Skip to main content
 

protect

Results 1 - 25 of 2801Sort Results By: Published Date | Title | Company Name
Published By: HealthLeaders Media     Published Date: Apr 14, 2016
Nearly six years after passage of the Patient Protection and Affordable Care Act, the healthcare industry is in the midst of a massive retooling that is dramatically altering the way we think about cost management, strategic partnerships, and customer service. Fee-for-service reimbursement is giving way to new models of care delivery and payment to support a system based on pay-for-value. With financial risk or payments tied to value measures (such as patient satisfaction, clinical performance, and population health), compensation and reimbursement will increasingly be tied to value-based incentives.
Tags : 
    
HealthLeaders Media
Published By: Truven Health Analytics     Published Date: Oct 01, 2014
The tax on high-cost health plans, which are often referred to as Cadillac plans, is expected to impact a considerable share of the plans provided by healthcare organizations for their own employees, as much as 39% by 2020. The implications are significant because the excess-benefits tax requires the employer to pay 40% on the value of the portion of the plan that exceeds thresholds set by the Patient Protection and Affordable Care Act. Employers also need to consider that the tax is measured as a direct function of plan cost, and not actuarial plan value, and that a number of factors can drive excise-tax exposure.
Tags : 
    
Truven Health Analytics
Published By: Capella University     Published Date: Oct 23, 2015
Registered nurses, with targeted training, are the secret weapon in the race for comprehensive care coordination. Accountable care organizations. Patient-centered medical homes. Value-based reimbursements. Bundled payments. Healthcare is experiencing a revolution brought on by the Patient Protection and Affordable Care Act that aims to put patients squarely in the middle of all their clini­cal and financial decisions. Payers, including government agencies and insurers, are tying the quality and safety of patient care to reimbursements, making patient-centered care a necessity in all settings.
Tags : 
    
Capella University
Published By: Hewlett Packard Enterprise     Published Date: Feb 05, 2018
As businesses plunge into the digital future, no asset will have a greater impact on success than data. The ability to collect, harness, analyze, protect, and manage data will determine which businesses disrupt their industries, and which are disrupted; which businesses thrive, and which disappear. But traditional storage solutions are not designed to optimally handle such a critical business asset. Instead, businesses need to adopt an all-flash data center. In their new role as strategic business enablers, IT leaders have the responsibility to ensure that their businesses are protected, by investing in flexible, future-proof flash storage solutions. The right flash solution can deliver on critical business needs for agility, rapid growth, speed-to-market, data protection, application performance, and cost-effectiveness—while minimizing the maintenance and administration burden.
Tags : 
data, storage, decision makers, hpe
    
Hewlett Packard Enterprise
Published By: Excellus BlueCross BlueShield     Published Date: Aug 29, 2017
Learn how to protect your employees and your bottom line from poor oral health.
Tags : 
dental health, dental care, dental insurance, dental benefits, medical benefits, employee benefits, health insurance, employee health insurance
    
Excellus BlueCross BlueShield
Published By: Excellus BlueCross BlueShield     Published Date: Sep 28, 2017
Learn how to educate your team about HDHPs and protect your bottom line from high health care costs.
Tags : 
health plan, employee benefits, health benefits, employee healthcare, healthcare plans, hdhp, high deductible health plan
    
Excellus BlueCross BlueShield
Published By: Oracle ZDLRA     Published Date: Jan 10, 2018
Traditional backup systems fail to meet the database protection and recovery requirements of modern organizations. These systems require ever-growing backup windows, negatively impact performance in mission-critical production databases, and deliver recovery time objectives (RTO) and recovery point objectives (RPO) measured in hours or even days, failing to meet the requirements of high-volume, high transactional databases -- potentially costing millions in lost productivity and revenue, regulatory penalties, and reputation damage due to an outage or data loss.
Tags : 
data protection, backup speed, recovery, overhead, assurance, storage, efficiency, oracle
    
Oracle ZDLRA
Published By: Group M_IBM Q1'18     Published Date: Feb 01, 2018
Client-ready, globally applicable, a document setting out the IBM journey to GDPR Readiness
Tags : 
gdpr, compliance, data protection, personal data
    
Group M_IBM Q1'18
Published By: Aflac     Published Date: Mar 15, 2013
Every day, heart health has a significant impact on businesses. Consider steps to build a healthier workforce with three important ways your company can protect heart health.
Tags : 
    
Aflac
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Mimecast     Published Date: Jan 05, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast
Published By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : 
software provider, cloud service provider, gdpr
    
Mimecast
Published By: Mimecast     Published Date: Nov 28, 2017
Does your organization have a plan for complying with the European Union’s General Data Protection Regulation (GDPR)? If email isn’t a part of that plan, you could face significant challenges, including severe financial penalties. Download now to get the facts about: • Why you can’t compromise when it comes to protection of email data • The challenges presented by Subject Area Requests • How noncompliance could cost your organization more than just money
Tags : 
gdpr, email compliance, data protection, compliance
    
Mimecast
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016.
Tags : 
    
Carbonite
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Are you up-to-speed with the latest trends in mobile and Internet of Things (IoT) application security testing? Our recent Ponemon Institute study reveals key findings about organizations' ability to protect their mobile and IoT apps. Read our report to learn how well you stack up against your peers in securing your most critical mobile and IoT applications.
Tags : 
iot, ponemon institute, mobile application security, application security
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Keeping sensitive data secure in the age of Cloud computing. Learn how IBM Security Guardium helps protect your data with scalable monitoring and protection in all kinds of cloud and hybrid cloud environments.
Tags : 
protecting data, ibm security, guardium, cloud enviornments, hybrid cloud enviornment
    
Group M_IBM Q1'18
Published By: Group M_IBM Q1'18     Published Date: Jan 17, 2018
IBM Security Guardium tools can be the cornerstone of an enterprise’s compliance initiative for GDPR personal data protection requirements.
Tags : 
gdpr, compliance, data protection, personal data
    
Group M_IBM Q1'18
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Jamf     Published Date: Jan 18, 2018
For decades, organizations built “walls” around their company and leveraged network perimeters as the first line of defense. But as workspaces have become more fluid, the security perimeter has changed. The concept of creating a network and protecting it by firewall may not be enough. It’s time to rethink a traditional, perimeter-based security model.
Tags : 
    
Jamf
Published By: Mimecast     Published Date: Jan 19, 2018
Any digital device or application can be a vector for a cyberattack, but email is an especially acute problem for many organizations. As individuals or members of organizations, most people rely on email to communicate with colleagues, whether in the next cubicle or across the globe. For many in the business world, 24/7 access to email is routine, and often required. Instant, ubiquitous and inexpensive communication gives us quick access to others in our business and personal lives, but gives criminals easy and direct access to us as well.
Tags : 
phishing, email threats, cyberattack, email protection
    
Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.