Electronic Health Records

IT Security Resources

Case Study: Nemours Embraces App Innovation With MobileIron

Read this case study to find out how Nemours, an internationally recognized children's health system, implemented the MobileIron platform to secure and manage hundreds of devices including iPhones and iPads. Due to the success of the program,... Download white paper

Fast, Secure Access to PHI and Seamless EPCS at Peninsula Regional Medical Center

View this webinar to learn how Peninsula Regional Medical Center (PRMC) leverages strong, multifactor authentication to help unlock the full potential of their EMR. Utilizing solutions that are purpose-built for healthcare, PRMC delivered clinicians... View webcast

Building the Business Case for Moving Healthcare Data to the Cloud

As healthcare reform continues to put new pressures on hospitals and physician providers, savvy organizations are quickly turning to cloud computing services to gain competitive advantages. Cloud-based tools can enable a wide range of innovative... Download white paper

Navigating the Evolving Threat Landscape With a More Complete Approach to Network Security

Today, targeted attacks are the weapon of choice: a far more lucrative tactic that uses malware purpose-built to bypass defenses and penetrate the network of a single organization. This tailored approach makes each targeted attack unique, using... Download white paper

How the Hybrid Cloud Changes the Game for Security

This paper examines the dynamics of the hybrid cloud and the challenges introduced at both the business and technical levels. It also outlines how Deep Security, powered by XGen™, helps to address many of these real-world problems in ways... Download white paper

Hybrid Cloud Has Transformed the Datacenter

This Technology Spotlight highlights how hybrid cloud architectures, underpinned by the growth of cloud computing and virtualization, has transformed the way organizations should view server security. Download white paper

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity. This evolution of advanced threats overwhelms both IT organizational bandwidth and the capabilities of legacy antivirus tactics, particularly... Download white paper

Securing Agility: Best Practices for Harnessing and Securing Hybrid Clouds

This white paper explores both the business and technical dimensions of hybrid cloud security with an optimistic perspective of treating the journey to the cloud as an opportunity to improve one’s security posture. Download white paper

Four Countermeasures to Protect Against Ransomware

By now, not only security professionals, but also many knowledge workers and consumers are well aware of the insidious nature of ransomware. As its name implies, ransomware is malicious software that holds data files hostage pending the payment... Download white paper

HIPAA Compliant Hosting e-book for IT Infrastructure Managers

This e-book is essentially a Mega-Guide on HIPAA, the Health Insurance Portability and Accountability Act of 1996. First, we take a broad look at the basics of HIPAA; the roles of covered entities and business associates; and the related issue... Download white paper

Making a Secure Mobile Environment Work for Clinicians

Healthcare organizations continued to incorporate mobile devices into daily operations to connect clinicians with patient health data at a growing number of care sites. The increased number of smart devices accessing health data, applications,... View webcast

Securing Cloud Access in Healthcare

Healthcare organizations are increasingly moving to the cloud. These organizations need a scalable, agile foundation to manage apps and secure highly sensitive patient data. In this whitepaper, we will explore the benefits of cloud identity for... Download white paper

Techniques for Dealing with Ransomware, Business Email Compromise, and Spearphishing

Ransomware alone cost organizations an estimated $1 billion in 2016, up from $24 million in 2015 and there is no end in sight for 2017! Ransomware, business email compromise, and spearphishing are serious problems that can steal your data, intercept... Download white paper

Positive Identification Every Time: How to Manage Identities and Authentication Pathways

Increasing cybersecurity risks, patient identity fraud, and patient misidentification are threatening EMPI integrity and hospital revenue. So how can healthcare organizations effectively manage patient and provider identities and authentication... View webcast

The Phishing Breakthrough Point

Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place to effectively gauge the click rate patterns from a... Download white paper

Study Results: High-level IT Security Concerns in Healthcare

This study represents the findings based on 125 respondents. Find out how this diverse group of participants rated high-level IT security concerns including security breaches, security awareness, implementation of mitigation techniques and future... Download white paper

Infographic: The Healthcare Infosec Bug You May Not Know you Have

As healthcare becomes more digitized and the threat landscape evolves, investing in security solutions that protect valuable data and ensure infrastructure performance is vital to maintaining continuity of care. Download white paper

What Every Healthcare Executive Needs to Know About Identity and Access Management (IAM)

Economic and regulatory challenges are affecting how providers and payers are able to care for patients. New technologies are critical to enabling the transition from transactional care to long-term patient relationships; however, on-boarding... View webcast

Supporting Clinician Mobility and Ensuring Data Security

Clinicians enjoy the ease of use their mobile devices afford them to access and use relevant health data at the point of care as well as coordinate care with other members of the care team. To support mobile preferences of clinicians, healthcare... View webcast

Study Results: Email Vulnerability in Healthcare

In a recent study to understand Dark Web email vulnerabilities, Evolve IP and ID Agent reviewed over 1,000 healthcare industry organizations. The findings? 68% of all analyzed covered entities and their business associates have employees with... Download white paper