Architecting for HIPAA Security and Compliance on Amazon Web Services

November 22, 2018

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) applies to “covered entities” and “business associates.” Covered entities include health care providers engaged in certain electronic transactions, health plans,and health care clearinghouses. Business associates are entities that provide services to a covered entity that involve access by the business associate to Protected Health Information (PHI), as well as entities that create, receive,maintain, or transmit PHI on behalf of another business associate.

Spotlight

PERFORMANCE Technologies S.A.

Performance Technologies provides IT solutions for virtualization, cloud, storage, disaster recovery, business continuity, security and ITSM. We also provide technical, as well as professional/consulting services in our areas of expertise.

OTHER WHITEPAPERS
news image

VMware workspace one is a better choice than Citrix

whitePaper | November 14, 2019

The intended audience for this paper is IT decision makers and line-of-business owners that are tasked with transitioning their workforce into a modern place of work—the Digital Workspace. According to Gartner, “The digital workplace enables new, more effective ways of working; raises employee engagement and agility; and exploits consumeroriented styles and technologies.” The insights presented here will be helpful for executing a digital workspace transformation strategy.

Read More
news image

SD-WAN for Manufacturing

whitePaper | June 20, 2022

As demand for goods peaks, supply chain instability and labor shortage are forcing manufacturers to become more efficient and find new ways to maximize productivity. Manufacturers are accelerating their path to digitalization or Industry 4.0, to improve automation and be more competitive. Additionally, with the digitalization of their operations, manufacturing companies are increasingly moving their applications to the cloud for more agility and to enable their employees to work-from-anywhere. The number of IIoT (Industrial Internet of Things) devices is skyrocketing, while IT and OT (operational technology) networks are converging, raising concerns about cybersecurity risks.

Read More
news image

Virtualized Networks and Real Risks: Best Practices for Securing Network Function Virtualization Environment

whitePaper | October 3, 2022

Network Functions Virtualization (NFV) is unleashing fundamental innovation in the way organizations buy, deploy, and operate network infrastructures. By leveraging open standards and commodity hardware, NFV delivers cost savings, enhanced flexibility, improved performance, and more. However, without the right safeguards, organizations can also see their vulnerabilities increase when they move to a Virtualized Network Functions (VNF) architecture. This white paper offers a detailed look at the unique security implications of adopting NFV approaches, and it provides a number of best practices to employ to ensure sensitive data and transmissions remain secure in these environments.

Read More
news image

The Rise of SD-WAN -Time to Cross the Chasm

whitePaper | September 13, 2022

Over the past years, the global SD-WAN market has experienced rapid growth, reaching a value of around $1B in 2018 according to analysts at Global Markets Insights. Driven by the demand for cost effective WAN management solutions, the increasing adoption of cloud technologies, the need for simplified network architecture, end-to-end network security and visibility, the market is forecast to grow at over 30% CAGR through to 2025

Read More
news image

Why improved VDI UX makes good business sense

whitePaper | May 31, 2021

Read this paper for three ways that GPUs can add value to your virtualized as well as stories from customers about how their businesses have benefited from GPUs.

Read More
news image

NSX-T Data Center Installation Guide - VMware NSX-T Data Center 2.4

whitePaper | February 28, 2020

In the same way that server virtualization programmatically creates and manages virtual machines, NSXT Data Center network virtualization programmatically creates and managed software-based virtual networks. With network virtualization, the functional equivalent of a network hypervisor reproduces the complete set of Layer 2 through Layer 7 networking services (for example, switching, routing, access control, firewalling, QoS) in software. As a result, these services can be programmatically assembled in any arbitrary combination, to produce unique, isolated virtual networks in a matter of seconds.

Read More

Spotlight

PERFORMANCE Technologies S.A.

Performance Technologies provides IT solutions for virtualization, cloud, storage, disaster recovery, business continuity, security and ITSM. We also provide technical, as well as professional/consulting services in our areas of expertise.

Events