOS 10.12 (MacOS Sierra), Apple advertised that it will be possible to unlock your MacBook with your Apple Watch. You also need iOS 10 and WatchOS 3. I couldn’t wait to try it out, followed all the steps you could read in various articles online but I just didn’t get it to work. I […]

The Difference Between Covered Entities and Business Associates

LUA
The HIPAA rules apply to all Covered Entities and Business Associates. In particular, the HIPAA Privacy Rule which protects a person’s medical records, gives patients the rights to their health information and outlines and sets restrictions and conditions on the use and disclosure of PHI. It is essential to understand the distinction between a covered entity […]

HIPAA Compliance: A Breakdown of the Security and Privacy Rules

LUA
At a time when information is increasingly maintained and transmitted online or in the cloud, HIPAA compliance is more crucial than ever. It is important for any organization to know what is necessary for them to do in order to comply with HIPAA law and regulations for protecting patient information. HIPAA law was established in […]

In Healthcare Printing, There’s No Room for Error

Tricerat
Healthcare Barcodes Need to Be Accurate Every. Single. Time. That’s where we come in. Barcodes were created to enable accurate, quick data entry and transfer. Barcodes exist on patient records, hospital bracelets, specimens, medications, so what happens when a barcode is rendered ineffective due to printing issues? Patient privacy, institutional security and– let’s not forget […]

VMware Shares Vision for Intelligent Analytics from VMware AirWatch

VMware
VMware is Building AirWatch Into an Intelligent Platform That Will Deliver Smart Recommendations for IT and Businesses Today at Connect 2016, VMware, Inc.(NYSE: VMW), a global leader in cloud infrastructure and business mobility, showcased its progress and continued vision to develop VMware AirWatch® Enterprise Mobility Management™ (EMM) into an analytics platform that delivers IT and […]

VMware Outlines the Future of the Digital Workspace at Connect 2016

VMware
AirWatch moves into a new category of Unified Endpoint Management (UEM), extending EMM with comprehensive cloud-based Windows lifecycle, smart glass and IoT management VMware Workspace™ ONE™ expands support for multi-device BYOD employees and contractors with consumer-simple application support and new continuous access policies Mobile Device Management (MDM) Migration Tool now available to assist customers to […]

Compliance in the Cloud: Data Locality / Residency

HP Enterprise
Data residency is the conversation about where a company’s data specifically resides, and the rules / regulations surrounding what can be done with that data. Data locality is generally the conversation about how data should be stored near to where it is being processed, and often has connotations about performance in the cloud space. It […]

Cisco: Using OpenDNS with Cisco WSA and Splunk for private reporting

Cisco
Sometimes having a effective and innovative solution goes in a confrontation with the local country requirements. Especially when we want to deploy as cloud based security service. Using a cloud security service will one the one hand address quite nicely the need for better security and easy deployment , on the other hand a CxO […]

Visit Our Sponsors

Close