Dashboard

Find Content

Related Content

Active Tags

  • 17 Results
  • Items Per Page

Securing the Cloud for Healthcare Organizations

An overview of cloud security issues facing healthcare organizations and Intel® Technologies for securing the healthcare cloud

Preview | Download

Threat Protection for Medical Devices

White Paper: Layered security on mainstream IT platforms delivers better threat protection, reducing support burden and increasing scalability.

Preview | Download

Encrypt Healthcare Data Using Intel® Xeon® Processors

White Paper: Epic Systems Corporation’s EHR reporting solution shows Intel-based hardware security reduces healthcare data encryption overhead.

Preview | Download

Data Center Consolidation Reduces Energy Consumption and Costs

Case Study: DHCS virtualizes on Intel® Xeon® processor E7-4800 product family, achieving 100-to-1 data center consolidation for reduced energy, TCO.

Preview | Download

Intel® Trusted Execution Technology Enables High-Performance Cloud

Case Study: DuPont builds private cloud infrastructure using Intel® Trusted Execution Technology to support growth and increase data center security.

Preview | Download

HackensackUMC Accelerates ROI for Epic and Cache* Databases

Case Study: HackensackUMC standardizes databases on an Intel®-based virtualized environment for performance and scale to reduce TCO and speed ROI.

Preview | Download

Intel Healthcare IT Encryption Solutions

Solution Brief: Intel Healthcare IT discusses a practical, multilayered solution organizations can use to achieve a privacy and security practice.

Preview | Download

Improving Healthcare Risk Assessments to Maximize Security Budgets

Healthcare organizations are recognizing risk assessment as a practical tool and best practice for indicating when privacy, security is good enough.

Preview | Download

Healthcare Computing in the Cloud

Intel Infographic: Healthcare Computing in the Cloud

Healthcare Information Privacy and Security

Intel-based technologies can support the need for compliance with the HIPAA privacy and security rule and other local regulations