Electronic Medical Record infrastructure readiness

Size: px
Start display at page:

Download "Electronic Medical Record infrastructure readiness"

Transcription

1 healthcare Electronic Medical Record infrastructure readiness An extended outage of an EMR system has far-reaching implications for patient care and safety as well as operations. An often-overlooked aspect to implementing an Electronic Medical Record (EMR) system is the need for a solid, medical-grade technical infrastructure, and operational readiness. An extended outage of an EMR system has far-reaching implications for patient care and safety as well as operations. For example, in 2009 a system failure shut down the Veterans Affairs North Texas Healthcare System clinical records system for 23 hours at two hospitals and eight outpatient clinics in the Dallas area. For six hours, clinicians had no access to patient records while technicians activated a read-only backup system, and users still had to document interactions on paper until the full system came back online. The failure was due to two aging drives failing within 1.5 minutes of each other and poor maintenance, according to a report from the VA soffice of Inspector General. i

2 Alarmingly, most healthcare organizations do not have a technical infrastructure that s prepared to adequately handle the needs of an EMR system. The typical state of infrastructure includes spotty wireless coverage, poorly maintained servers, inadequate bandwidth, insufficient space and environmental controls in the data center, insufficient security and redundancy, and poor operational management. Unfortunately, many organizations face significant cost to upgrade their technical infrastructure, which results in some healthcare organizations attempting to implement the EMR system while maintaining the inadequate infrastructure. This can only lead to significant issues and failures. Any healthcare organization planning for the implementation of an EMR system should consider the following questions: Is the IT environment ready for an EMR implementation? Does the organization have a plan for identifying the gaps in of its IT infrastructure? Can the data network provide secure mobile access? Can the organization adhere to regulatory compliance mandates such as the Health Insurance Portability and Accountability Act (HIPAA)? The challenges for a health care Chief Information Officer (CIO) or Chief Technology Officer (CTO) are many: providing a 24/7, high-availability network; accommodating fluctuating workloads and wireless devices; supporting the Technology readiness Authentication / authorization Medical grade network Security infrastructure Back-up/recovery Technology standards Business intelligence Service desk tools & process Monitoring Certificate management HIPAA Security Rule mandates for the administrative, physical and technical security of an EMR; and meeting other technology and operational requirements specific to health care. So where does one start in designing such an infrastructure? Below is a list of some technology and operational resources that an organization should be assessing as part of their EMR implementation readiness with some recommended mitigation activities. Operational readiness Incident management Problem management Configuration management Asset management Change management Capacity management Release management Disaster recovery Business continuity Lifecycle management Alarmingly, most healthcare organizations do not have a technical infrastructure that s prepared to adequately handle the needs of an EMR system

3 Bring your own device (BYOD) The dual concepts of BYOD and anywhere/ anytime access to information require organizations to identify secure ways of supporting the mobile workflow of physicians, nurses, and clinicians. Organizations struggle with maintaining compliance with privacy and information regulations without inhibiting mobility or productivity. Recommendations: Desktop virtualization allows hospitals to meet HIPAA security and compliance requirements by ensuring patient information stays within the confines of the data center. Users log onto the laptop, PC or other device to access the data in a virtual instance. The data itself is never stored or transferred to the local device, so the integrity and security of the data is preserved back in the data center. In the case of loss or theft of an individual device, no data is compromised. Virtualization technology also makes security administration easier and more effective. All software updates and patches are managed centrally, and employees have no way of downloading dubious programs or malware from the Web. Keep in mind that virtualized desktops put a heavy demand on computing, storage, and network resources, so performance monitoring must be ongoing to maintain acceptable service levels. Device messaging Many nurses, clinicians, and physicians continue to use text messaging to communicate electronic patient health information (ephi) between peers and/or with their patients, even though it s not a secure method of communication and is against HIPAA regulations. Text messages are typically stored on a smart phone computer or on the SIM card. IT administrators need to be concerned with such devices being lost or stolen and unauthorized users obtaining access to ephi. Recommendations: Organizations should provide physicians and staff with a device messaging solution that is compliant with federal health privacy rules via an application for secure mobile-originated text messages. These solutions encrypt text messages when they go from device to device. The use of strong authentication to identify a user accessing confidential data is recommended. User authentication and access control As part of HIPAA compliance, healthcare organizations are responsible for controlling the flow of patient data and tracking who s accessing their clinical applications. User authentication and information access control are critical components to HIPAA data security compliance. Both require the implementation of procedures to verify that a person or entity seeking access to ephi is the one claimed and has the credentials required to access patient information. ii Access control has become more challenging with the introduction of an EMR system, as ephi gets downloaded onto desktops, tablets, ipads, phones, USB storage, peripheral storage, and enterprise storage systems and other devices, or transported via or web applications. Any access control solution selected must cover a wide range of scenarios to determine where and how data is being transmitted, used, and stored. Recommendations: The use of strong authentication to identify a user accessing confidential data is recommended. Strong authentication, also called two factor authentication, is defined as two out of the following three proofs of identity: a password, a security token (can be a software token or a physical device) and something unique about a user such as a fingerprint. Using strong authentication provides more protection for sensitive information than a simple username and password can provide. Organizations can implement access control through the use of Lightweight Directory Access Protocol (LDAP) role-based authentication. LDAP directories provide two features needed to authenticate a user of an application. The first feature is single sign-on, which allows a user to sign on once and have all his credentials passed through to other applications for authentication. This eliminates the need to sign in to each application individually. The second feature is role definition. Within the LDAP directory, roles can be defined according to one s job competency, authority, and responsibility, thereby limiting the information that certain users see when they log into an EMR application. Many EMR applications offer their own proprietary authentication tables or password files, but one should check to ensure that they are robust enough to meet HIPAA standards. Many are limited to basic functions, such as being allowed or denied access to the application. Large organizations should consider data loss prevention (DLP) software which provides data leakage prevention for ephi in a file, , packet, or storage device, while at rest, in use or in transit. It does this by monitoring and preventing data leaks, encrypting content, moving material to a secured device and blocking unsecured transmissions. Wireless coverage As the organization moves forward with their EMR planning, it s critical to ensure the infrastructure is able to support any future wireless requirements. EMRs rely upon consistent wireless network connectivity to bring the EMR to the point of care. However, most wireless infrastructures are full of problems, including insufficient coverage for saturation of users; low coverage areas in stairwells, elevators, and cafeterias; and inappropriate mixes of protocols, which impacts performance. Recommendation: Complete a full wireless survey of the facility, covering every location and implement the survey recommendations. If the organization has plans to implement or expand real time location services (RTLS) in the future, it is recommended that the wireless assessment be expanded to include the needs of RTLS.

4 Bandwidth Bandwidth denotes the volume of data that can be transferred per unit of time. Technologies such as picture archiving and communication systems, biomedical devices, voice over Internet protocol, real time location systems, unified communications, video and Internet usage, mobile devices and additional applications that use the infrastructure all impact the facility s bandwidth. The available bandwidth needs to support the amount of data being transferred or the end user will experience a delay, which could prevent appropriate care being provided to the patient in a timely manner. Recommendations: Determine what bandwidth requirements are needed, and what standards need to be applied to the facility so that the EMR system is sufficiently supported. Work with your vendor to model the required network bandwidth and then increase it (some would recommend doubling it). Consider upgrading the data network core so you have a scalable, high performance infrastructure to account for growth for end user mobility and emerging technologies in the next few years. Determine how much bandwidth is needed at the desktop for the wired infrastructure. For most applications today, CAT 5e wiring works well; however CAT 6 wiring should be considered for future applications. Provide a secure, dual-channel wireless network that will give physicians and employees secure wireless LAN connections while dedicating a certain amount of bandwidth for patients or guests who want to log on while they re in the facility. It is also important to provide a service loop in the cabling that serves a wireless access point (WAP). That way, if the WAPs need to be moved to fill coverage, there is extra cable length to accommodate the move. Server virtualization Virtualization allows you to consolidate multiple virtual storage resources into one physical server. Consolidating servers reduces the total number of physical servers the organization needs, which in turn reduces physical space demands and energy consumption and increases IT capacity. Any access control solution selected must cover a wide range of scenarios to determine where and how data is being transmitted, used, and stored. The host server allocates resources based on business rules and demand, protecting against hardware failures and leading to improved disaster recovery. Other benefits include improved application performance, streamlined management, and more consistent security controls. There are several clinical systems that cannot be virtualized: picture archiving and communication systems most cardiac-angioplasty procedure systems fetal monitoring systems can be run on standard PCs and laptops but vendors are not encouraging virtualization, perhaps due to liability issues 3-D imaging systems, as they are vendormanaged and should not be virtualized applications that have a lot of SQL queries or are at 70% utilization lastly, the U.S. Food and Drug Administration requires some applications to be on a specific, physical hardware platform Recommendations: Proper planning is the key to successfully implementing a virtual server environment. Complications can arise if the IT infrastructure doesn t have enough memory, CPU or other resources to support server virtualization technology. iii While both physical and virtual servers require ongoing monitoring and calibration, provisioning and configuring a virtual server can be more difficult because virtual servers have more dynamic characteristics and more complex interactions than physical servers do. Experts caution that healthcare organizations may have limited expertise in setting up a virtual server environment and may want to bring in an experienced company to assist with this effort. iv Growth in storage demands A survey undertaken by Forrester Consulting indicates that EMRs and diagnostic imaging systems are the primary sources of growth in storage demand. Beyond images, healthcare organizations also require the capacity to store and quickly access lab results, patient vitals, orders, notes, and medication data. In addition, patient information that is rarely accessed will require archival storage that is secure, scalable and affordable. v Recommendations: Hospitals are increasing their use of storage area networks (SAN). A SAN is comprised of storage devices connected over a high speed optical network used to move data among the various storage devices. Data can be stored and accessed quickly, and because the servers and storage devices all have redundant connections, data remains available during a server failure. Storage represents a significant portion of IT spending, and this trend will continue, so it s wise to utilize an appropriate mix of high and low performance storage. Forrester recommends that a good best practice baseline is around 20% highperformance Tier 1, 40% mid-performance Tier 2, and 40% low-performance Tier 3 or archival storage, but this can vary significantly based on the workloads being served.vi The Forrester report also states that media mix decisions start with an understanding of the requirements of the workloads in performance terms. This understanding can come from reporting and analytics tools that identify bottlenecks or over-configuration in terms of performance.

5 Power source An EMR system is dependent on the 24/7 operation of servers and both wired and wireless network infrastructure, even when utility power fails. Recommendations: Power to all EMR components, infrastructure, and any related systems should be on the emergency power source. In the case of a multiple generator site with paralleling switchgear and load shedding, the automatic transfer switch serving the EMR loads should have a higher, rather than lower, load priority. Each network closet should be powered by non-associated, separate LC emergency power. An uninterruptible power supply (UPS) should be considered for server and network equipment, including wireless network access points that are used for wireless access to EMRs. Desktop-related stations tied to EMR should also be on emergency power. Cooling The eventual number of servers planned for the data center can increase quickly when an EMR system is implemented. Each system and its interface to EMRs might consist of dedicated servers. For example, some systems require separate interface servers for admission, discharge, and transfer system, another for communications interface with VoIP, texting and personal communicators. Mechanical equipment that cools the IT rooms serving EMR servers and network infrastructure must work in order for the EMR to be available. Recommendations: Plan for space and increased HVAC requirements to support the increase in servers. Loads can be minimized by installing a small process cooling loop with redundant equipment. This way, the load can be confined to cooling critical equipment. Since the load is smaller, it also makes it more feasible to put this process cooling loop and its equipment on emergency power. The cooling equipment should have a high load shedding priority on emergency power. Service disruption Typically, hospital campuses have fiber infrastructure coming into the campus from a service provider. The fiber-based core network can support files of any size and the future needs of the organization. It would be unusual if the fiber infrastructure were under the hospital s influence once it left the hospital property; therefore the risk of service disruption is not within the hospital s control. Service disruption can also occur with the internal fiber distribution within network closets. Vertical distribution of data occurs between floors through the network closets. Failure or disruption of the vertical data path is possible due to numerous reasons. Recommendations: The best way to mitigate service disruption associated with the fiber infrastructure is to design the network to be route-diverse and have redundant fiber lines running to and from every key point of presence - consider multiple service providers for your institution. This is easier to do in developed metropolitan areas, as there are usually multiple vendor choices for site connectivity. In less developed areas, alternatives such as redundant lines from a single provider coming from different routes to the hospital can be implemented. To reduce network closet service disruptions, design redundant vertical data pathways that are physically separated from each other so that if one loop fails, there s no disruption in service for EMR or other data applications. This can be accomplished by running the data loops in the same closet but with some separation, or by running them in different areas of the hospital. Network closets In the past, network closets were rarely planned in the design of a building. Core network closets should not be closets and their location should be secure. Many of today s network closets don t meet the standards for data communication rooms or telecommunications rooms (DCR/TRs). Recommendations: A DCR/TR should meet the minimum requirements of the ANSI/TIA/EIA-568-B standard. Each closet should be powered by non-associated, separate LC emergency power. In the event of one room having any type of failure, the other rooms can manage the network load. This type of basic core design allows maintenance to be performed on the network equipment without taking out the entire network. Service disruption can also occur with the internal fiber distribution within network closets.

6 Equipment failure An EMR system supports patient care and if it goes down, patient care is severely impacted. The challenge for IT is to ensure that the end user retains access to EMRs even in the case of an equipment failure. Recommendations: One of the key elements associated with EMR readiness planning is redundancy. Implementing multiple levels of system redundancy stops single points of network failure between any individual user and the EMR application: vii Mesh the network access for each department across multiple network switches. Buy redundant EMR database servers that will continue to work even if the main EMR server fails. Cluster all production environments to allow for one cluster to be down without affecting the other cluster(s). Mirror all data in real time to a second hot data center running a duplicate instance of the production environment for the sole purpose of disaster recovery. Complete data backups to a disk library. Complete data backups to tape and store the tape offsite. Have surplus hot routers available. Implement a distributed read only contingency system that allows providers to view static medical records. This data can be viewed online or printed and distributed. If it is to be viewed online then contingency computers need to be identified. Business continuity plans A business continuity plan is needed to ensure the business can continue operations in the event of a disaster. This includes keeping the business running, recovering lost data, testing of backup procedures and replacement of equipment. It encompasses a coordinated strategy that involves plans, procedures, and technical measures to enable the recovery of systems, operations, and data after a disruption. HIPAA calls for organizations to maintain three separate plans related to disaster recovery. A data backup plan that focuses on procedures for creating and maintaining backups of electronic protected health information. A disaster recovery plan that documents the inventory of all critical data and vital systems and the procedures used to restore data to facilitate the recovery of capabilities at an alternate site in the event of fire, vandalism, natural disaster, or system failure. An emergency mode operations plan that details how the organization will continue to operate after a disaster, such as a fire or flood. The infrastructure to support an organization s business continuity and disaster recovery plan can take on different features depending on the business drivers. Recommendations: The infrastructure to support an organization s business continuity and disaster recovery plan can take on different features depending on the business drivers. The National Institute of Standards and Technology recommends following seven key steps to address the requirements of contingency planning viii These seven key steps for contingency planning are: Develop the contingency planning policy statement. Conduct the business impact analysis. Identify preventive controls. Develop recovery strategies. Plan testing, training, and exercises. Plan maintenance. A CIO or CTO should not underestimate the importance of the processes and technology infrastructure supporting the EMR and clinical applications. The growing adoption of EMR systems and the exponential accumulation of patient data place an increased demand on digital storage. Storage solutions will be critical for managing the increase in data, and virtualization of servers, storage and clients will be necessary in order to maximize the performance and efficiency of IT investments. The compliance and security issues surrounding ephi require the implementation of new policies and procedures and access control solutions that encompass a wide range of scenarios to manage who is accessing what data and how it s being transmitted, used, and stored. The need for 24/7 access to patient data necessitates resiliency and redundancy in the infrastructure.

7 Infrastructure assessments covering the data center, networks, endpoints, desktop storage and virtualization, and the development of an upgrade plan should be performed prior to, or concurrently with, the EMR vendor selection process. Our final recommendation is to engage a vendor experienced in EMR infrastructure readiness and medical grade networks to provide an experienced perspective to the assessments and subsequent plans. Core storage / fabric / virtualization Application delivery Desktop virtualization framework Client access VmWare MS servers OLTP Production/Replica Cache shadow 3rd Party System Relay server Print server SAN storage Replication Cache or SAN SAN storage VmWare ETL VMWare view EHR applications Citrix XenApp Web servers Authentication Disaster recovery OLAP Reporting shadow RDBMS Business objectives Enterprise servers VmWare Virtualization Midrange Virtualization MS servers Relay server BLOB Print server Comm/Proxy Interconnect OLTP Production Training Failover QA Development Authentication VmWare Virtualization VmWare view Citrix XenApp Web servers SSO EHR application Output Printers Customer printers Clients (BYOD) Thin client Terminal client Tablet Laptop Smartphone Workstation Browser Data Center Data Center LAN WAN Wireless / LAN Clinical Delivery Network Audit / Security / Compliance Denotes a single clinical payload, dynamic network layering required to isolate traffic styles ( public, business, guest, medical, biomedical ) BYOD: Ability to leverage Multiple Device styles both secured and non secured for clinical content delivery Virtualization Leveraged to replicate engine payloads across portfolio Synchronized for recovery. Core clinical data replicated to meet SLA agreements. i Healthcare Inspection, VistA Outages Affecting Patient Care, Office of Risk Management and Incident Response, VA Office of Inspector General, December 3, 2009, p VAOIG pdf ii (d) Standard: Person or entity authentication. [Federal Register, 68:34, p. 8379] iii Server Virtualization in Healthcare IT, Colin Steele, Senior Site Editor. iv How is Server Virtualization Technology Used In Healthcare?, Staff Contributor. v Opinion Article: Establishing the EMR Infrastructure, Renzo Taal, March 25,

8 Middle East & Africa Asia Australia Europe Americas Algeria Angola Botswana Congo Burundi Democratic Republic of the Congo Gabon Ghana Kenya Malawi Mauritius Morocco Mozambique Namibia Nigeria Oman Rwanda Saudi Arabia South Africa Tanzania Uganda United Arab Emirates Zambia China Hong Kong India Indonesia Japan Korea Malaysia New Zealand Philippines Singapore Taiwan Thailand Vietnam Australian Capital Territory New South Wales Queensland South Australia Victoria Western Australia Austria Belgium Czech Republic France Germany Hungary Italy Ireland Luxembourg Netherlands Poland Portugal Slovakia Spain Switzerland United Kingdom Brazil Canada Chile Mexico United States For contact details in your region please visit dimensiondata.com/globalpresence

White Paper. EMR Infrastructure Readiness. Kathleen Gaffney

White Paper. EMR Infrastructure Readiness. Kathleen Gaffney White Paper EMR Infrastructure Readiness Kathleen Gaffney June, 2012 Introduction An often-overlooked aspect to implementing an Electronic Medical Record (EMR) system is the need for a solid, medical-grade

More information

We d Like That on Our Laptops, Notebooks, Tablets and Smartphones, Please

We d Like That on Our Laptops, Notebooks, Tablets and Smartphones, Please latest thinking We d Like That on Our Laptops, Notebooks, Tablets and Smartphones, Please Enabling enterprise mobility with Microsoft System Center and cloud Enterprise mobility is no longer the domain

More information

Software-as-a-service Delivery: The Build vs. Buy Decision

Software-as-a-service Delivery: The Build vs. Buy Decision white paper Software-as-a-service Delivery: The Build vs. Buy Decision Introduction In order to deliver software on-demand, companies must either build and manage an infrastructure capable of supporting

More information

Hybrid Wide-Area Network Application-centric, agile and end-to-end

Hybrid Wide-Area Network Application-centric, agile and end-to-end Hybrid Wide-Area Network Application-centric, agile and end-to-end How do you close the gap between the demands on your network and your capabilities? Wide-area networks, by their nature, connect geographically

More information

How do you manage the brain of the business in a way that supports the opportunities your organisation wants to take advantage of?

How do you manage the brain of the business in a way that supports the opportunities your organisation wants to take advantage of? As the world becomes a more competitive place, businesses need to respond at lightning speed to take advantage of new opportunities or avoid risks. To enable this, the data centre needs to be a dynamic

More information

I can finally afford UC without making a huge upfront investment. COO, market leader in the health care industry

I can finally afford UC without making a huge upfront investment. COO, market leader in the health care industry 1 I can finally afford UC without making a huge upfront investment. COO, market leader in the health care industry 2 Contents 01 Investing in an anytime, anywhere, connected workforce 02 On-premise, hybrid,

More information

Desktop Virtualisation Solutions. Adapting to a new reality in client computing

Desktop Virtualisation Solutions. Adapting to a new reality in client computing Desktop Virtualisation Solutions Adapting to a new reality in client computing Adapting to a new reality Businesses today are increasingly realising not only the inevitability of consumer-owned, mobile

More information

IP Trading Solutions

IP Trading Solutions In many mature financial organisations, middle-and back-office functions already collaborate via high-quality, well-integrated voice and video traffic. Their trading floors, on the other hand, still operate

More information

3 Steps to Transform your Business with Next-Generation Networking

3 Steps to Transform your Business with Next-Generation Networking e-guide The Wireless Revolution 3 Steps to Transform your Business with Next-Generation Networking Welcome to the era of the Wireless Revolution! With easy access to technology, setting up a wireless network

More information

best practice guide Moving Exchange to the Cloud: 5 Really Practical Best Practices

best practice guide Moving Exchange to the Cloud: 5 Really Practical Best Practices best practice guide Moving Exchange to the Cloud: 5 Really Practical Best Practices To successfully replicate your environment, you need a thorough understanding of what it comprises and how it s used.

More information

Flexible Cloud Services to Compete

Flexible Cloud Services to Compete white paper Service Providers Need Flexible Cloud Services to Compete Enterprise Customers Demand Flexible Cloud Solutions When the concept of cloud services first came about, there was a great deal of

More information

best practice guide The Three Pillars of a Secure Hybrid Cloud Environment

best practice guide The Three Pillars of a Secure Hybrid Cloud Environment best practice guide The Three Pillars of a Secure Hybrid Cloud Environment best practice guide The Three Pillars of a Secure Hybrid Cloud Environment Introduction How sound risk management, transparency

More information

Big Gets Bigger, Smaller Gets Smaller

Big Gets Bigger, Smaller Gets Smaller latest thinking Big Gets Bigger, Smaller Gets Smaller The data centre market is entering a period of unprecedented transition. With this shift comes a number of significant and perhaps surprising changes.

More information

Private Cloud for Every Organization

Private Cloud for Every Organization white paper Private Cloud for Every Organization Leveraging the community cloud As more organizations today seek to gain benefit from the flexibility and scalability of cloud environments, many struggle

More information

Dimension Data s Uptime Support Service

Dimension Data s Uptime Support Service Dimension Data s Uptime Support Service As more technology enters the world, and is introduced into organisations, the typical IT environment increases in complexity. Businesses require higher levels of

More information

opinion piece Eight Simple Steps to Effective Software Asset Management

opinion piece Eight Simple Steps to Effective Software Asset Management opinion piece Eight Simple Steps to Effective Software Asset Management Contents Step 1: Collate your licence agreements 01 Step 2: Determine your actual licence position 01 Step 3: Understand your existing

More information

Dimension Data s Uptime Maintenance Service

Dimension Data s Uptime Maintenance Service Dimension Data s Uptime Maintenance Service The pace of business today simply doesn t allow for downtime. When systems go off-line, productivity drops, time and money go to waste and opportunities are

More information

Governance, Risk and Compliance Assessment

Governance, Risk and Compliance Assessment Governance, Risk and Compliance Assessment Information security is a pervasive business requirement and one that no organisation can afford to get wrong. If it s not handled properly, your business could

More information

best practice guide How to measure the real ROI of virtualisation

best practice guide How to measure the real ROI of virtualisation best practice guide How to measure the real ROI of virtualisation In the face of a global economic crisis, the CFO is often found at the helm of the company. This is because IT spending constitutes a significant

More information

Contact Centre Integration Assessment

Contact Centre Integration Assessment Contact Centre Integration Assessment How well are your business objectives aligned with the right contact centre technologies? Knowing how the technology in your contact centre supports service delivery

More information

Cloud Services for Microsoft

Cloud Services for Microsoft The success of your business depends on your ability to adapt to a dynamic market environment, where globalisation and economic pressures are reshaping the landscape. To remain competitive, your organisation

More information

3D Workspace: a new dimension to your desktop

3D Workspace: a new dimension to your desktop 3D Workspace: a new dimension to your desktop The desktop management landscape has changed As the world of work changes, so do the mechanics of IT management and delivery. Technology advances like virtualised

More information

Cloud Readiness Consulting Services

Cloud Readiness Consulting Services Cloud Readiness Consulting Services Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping

More information

best practice guide Software-as-a-service Operations: Step-by-Step Best Practices

best practice guide Software-as-a-service Operations: Step-by-Step Best Practices best practice guide Software-as-a-service Operations: Step-by-Step Best Practices Introduction Faced with intensifying competition, as well as a desire for more stable revenue streams and stronger customer

More information

Cloud Readiness Workshop

Cloud Readiness Workshop Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping costs down. In addition, for many

More information

Four steps to improving cloud security and compliance

Four steps to improving cloud security and compliance white paper Four steps to improving cloud security and compliance Despite the widespread proliferation of cloud computing, IT decision makers still express major concerns about security, compliance, and

More information

best practice guide BYO-What? 6 Lessons Learnt in Making Mobility Work

best practice guide BYO-What? 6 Lessons Learnt in Making Mobility Work best practice guide BYO-What? 6 Lessons Learnt in Making Mobility Work Businesses are immersed in an era of mobility. Whether it s connecting workers on the road, developing work-from-home policies, or

More information

Sustainable Solutions. Switch to future thinking

Sustainable Solutions. Switch to future thinking Switch to future thinking Increased global competition, rapid advances in technology, risks from natural disasters, resource shortages today s business leaders must adapt to operating in a changing world,

More information

Ensure Optimal Infrastructure Support for Mobility

Ensure Optimal Infrastructure Support for Mobility white paper Ensure Optimal Infrastructure Support for Mobility The technology industry has reached a watershed moment. Today, the enterprise is on the move as employee adoption of mobile devices, like

More information

Burning Dollars Top Five Trends in US Telecom Spend

Burning Dollars Top Five Trends in US Telecom Spend white paper Burning Dollars Top Five Trends in US Telecom Spend Telecom costs are among the largest operating expenses for organizations worldwide. Yet, they re often the most inconsistently managed. So

More information

Managed Service for Visual Communications

Managed Service for Visual Communications Managed Service for Visual Communications Managed Service for Visual Communications Videoconferencing can have multiple benefits in your organisation. It can help your employees be more productive and

More information

opinion piece Cloud Computing The journey begins

opinion piece Cloud Computing The journey begins opinion piece Cloud Computing The journey begins Many CIOs view cloud computing as their salvation in the current economic downturn, as it promises to deliver IT services to subscribers at a lower cost.

More information

best practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business

best practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business best practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business With a global economy that remains under pressure, organisations around the world are looking for reliable

More information

It s critical to be able to correlate threats pre-emptively and respond to them immediately.

It s critical to be able to correlate threats pre-emptively and respond to them immediately. Security has become a much deeper executive discussion because of the modern diversity of channels through which businesses can be attacked. Mobility, bring your own device, virtualisation, the cloud,

More information

How To Manage An Ip Telephony Service For A Business

How To Manage An Ip Telephony Service For A Business Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,

More information

opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive

opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive Contents Introduction 01 Having the cake and eating it 01 Holistic = end to end 01 The devil is in the detail

More information

Advanced Infrastructure

Advanced Infrastructure Your infrastructure is the backbone of your business The Information Economy, the Digital Age, the Virtual Generation and online replacing in-line is a reality and forms part of our daily lives. Each of

More information

Security Assessment and Compliance Services

Security Assessment and Compliance Services Security Assessment and Compliance Services Despite the best efforts of IT security teams, hackers and malicious code continue to find their way into corporate networks. Adding to the pressure is the fact

More information

best practice guide Rise Above Unreliable Videoconferencing

best practice guide Rise Above Unreliable Videoconferencing best practice guide Rise Above Unreliable Videoconferencing It s no secret that videoconferencing can have a positive impact on employee productivity, business agility, time-to-market, collaboration and

More information

HIPAA security rules of engagement

HIPAA security rules of engagement healthcare HIPAA security rules of engagement The use of health information technology continues to expand in healthcare. Healthcare organizations are using web-based applications and other portals that

More information

opinion piece IT Security and Compliance: They can Live Happily Ever After

opinion piece IT Security and Compliance: They can Live Happily Ever After opinion piece IT Security and Compliance: They can Live Happily Ever After Contents Pitfalls, misconceptions and mistakes 01 It s not all doom and gloom 01 Take the right steps towards compliance and IT

More information

Strategic, User-Driven, and Managed: The Future Of Unified Communications and Collaboration Executive Summary

Strategic, User-Driven, and Managed: The Future Of Unified Communications and Collaboration Executive Summary Strategic, User-Driven, and Managed: The Future Of Unified Communications and Collaboration Executive Summary Key findings from a major global Dimension Data and Ovum study highlights Create a UCC strategy

More information

Procurement and Logistics Service. Overcoming the challenges and complexities of international business

Procurement and Logistics Service. Overcoming the challenges and complexities of international business Procurement and Logistics Service Overcoming the challenges and complexities of international business There are massive benefits in expanding your organisation into new international territories. You

More information

INSITE. Dimension Data s monitoring offering

INSITE. Dimension Data s monitoring offering Dimension Data s offering What s on your mind? Is your infrastructure management strategy optimal? Are you achieving optimum ROI on your infrastructure management investment? Are you employing the latest

More information

The Future of Unified Communications & Collaboration India highlights. Key findings from a major global Dimension Data and Ovum study

The Future of Unified Communications & Collaboration India highlights. Key findings from a major global Dimension Data and Ovum study The Future of Unified Communications & Collaboration India highlights Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in India is behind the global trend, but firms

More information

Performance Optimisation

Performance Optimisation Performance Optimisation What could a 50% improvement in network performance mean to your business? At its most simple, performance optimisation is the addition of technology to a network, in order to

More information

opinion piece Meeting the Challenges of Supplier Relations in a Multisourcing Environment

opinion piece Meeting the Challenges of Supplier Relations in a Multisourcing Environment opinion piece Meeting the Challenges of Supplier Relations in a Multisourcing Environment New approaches and skills are required to effectively manage the increased volume and complexity of relationships

More information

best practice guide Network Management How to Lose the Frustration, Not the Control

best practice guide Network Management How to Lose the Frustration, Not the Control best practice guide Network Management How to Lose the Frustration, Not the Control best practice guide Network Management How to Lose the Frustration, Not the Control So much of your organisation s success

More information

Top 5 IT security trends to watch in 2015

Top 5 IT security trends to watch in 2015 What does 2015 hold in store from an IT security perspective? Read on as Dimension Data experts discuss the top trends to watch and their expected impact on business. Introduction The security industry

More information

Security Solutions Much of the pressure lands on the IT team. mobile and geographically dispersed workforce conducting regular assessments turn this

Security Solutions Much of the pressure lands on the IT team. mobile and geographically dispersed workforce conducting regular assessments turn this Security Solutions Today, your business doesn t just rely on IT, it s dependent on secure IT. Against the backdrop of a constantly evolving security threat landscape, increased demands around compliance

More information

Dimension Data helps Unilever boost global collaboration and hit sustainability goals with innovative Videoconferencing-as-a-Service

Dimension Data helps Unilever boost global collaboration and hit sustainability goals with innovative Videoconferencing-as-a-Service Global Manufacturing Dimension Data helps boost global collaboration and hit sustainability goals with innovative Videoconferencing-as-a-Service As part of the Sustainable Living Plan, we re on a mission

More information

Top 5 data centre trends to watch in 2015

Top 5 data centre trends to watch in 2015 Top 5 data centre trends to watch in 2015 What does 2015 hold in store for data centre professionals? Read as Dimension Data experts discuss the top trends to watch and their expected impact on business.

More information

opinion piece Security Consolidation and Optimisation

opinion piece Security Consolidation and Optimisation opinion piece Security Consolidation and Optimisation Are you maximising the return on your IT assets? Given the proliferation of security applications designed to combat IT breaches, you, like many organisations

More information

The Future of Unified Communications & Collaboration South Africa. Key findings from a major global Dimension Data and Ovum study

The Future of Unified Communications & Collaboration South Africa. Key findings from a major global Dimension Data and Ovum study The Future of Unified Communications & Collaboration South Africa Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in South Africa is ahead of the global curve, with

More information

Securing today s data centre

Securing today s data centre white paper Securing today s data centre The intelligent use of data is core to achieving business success. There is, therefore, an indisputable need to safeguard the data centre, where most data in its

More information

opinion piece Consolidation Drives Network Performance 6 Feet Under

opinion piece Consolidation Drives Network Performance 6 Feet Under opinion piece Consolidation Drives Network Performance 6 Feet Under Contents Consolidation drives network performance 6 feet under 01 Centralisation, consolidation and virtualisation... is there a universal

More information

white paper Ten Steps to Turn Visual Communications Technology into Real Business Value

white paper Ten Steps to Turn Visual Communications Technology into Real Business Value white paper Ten Steps to Turn Visual Communications Technology into Real Business Value Organisations around the globe are continuing to seek out new and more cost-effective ways of communicating and collaborating.

More information

Application Security No Longer a Pipe Dream

Application Security No Longer a Pipe Dream opinion piece opinion piece Application Security No Longer a Pipe Dream Application Security No Longer a Pipe Dream Security professionals who find themselves struggling to chart a course through the application

More information

Understanding the 12 Requirements of PCI DSS

Understanding the 12 Requirements of PCI DSS opinion piece Understanding the 12 Requirements of PCI DSS Practical steps to achieve and maintain compliance Regardless of whether you are a retailer, service provider or a bank, if you process any form

More information

Secure Mobility Survey Report. A critical gap exists between the enterprise mobility vision and real-world implementations

Secure Mobility Survey Report. A critical gap exists between the enterprise mobility vision and real-world implementations Secure Mobility Survey Report A critical gap exists between the enterprise mobility vision and real-world implementations introduction Enterprise mobility and trends like bring your own device (BYOD) aren

More information

The Future of Unified Communications & Collaboration Canada. Key findings from a major global Dimension Data and Ovum study

The Future of Unified Communications & Collaboration Canada. Key findings from a major global Dimension Data and Ovum study The Future of Unified Communications & Collaboration Canada Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in Canada mirrors global trends, but is more advanced in

More information

Contact Centre-as-a-Service a compelling suite of best-in-class contact centre functionality, delivered via the cloud.

Contact Centre-as-a-Service a compelling suite of best-in-class contact centre functionality, delivered via the cloud. Contact Centre-as-a-Service a compelling suite of best-in-class contact centre functionality, delivered via the cloud. Brought to you by Dimension Data Wholly-owned subsidiary of the USD 100 billion NTT

More information

Telephony Telephony a platform to connect, communicate and collaborate with confidence

Telephony Telephony a platform to connect, communicate and collaborate with confidence Telephony a platform to connect, communicate and collaborate with confidence Your business needs reliable, flexible and secure communication tools to interact with your employees, customers and business

More information

white paper Technology Internet Protocol Lays a Path to Flexibility and Cost Reduction

white paper Technology Internet Protocol Lays a Path to Flexibility and Cost Reduction white paper Technology Internet Protocol Lays a Path to Flexibility and Cost Reduction Executive summary Contact centres historically conservative in their technology approach are being forced to make

More information

The Future of Unified Communications & Collaboration France. Key findings from a major global Dimension Data and Ovum study

The Future of Unified Communications & Collaboration France. Key findings from a major global Dimension Data and Ovum study The Future of Unified Communications & Collaboration France Key findings from a major global Dimension Data and Ovum study highlights UCC infrastructure uptake in France is very advanced, but the French

More information

DSV Air & Sea, Inc. Aerospace Sector. DSV Air & Sea, Inc. Aerospace

DSV Air & Sea, Inc. Aerospace Sector. DSV Air & Sea, Inc. Aerospace DSV Air & Sea, Inc. Aerospace Sector DSV Air & Sea, Inc. Aerospace Introduction to DSV DSV is a global supplier of transport and logistics services. We have offices in more than 70 countries and an international

More information

EMEA BENEFITS BENCHMARKING OFFERING

EMEA BENEFITS BENCHMARKING OFFERING EMEA BENEFITS BENCHMARKING OFFERING COVERED COUNTRIES SWEDEN FINLAND NORWAY ESTONIA R U S S I A DENMARK LITHUANIA LATVIA IRELAND PORTUGAL U. K. NETHERLANDS POLAND BELARUS GERMANY BELGIUM CZECH REP. UKRAINE

More information

Managed Secure Infrastructure Service

Managed Secure Infrastructure Service Managed Secure Infrastructure Service A constantly evolving security threat landscape, increased pressure around compliance and the potentially devastating impact of a security breach means that businesses

More information

Maintaining the Balance Between User Experience and Security

Maintaining the Balance Between User Experience and Security white paper Maintaining the Balance Between User Experience and Security Organisations are seeing a growing preference among employees for using their personal smartphones and tablets for business. Accelerating

More information

Consulting and Professional Services. Strategic, architectural, operational and implementation expertise

Consulting and Professional Services. Strategic, architectural, operational and implementation expertise Consulting and Professional Services Strategic, architectural, operational and implementation expertise How do you ensure the seamless integration of new and existing technologies and services not just

More information

The Future of Unified Communications & Collaboration Netherlands. Key findings from a major global Dimension Data and Ovum study

The Future of Unified Communications & Collaboration Netherlands. Key findings from a major global Dimension Data and Ovum study The Future of Unified Communications & Collaboration Netherlands Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in the Netherlands mirrors global trends, with some

More information

Security Consulting. Services Overview

Security Consulting. Services Overview Services Overview Dimension Data is a global technology services company, assisting its customers in planning, building and supporting their IT infrastructures. Dimension Data combines its expertise in

More information

7 Demands Enterprises Must Make from Cloud Providers

7 Demands Enterprises Must Make from Cloud Providers 7 Demands Enterprises Must Make from Cloud Providers When choosing a provider for your enterprise cloud, there is plenty to consider. How do you know a provider is actually enterprise-ready, despite their

More information

Data Centre Relocation

Data Centre Relocation opinion piece Data Centre Relocation Not just two guys and a truck Contents Foreword 01 Planning relocation: Everyone is a stakeholder 01 Logic, then physics 02 Prepare the target site 03 Execution: scheduling

More information

white paper Strategy and Development: The Expanding Role of the Contact Centre

white paper Strategy and Development: The Expanding Role of the Contact Centre white paper Strategy and Development: The Expanding Role of the Contact Centre white paper The Expanding Role of the Contact Centre Executive summary Contact centres are assuming a more prominent role

More information

Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment

Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment OVERVIEW Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Rising medical

More information

PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL

PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL WHITE PAPER PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL CERTIFICATE REVOCATION CHECKING ON CISCO IOS SOFTWARE Introduction The support for x.509 digital

More information

Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise

Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise DATA SHEET Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise Cisco ICM software has traditionally enabled companies to distribute inbound service volume to a variety of termination

More information

MAUVE GROUP GLOBAL EMPLOYMENT SOLUTIONS PORTFOLIO

MAUVE GROUP GLOBAL EMPLOYMENT SOLUTIONS PORTFOLIO MAUVE GROUP GLOBAL SOLUTIONS PORTFOLIO At Mauve Group, we offer a variety of complete employee management services such as Global Employment Solutions (GES), Professional Employment Outsourcing (PEO),

More information

CISCO METRO ETHERNET SERVICES AND SUPPORT

CISCO METRO ETHERNET SERVICES AND SUPPORT SERVICES OVERIVEW CISCO METRO ETHERNET SERVICES AND SUPPORT In the ever-changing communications market, incumbent service providers are looking for ways to grow revenue. One method is to deploy service

More information

The face of consistent global performance

The face of consistent global performance Building safety & security global simplified accounts The face of consistent global performance Delivering enterprise-wide safety and security solutions. With more than 500 offices worldwide Johnson Controls

More information

Cisco Conference Connection

Cisco Conference Connection Data Sheet Cisco Conference Connection Cisco IP Communications a comprehensive system of powerful, enterprise-class solutions including IP telephony, unified communications, IP video/audio conferencing,

More information

Triple-play subscriptions to rocket to 400 mil.

Triple-play subscriptions to rocket to 400 mil. Triple-play criptions to rocket to 400 mil. Global triple-play criptions will reach 400 million by 2017; up by nearly 300 million on the end-2011 total and up by 380 million on the 2007 total, according

More information

Sustainable Data Centre

Sustainable Data Centre white paper Sustainable Data Centre Tackling the Ever-rising Data Centre Energy Costs Why Only Do Half the Job? By Kari Baden Managing Director, Dimension Data Advanced Infrastructure A whitepaper on tackling

More information

NetFlow Feature Acceleration

NetFlow Feature Acceleration WHITE PAPER NetFlow Feature Acceleration Feature Description Rapid growth in Internet and intranet deployment and usage has created a major shift in both corporate and consumer computing paradigms. This

More information

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund

Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000

More information

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,

More information

IP Networking and the Advantages of consolidation

IP Networking and the Advantages of consolidation WHITE PAPER Extending the Benefits of Storage Area Networks across IP Networks Introduction The phenomenal growth of Internet business and data-intensive e-business applications over the past few years

More information

INTERNATIONAL OVERVIEW John Wilkinson SVP Sales & Products

INTERNATIONAL OVERVIEW John Wilkinson SVP Sales & Products INTERNATIONAL OVERVIEW John Wilkinson SVP Sales & Products DE- C I X N G N L A U N C H E V E N T 2 Introduction XConnect provides secure, managed ENUM Registries and SIP based peering services to enable

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

World Consumer Income and Expenditure Patterns

World Consumer Income and Expenditure Patterns World Consumer Income and Expenditure Patterns 2014 14th edi tion Euromonitor International Ltd. 60-61 Britton Street, EC1M 5UX TableTypeID: 30010; ITtableID: 22914 Income Algeria Income Algeria Income

More information

The Future of Unified Communications & Collaboration United Kingdom. Key findings from a major global Dimension Data and Ovum study

The Future of Unified Communications & Collaboration United Kingdom. Key findings from a major global Dimension Data and Ovum study The Future of Unified Communications & Collaboration United Kingdom Key findings from a major global Dimension Data and Ovum study highlights UCC uptake in the UK mirrors global trends, but is more advanced

More information

Global AML Resource Map Over 2000 AML professionals

Global AML Resource Map Over 2000 AML professionals www.pwc.co.uk Global AML Resource Map Over 2000 AML professionals January 2016 Global AML Resources: Europe France Italy Jersey / Guernsey 8 Ireland 1 Portugal 7 Luxembourg 5 United Kingdom 1 50 11 Spain

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Appendix 1: Full Country Rankings

Appendix 1: Full Country Rankings Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable

More information

CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK)

CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK) DATA SHEET CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK) Cisco Systems IP Phone Services bring the power of the World Wide Web to Cisco IP Phones. An integral part of a Cisco AVVID (Architecture

More information

Enterprise Mobility Suite (EMS) Overview

Enterprise Mobility Suite (EMS) Overview Enterprise Mobility Suite (EMS) Overview Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report using 3+ devices for work Enable my employees

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Chart 1: Zambia's Major Trading Partners (Exports + Imports) Q4 2008 - Q4 2009. Switzernd RSA Congo DR China UAE Kuwait UK Zimbabwe India Egypt Other

Chart 1: Zambia's Major Trading Partners (Exports + Imports) Q4 2008 - Q4 2009. Switzernd RSA Congo DR China UAE Kuwait UK Zimbabwe India Egypt Other Bank of Zambia us $ Million 1. INTRODUCTION This report shows Zambia s direction of merchandise trade for the fourth quarter of 2009 compared with the corresponding quarter in 2008. Revised 1 statistics,

More information

The big pay turnaround: Eurozone recovering, emerging markets falter in 2015

The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 Global salary rises up compared to last year But workers in key emerging markets will experience real wage cuts Increase in

More information