Viswanathan Ganapathy Daniel Logan
|
|
|
- Denis Rodgers
- 10 years ago
- Views:
Transcription
1 Healthcare White Paper The Heart of Healthcare Data SecurityDe-Riskig Test ad Productio Eviromets
2 About the Authors Viswaatha Gaapathy Solutios Director, Healthcare Techology Excellece Viswaatha Gaapathy is part of the Techology Excellece Group (TEG) i the Healthcare Idustry Solutios Uit at Tata Cosultacy Services (TCS). He coceptualizes ew strategic solutios ad platforms for healthcare cliets icludig payers, itegrated payer-providers, specialty providers, ad pharmacy beefit maagemet compaies. Gaapathy has 25 years of idustry experiece i techology, solutios, ad cosultig with a special focus o data security. He has a MBA with a specializatio i Healthcare from the Yale School of Maagemet, Yale Uiversity, New Have. Daiel Loga Eterprise Solutios Architecture Director, Healthcare Techology Excellece Daiel Loga works with the TEG of the Healthcare Idustry Solutios Uit at TCS. He works with customers across the globe i coceptualizig ad desigig strategic solutios for digital trasformatio, data aalytics, ad security to meet the eeds of the rapidly chagig healthcare ladscape. Loga has 25 years of experiece i iformatio techology withi the isurace ad healthcare idustries. His areas of expertise iclude eterprise architecture ad plaig as well as solutios, iformatio, security, ad applicatio architecture. He is a Certified Iformatio Systems Security Professioal (CISSP) ad was oe of the leadig cotributors to the Cloud Security Alliace Eterprise Architecture referece model.
3 Abstract The itercoected, itegrated, ad iterdepedet healthcare ecosystem geerates several quitillio terabytes of data every day. The growig maturity of Electroic Health Record (EHR) systems ad healthcare iformatio exchages (HIE) ad the digitizatio of healthcare is drivig dow costs ad improvig the quality of care. However, the icreasig iteroperability ad access to Protected Health Iformatio (PHI) ad Persoally Idetifiable Iformatio (PII) is acceleratig the risk of data breaches. Goig by the umber ad magitude of high profile security breaches that have made headlies recetly, it is clear that the task of securig PHI is challegig eve for the bestprepared orgaizatios. Healthcare security ad privacy laws such as the HITECH Act ad HIPAA have icreased the urgecy of addressig potetial security risks. Not doig so could mea hefty fiacial pealties, icreased cost of doig busiess, ad loss of patiet trust. While compaies are ivestig i eterprise security tools to protect the productio etwork ad ifrastructure, they cotiue to struggle with securig the data i their applicatios, ad applicatio databases ad iterfaces. The practice of usig productio data i test eviromets, while eablig the developmet of ext geeratio healthcare applicatios, also icreases vulerability to security breaches. This paper outlies a uique persoa based approach that leverages a secure repository to effectively assess, remediate, ad moitor data risks i the test eviromet. Assessig ad uderstadig vulerabilities i the test eviromet ca, i tur, help healthcare compaies secure the productio eviromet ad lay the foudatio for eterprise-wide data security.
4 Cotets The data-breach epidemic: Key busiess implicatios 5 Defiig the care pla to avoid security risks 6 Improvig Coverage: Prevetig data breaches i the test eviromet 6 Fortifyig data: The ARM framework to ehacig data security 7 Assess the risk - Idetify vulerable assets ad prioritize key areas of focus 8 Remediate the risk De-idetify sesitive data i test eviromets 8 Moitor the risk Keep sesitive data out of test eviromets 9 Prevetive care - Protectig high-value targets i productio 10 Log Term Care Beefits of a persoa based approach 11 It Pays to Care Securig the Future 11
5 The data-breach epidemic: Key busiess implicatios Stole healthcare credetials sell for 10 to 20 times more tha stole credit cards o the black market¹. Not surprisigly, lucrative patiet iformatio residig withi poorly protected applicatios, databases or etworks, make healthcare orgaizatios atural targets for security attacks. Usig sophisticated techiques, cybercrimials are able to work aroud traditioal security measures such as firewalls, ativirus, ad itrusio detectio ad prevetio systems. Theft or loss of laptops, computers, hard drives, PDAs, ad other portable devices cotaiig uecrypted persoal iformatio are also a major source of data security breaches. I additio, the iability to cetrally maage disparate hospital systems ca lead to isolated IT assets, makig them vulerable to security risks. Security threats may also origiate withi the orgaizatio i the form of disgrutled or termiated employees who abuse their admiistrative privileges. Cloud computig ad the possibility of 'shadow IT' also icrease security ad privacy risks related to the maiteace of data o shared computig platforms. Igorig these lurkig security risks ca lead to sigificat fiacial, legal ad reputatioal losses. Accordig to a study by Poemo Istitute, the cost of a data breach to healthcare orgaizatios was USD 363 per capita i 2015, which is far higher tha i ay other sector. Some of the high profile security breaches are servig as a wake-up call for the healthcare idustry to improve security measures: I a cyberattack o Athem Ic., the largest healthcare security breach till date, the PII of early 80 millio employees ad customers was stole. 57 uecrypted computer hard drives were stole from a leased facility belogig to Blue Cross Blue Shield of Teessee. The healthcare isurer agreed for a settlemet i the wake of the breach that affected more tha oe millio erollees. Cybercrimials attacked Commuity Health Systems ad stole the persoal iformatio of early 4.5 millio patiets. The compay ow faces a data breach class actio lawsuit for failure to implemet ad follow basic security procedures. 91% of healthcare compaies reported at least oe icidet i the past two years $6 BN spet by the healthcare idustry due to data breaches $2.1 MN spet by the idustry o a average icidet The aftermath of a security breach: Costly cosequeces Wastage of time ad resources i maagig, aalyzig, ad documetig the data breach Cost of reportig the icidet to federal ad state authorities Regulatory fies, class-actio lawsuits i the case of larger breaches, ad high costs of fixig IT systems damaged by the breach Disruptios to day-to-day operatios that may hider the delivery of critical admiistrative or cliical services Log term damage to reputatio 1] Network World, Athem hack: Persoal data stole sells for 10X price of stole credit card umbers, February 2015, Accessed July 2015, 5
6 Defiig the care pla to avoid security risks As the healthcare idustry plays catch up i the digital trasformatio race, orgaizatios are collectig, maagig, aalyzig, ad sharig a icreasig amout of electroic data. Much of this icludes PHI ad PII from various sources icludig trasactioal systems such as erollmets, claims, billig ad patiet portals, as well as itegrated services such as medicatio adherece ad pricig. The widespread distributio ad access to PHI through a growig array of iteret-coected devices, tools, ad sites makes it eve more challegig to secure data. A large healthcare payer orgaizatio typically has 2500 to 4000 applicatios ad several membership ad claim egies. I additio, a growig umber of exteral services make the data ad applicatio ladscape more complicated ad vulerable As custodias of large amouts of PHI ad PII, healthcare orgaizatios must comply with regulatios such as the Health Isurace Portability ad Accoutability Act (HIPAA) ad Health Iformatio Techology for Ecoomic ad Cliical Health (HITECH) Act. The HIPAA protects the privacy of idividually idetifiable health iformatio ad sets atioal stadards for the security of electroic protected health iformatio. It also madates otificatio followig a breach of protected health iformatio. The HITECH Act expads o HIPAA's security ad privacy requiremets. It icreases fies ad eforcemet, expads applicability, ad brigs i ew breach otificatio rules. To stay compliat, healthcare orgaizatios must cotiually moitor their physical, admiistrative, ad techical security policies to safeguard sesitive patiet iformatio. However, there is oe area that is ofte overlooked the widespread use of sesitive patiet data i healthcare applicatio developmet. This practice exposes orgaizatios to the risk of o-compliace ad ca lead to the mismaagemet of PHI ad PII. I the followig sectio, we take a look at why securig the data i the test eviromet is importat. Improvig Coverage: Prevetig data breaches i the test eviromet Compliace regulatios ad security best practices require orgaizatios to ivetory ad classify their iformatio assets. However, fast paced developmet cycles push rapid techological iovatio through the IT departmets of healthcare compaies, puttig sesitive data at the risk of beig overlooked or mismaaged. This problem is ot limited to just the productio eviromet. It exteds to the testig eviromet as well. Testig forms a itegral part of a successful ew system roll out ad testig systems have grow i complexity to address all fuctioal groups ad potetial productio scearios. Ofte, copies of productio or actual patiet data are used to populate the test eviromet, creatig security loopholes ad makig these the perfect target for outside ad isider threats. Give the ramificatios of a security breach, orgaizatios eed to start takig the threat to the test eviromet seriously. Typically, productio data is modified to make it safe for use i o-productio eviromets i compliace with regulatory requiremets. However, orgaizatios face challeges i de-idetifyig data 6
7 cosistetly across systems i itegrated testig eviromets. Ofte, the o-stadard techiques do ot meet HIPAA stadards. I additio, they drive up the costs for testig, developmet, ad audits ad reduce the effectiveess of test data maagemet. Security breaches are ot limited to the productio eviromet. To meet the timeto-market pressures, productio data is used for applicatio, itegratio, ad performace testig. I such a sceario, lack of adequate access cotrols ad data usage by a wider audiece iflates the risk of data breaches i the test eviromet. Securig healthcare data is o differet from safeguardig private assets. It requires idetifyig ad mappig the orgaizatio's PHI footprit i both productio ad test eviromets, ad uderstadig how the data ca be compromised. Oce sesitive iformatio has bee idetified, it should be masked with the help of a foolproof data deidetificatio techique. I the followig sectio, we look at a three-step framework for de-riskig the test ad productio eviromet to reduce the probability of data breaches. Fortifyig data: The ARM framework to ehacig data security Adoptig security best practices ad a comprehesive approach to protectig PHI ad PII i test ad productio eviromets is imperative to tacklig the data security issue effectively. I our opiio, the Assess, Remediate, ad Moitor (ARM) framework show i figure 1 is a highly effective tool to prioritize, safeguard, ad moitor vulerable data ad applicatios. ARM is a uique persoa based approach to documetig the PHI footprit, remediatig the test eviromet ad securig live data. Uderstadig the PHI footprit of the test eviromet allows orgaizatios to acquire kowledge that ca help protect their productio eviromet as well. A robust goverace mechaism ca the eable cotiuous moitorig of critical data elemets spread across the eterprise. Assess Remediate Assess live data exposure i test eviromets Take applicatio ivetory ad priortize vulerable assets Evaluate data volume ad risk dimesios Idetify ad documet PHI ad PII footprit Assess exisitig test data maagemet policies ad procedures Moitor ad Gover Purge, de-idetify, or remove sestive data from test eviromets Secure the persoa through MDM Coduct cotiuous live audits Ecrypt data i productio eviromets Lik data goverace processes with SDLC Esure cotiuous risk reductio Automate MDM to detect sesitive data i oproductio eviromets Use ladig zoes before movig exteral data to the test eviromet Secure repository to track, audit ad secure data Figure 1: The ARM Framework for Securig the Test Eviromet 7
8 Assess the risk - Idetify vulerable assets ad prioritize key areas of focus Capturig the PHI footprit is a importat first step i the process of protectig the test eviromet agaist data breaches. With resources beig limited, it is importat to prioritize applicatios based o the databases that cotai the most sesitive data. Orgaizatios ca the capture this iformatio ad store it i a secure repository. This ca be doe by followig two simple steps: What's uique about the ARM framework? Persoa based approach to deidetificatio that secures the etire persoa ad ot just idividual pieces of PHI such as the Social Security umber or date of birth. Ability to create a secure repository to track, audit ad secure PHI ad PII o a ogoig basis. Two-proged approach to elimiatig sesitive data from the o-productio eviromets ad focusig data security implemetatios o high value targets i the productio eviromet. Takig a data ivetory This ivolves idetifyig the developmet, test, itegratio, ad performace test applicatio eviromets, ad the databases used i those eviromets. As a ext step, orgaizatios must idetify the exact tables ad fields that store the sesitive data, as well as the methods used to exchage data with other applicatios. Evaluatig the risk Assessig the volume of sesitive data as part of the risk assessmet process is importat because the cost of a healthcare data breach is directly related to the umber of records lost. For example, i the U.S., ay data breach that impacts more tha 500 records must be reported to the Uited States Departmet of Health ad Huma Services Office of Civil Rights. May Europea coutries have similar requiremets. Assessig the dowstream depedecies of data is also critical sice the risk of breach icreases each time productio data is copied. This risk is especially prevalet i itegrated testig eviromets where it is commo to ru system-to-system itegrated batch cycles. At the same time, orgaizatios must assess the exteral data spread due to the eormity of data services, exteral iterfaces, ad tradig parters. Fially, aalyzig the effectiveess of curret test data maagemet practices will help idetify gaps i the techiques used to geerate test data or de-idetify productio data. Remediate the risk De-idetify sesitive data i test eviromets Oce the vulerable assets have bee idetified, the ext step is to proactively reduce the risk of data breaches. While data maskig is widely used to de-idetify productio data, the techiques are ofte icosistet, leadig to security gaps or iefficiet testig. Data maskig should alter PHI ad PII while retaiig the origial format ad properties, without impactig the applicatio fuctioality ad itegrity. This ca be doe i the followig ways: De-idetifyig persoas through a MDM approach Data de-idetificatio is the process of removig, maskig, or alterig PHI such as ame, date of birth, social security umber, medical ID umber, ad so o. Usig a persoa based Master Data Maagemet (MDM) approach ca improve the effectiveess of the data de-idetificatio process. It helps secure the PHI footprit of a perso across applicatios istead of merely securig idividual pieces of sesitive data. 8
9 This approach is particularly useful whe multiple lies of busiesses (medical, detal, behavioral health) have separate systems for trackig their memberships. Usually, a master patiet idex is maitaied by examiig records i multiple systems ad comparig differet combiatios of fields (ame ad date of birth, social security umber ad ame, ame ad address, ad others) across systems. A persoa based approach simplifies ad reduces effort by reducig the umber of data pieces that eed to be compared ad secured. Moreover, it miimizes the chaces of security breaches, sice it becomes difficult to obtai other pieces of persoal iformatio oce the persoa has bee secured. Removig sesitive data from the o-productio eviromet Productio data i o-productio eviromets must be either removed or de-idetified usig the MDM approach described above. By leveragig a commo data maskig or data purgig tool ad stadardized algorithms, orgaizatios ca mask or alter sesitive data across databases. This process is relatively straight forward with respect to stadaloe databases used for developmet or system testig. However, it gets complicated i itegrated testig eviromets where data must be shared across multiple systems. I additio, the records for a perso are expected to match across systems. I such a sceario, it is recommeded that a chage widow approach be used, where testig is halted for a give amout of time ad all data is purged or masked i a way that provides cosistecy across the eviromets. The MDM approach ca the be used to esure cosistetly masked data across systems. Orgaizatios ca also leverage the secure repository to remediate risks i the test eviromet ad ecrypt data i the productio eviromet. Moitor the risk Keep sesitive data out of test eviromets Securig the test ad productio eviromet is just the start. With cyberattacks becomig icreasigly sophisticated, orgaizatios must take steps to moitor risks through cotiuous live data audits ad robust goverace mechaisms supported by a secure repository. The followig approaches help healthcare orgaizatios proactively keep sesitive data out of o-productio eviromets: Leveragig ladig zoes while movig data ito testig eviromets Durig the risk assessmet ad ivetory phase discussed earlier, a orgaizatio would have idetified exteral ad iteral data etry poits for testig eviromets. Typical etry poits for a healthcare orgaizatio iclude data feeds from busiess associates, EDI gateways for claims, ad itegratio with exteral erollmet processes such as health care isurace exchages. I most cases, there will be o-productio eviromet versios of these etry poits utilized durig the developmet ad testig processes. It is beeficial to isolate these eviromets from direct iteractio with the etry poits by placig exteral system data i a stagig area or ladig zoe. Each applicatio ca the automatically sca ad move the data from the ladig zoe ito the test eviromet. It ca either reject the dataset if it is foud to cotai productio data or alterately, ru the dataset through the stadard deidetificatio tool. 9
10 Usig a automated MDM approach to moitor risks Assessig o-productio eviromets for productio data must be doe periodically to esure better results. This starts with buildig a ivetory of all applicatios, eviromets, databases, ad sesitive data fields. Data goverace processes liked to the Software Developmet Life Cycle (SDLC) help maitai the ivetory ad keep it up to date. Automatig the MDM approach to detect sesitive data i o-productio eviromets also helps support regular checks. I case of issues with the data de-idetificatio process, data privacy officers ca use iformatio gathered through automated checks to follow up with applicatio teams ad data owers. Prevetive care Protectig high-value targets i productio Orgaizatios will fid that the ARM framework - used to drive test data maagemet efforts - ca also be very useful for drivig cyber security iitiatives focused o data security. Ofte, it is ot the lack of techology that slows dow cyber security efforts i the productio eviromet. Rather, it is the lack of clarity o where to start i order to miimize risk i a prioritized fashio. The ivetory ad risk assessmet process outlied above determies the high-value targets of the orgaizatio by idetifyig exactly where the sesitive data is stored ad how much of it is i each database. This iformatio ca be used to drive several cyber security iitiatives at the applicatio or database level. Table 1 highlights various scearios where the ARM framework ca be leveraged for cyber security iitiatives i the productio eviromet. Cyber Security Iitiative Applicatio Security Database Security Opportuities for Improvemet Prioritize applicatios with protected data i applicatio security reviews, applicatio firewall programs, ad etitlemet reviews Prioritize databases with protected data i database activity moitorig, privileged user maagemet, ad database ecryptio programs Server Security Prioritize servers hostig databases ad applicatios with protected data i privileged user maagemet programs Vulerability Maagemet Prioritize servers ad databases hostig protected data whe vulerabilities are foud by icreasig the priority or risk score for those systems. Prioritize patchig ad database hardeig efforts for databases ad servers hostig protected data Data Loss Prevetio Utilize master data for protected data to decrease false-positive idetificatio of data loss evets Goverace, Risk ad Compliace Feed iformatio o databases ad applicatios cotaiig protected iformatio ito GRC tools ad processes for eterprise risk assessmets Security Iformatio Evet Maagemet Prioritize applicatios ad databases to feed security evets to the Security Operatios Ceter. Use ivetory of applicatios ad databases with protected data to prioritize security alerts ad speed up icidet respose ad data breach otificatio processes. Table 1: Leveragig the ARM framework i the productio eviromet 10
11 Log Term Care Beefits of a persoa based approach The persoa based approach adopted by the ARM framework esures that developmet activities take place quickly ad securely i test eviromets, with miimal disruptio to busiess release cycles. Some of the key beefits of the ARM framework are: Improved regulatory compliace: Orgaizatios ca improve compliace through comprehesive de-idetificatio ad removal of sesitive data from test eviromets, as well as improved data audit ad goverace. Reduced risks: The ARM framework offers greater clarity o prioritizig risks. I additio, remediatig test eviromets ad securig live data sigificatly lowers busiess risks arisig from data breaches at a eterprise level. Maiteace of applicatio itegrity: De-idetificatio of data esures compliace while supportig productio-class testig, without hiderig applicatio fuctioality. Accelerated testig: The framework supports rapid testig that is aliged with key elemets of the SDLC. It also helps improve productivity through automatio of data maskig, especially whe provisioig ew test eviromets. Cosistet data maskig: With multiple applicatios ruig o differet databases, PHI ad PII must be masked i a cosistet maer across applicatios. The ARM framework recommeds a stadardized approach to de-idetificatio of data that is scalable ad flexible to meet future demads. A large U.S. payer reduces risk o a ogoig basis with miimal disruptio to operatios: A case study Busiess eed: Secure the test eviromet through a accelerated solutio with miimal disruptio to operatios ad plaed busiess releases. Solutio: Risk assessmet, audit, ad remediatio was completed withi 12 moths. A secure repository was used to drive automatio ad support eterprise wide assessmet ad remediatio for over 3000 applicatios. Busiess beefits: Elimiated 65% risk at half-time with zero to miimal disruptio to busiess ad IT release cycle. It Pays to Care Securig the Future The spate of healthcare security breaches has highlighted the fact that healthcare data holds immese value ot oly for healthcare orgaizatios but also for uscrupulous etities. These icidets uderscore the eed for a ew approach to data security, as it is o loger eough to rely o ecryptio, data leak prevetio, access maagemet, ad other iformatio security techologies. Orgaizatios must leverage a holistic combiatio of process chage, leadership, ad techology implemetatio to secure both productio ad test eviromets. A i-depth uderstadig of the applicatio ad data ladscape is ecessary to protect o-productio eviromets from data breaches ad lay the foudatio for securig the productio eviromet. Executive level sposorship, policies ad procedures, as well as employee traiig help cotrol ad safeguard the use of real data i o-productio eviromets. Robust healthcare data security goes beyod prevetig data breaches. It creates superior busiess value by eablig healthcare orgaizatios to adopt ew busiess models ad techologies rapidly, pavig the way for ehaced efficiecies ad competitive advatage. 11
12 About TCS' Healthcare Busiess Uit TCS parters with leadig health payers, providers ad PBMs globally to eable busiess model trasformatios to address healthcare reforms, improve quality of care, icrease customer egagemet ad reduce overheads. By streamliig ad moderizig busiess processes ad systems, TCS helps healthcare orgaizatios realize operatioal efficiecies ad reduce operatig costs. We work closely with healthcare players to empower them to meet their cosumers demads for higher levels of service, quality of care, ad ew ways of iteractig ad egagig. Our advaced data solutios, aalytics, ad cuttig edge digital techologies deliver a higher degree of customer cetricity. TCS portfolio of services covers the etire payer value chai from Pla Defiitio, Eligibility ad Erollmet, Policy Servicig, Billig, Claims Processig, Claims Adjudicatio, Beefit Maagemet, Provider Maagemet ad Member Services. For providers, we deliver bespoke services for Provider Maagemet, Claims Maagemet, Patiet Iformatio ad Fiacial Maagemet, Cliical Data Maagemet, Pharmacy Beefit Maagemet ad Reveue Cycle Maagemet. Cotact For more iformatio about TCS' Healthcare Busiess Uit, visit: [email protected] Subscribe to TCS White Papers TCS.com RSS: Feedburer: About Tata Cosultacy Services (TCS) Tata Cosultacy Services is a IT services, cosultig ad busiess solutios orgaizatio that delivers real results to global busiess, esurig a level of certaity o other firm ca match. TCS offers a cosultig-led, itegrated portfolio of IT ad IT-eabled ifrastructure, egieerig ad assurace services. This is delivered through its uique Global Network Delivery ModelTM, recogized as the bechmark of excellece i software developmet. A part of the Tata Group, Idia s largest idustrial coglomerate, TCS has a global footprit ad is listed o the Natioal Stock Exchage ad Bombay Stock Exchage i Idia. IT Services Busiess Solutios Cosultig All cotet / iformatio preset here is the exclusive property of Tata Cosultacy Services Limited (TCS). The cotet / iformatio cotaied here is correct at the time of publishig. No material from here may be copied, modified, reproduced, republished, uploaded, trasmitted, posted or distributed i ay form without prior writte permissio from TCS. Uauthorized use of the cotet / iformatio appearig here may violate copyright, trademark ad other applicable laws, ad could result i crimial or civil pealties. Copyright 2015 Tata Cosultacy Services Limited TCS Desig Services I M I 08 I 15 For more iformatio, visit us at
IT Support. 020 8269 6878 n www.premierchoiceinternet.com n [email protected]. 30 Day FREE Trial. IT Support from 8p/user
IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our
Five Effective Testing Practices to Assure Meaningful Use of Electronic Health Records
Poit of View Five Effective Testig Practices to Assure Meaigful of Electroic Health Records Abstract Meaigful ' has bee the buzzword i the US healthcare commuity as every care provider is gearig up for
To c o m p e t e in t o d a y s r e t a i l e n v i r o n m e n t, y o u n e e d a s i n g l e,
Busiess Itelligece Software for Retail To c o m p e t e i t o d a y s r e t a i l e v i r o m e t, y o u e e d a s i g l e, comprehesive view of your busiess. You have to tur the decisio-makig of your
Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites
Digital Eterprise Uit White Paper Web Aalytics Measuremet for Resposive Websites About the Authors Vishal Machewad Vishal Machewad has over 13 years of experiece i sales ad marketig, havig worked as a
On-Premise CRM to Salesforce Migration - Benefits, Challenges and Best Practices
White Paper O-Premise CRM to Salesforce Migratio - Beefits, Challeges ad Best Practices With the advet of cloud computig, orgaizatios are lookig to move their Customer Relatioship Maagemet (CRM) applicatios
Configuring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
Effective Data Deduplication Implementation
White Paper Effective Data Deduplicatio Implemetatio Eterprises with IT ifrastructure are lookig at reducig their carbo foot prit ad ifrastructure maagemet cost by slimmig dow their data ceters. I cotrast,
Flood Emergency Response Plan
Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy
Business Process Services. White Paper. Smart Ways to Implement Smart Meters: Using Analytics for Actionable Insights and Optimal Rollout
Busiess Process Services White Paper Smart Ways to Implemet Smart Meters: Usig Aalytics for Actioable Isights ad Optimal Rollout About the Authors Sumit Joshi Sumit is part of the Aalytics ad Isights team
An Approach to Fusion CRM Adoption
White Paper A Approach to Fusio CRM Adoptio May eterprise customers are ivestig time ad effort to evaluate how ext-geeratio Oracle eterprise applicatios will chage iteractios with iteral ad exteral stakeholders.
Biometrics for Patient Identification A US Case Study
ID WORLD Abu Dhabi 18-19 March 2012 HealthTech Iovatio Dr. Alex Bazi Head of Biometrics Fujitsu Biometrics for Patiet Idetificatio A US Case Study Orgaized by: Coferece Host: Biometrics for Patiet Idetificatio
IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs.
ItelliSOURCE Comverge s eterprise software platform provides the foudatio for deployig itegrated demad maagemet programs. ItelliSOURCE Demad maagemet programs such as demad respose, eergy efficiecy, ad
Banking & Financial Services. White Paper. Managing Enterprise Financial Risk Using Big Data Technologies
Bakig & Fiacial Services White Paper Maagig Eterprise Fiacial Risk Usig Big Data Techologies About the Author Alok Bisai Alok Bisai is a Solutio Architect with the Tata Cosultacy Services (TCS) BFS Risk
Wells Fargo Insurance Services Claim Consulting Capabilities
Wells Fargo Isurace Services Claim Cosultig Capabilities Claim Cosultig Claims are a uwelcome part of America busiess. I a recet survey coducted by Fulbright & Jaworski L.L.P., large U.S. compaies face
Managing an Oracle ERP Upgrade with Best Practices in Organizational Change Management
A Poit of View Maagig a Oracle ERP Upgrade with Best Practices i Orgaizatioal Chage Maagemet The implemetatio or upgrade of eterprise-wide systems, such as resource plaig tools, creates sigificat chage
Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out
FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles
Six Optimization Opportunities in Multichannel Retailing
White Paper Six Optimizatio Opportuities i Multichael Retailig Multichael retailers are facig challeges i adoptig e-commerce stadards ad so are strugglig to stay i touch with the chagig behavior of cosumers.
The Importance of Change Management in Application Managed Services Outsourcing
A Poit of View The Importace of Chage Maagemet i Applicatio Maaged Services Outsourcig Itroductio Sice its arrival i the early 1960s, IT outsourcig has evolved sigificatly. Now ofte kow as maaged services,
Silver Lining of Cloud Computing
White Paper Silver Liig of Cloud Computig - Key Priciples ad Best Practices CXOs eed to evaluate differet deploymet models, service models ad key characteristics of the cloud to implemet the precise spectrum
Enterprise Security & Risk Management. White Paper. Securing the Future with Next-Generation Data Center Security
Eterprise Security & Risk Maagemet White Paper Securig the Future with Next-Geeratio Data Ceter Security About the Author Prikshit Goel Prikshit Goel heads the Ceter of Excellece (CoE) for Maaged Security
client communication
CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.
BPM Capabilities in CRM Landscape
White Paper BPM Capabilities i CRM Ladscape Customer Relatioship Maagemet (CRM) is all about maagig the relatioships you have with your customers. It s a overall strategy to help you lear about your customers
(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
Assessment of the Board
Audit Committee Istitute Sposored by KPMG Assessmet of the Board Whe usig a facilitator, care eeds to be take if the idividual is i some way coflicted due to the closeess of their relatioship with the
ODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
Telecom. White Paper. Actionable Intelligence in the SDN Ecosystem: Optimizing Network Traffic through FRSA
Telecom White Paper Actioable Itelligece i the SDN Ecosystem: Optimizig Network Traffic through FRSA About the Authors Sumit Kapoor Sumit is a solutio architect i the telecom busiess uit at Tata Cosultacy
InventoryControl. The Complete Inventory Tracking Solution for Small Businesses
IvetoryCotrol The Complete Ivetory Trackig Solutio for Small Busiesses Regular Logo 4C Productivity Solutios for Small Busiesses Logo Outlie Get i cotrol of your ivetory with Wasp Ivetory Cotrol the complete
Domain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
A guide to School Employees' Well-Being
A guide to School Employees' Well-Beig Backgroud The public school systems i the Uited States employ more tha 6.7 millio people. This large workforce is charged with oe of the atio s critical tasks to
Banking & Financial Services. White Paper. Cloud Solutions for Centralized Reference Data Management
Bakig & Fiacial Services White Paper Cloud Solutios for Cetralized Referece Maagemet About the Authors Sriivasa Kumar Yerchuru Sriivasa heads the Capital Markets practice at TCS ad has over 20 years of
Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)
Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02
Enable Compliance, Quality, and Efficiency in Your Safety Operations with Oracle Argus
Eable Compliace, Quality, ad Efficiecy i Your Safety Operatios with Oracle Argus A Complete Solutio for Cliical ad Post-Marketig Safety A costatly evolvig regulatory climate worldwide, the critical focus
Baan Service Master Data Management
Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :
Document Control Solutions
Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS
What is IT Governance?
30 Caada What is IT Goverace? ad why is it importat for the IS auditor By Richard Brisebois, pricipal of IT Audit Services, Greg Boyd, Director ad Ziad Shadid, Auditor. from the Office of the Auditor Geeral
Mobile Application Testing
White Paper Mobile Applicatio Testig Device ad platform diversity, short release cycles, lack of mature testig tools ad the variety of etwork coectivity optios result i frequet cost overrus ad missed deadlies
Disaster Recovery Planning A dime to prepare versus a dollar for repair
White paper Disaster Plaig A dime to prepare versus a dollar for repair I corporatios worldwide, C Level Executives are frettig over oe questio: Are we i a positio to restore our busiess quickly i case
FPO. A global telecom s strategy. for Canada
FPO A global telecom s strategy for Caada A global telecom s strategy for Caada Global telecommuicatios compaies that support multi-atioal corporatios (MNC) are tasked with providig a cosistet cliet experiece
Agency Relationship Optimizer
Decideware Developmet Agecy Relatioship Optimizer The Leadig Software Solutio for Cliet-Agecy Relatioship Maagemet supplier performace experts scorecards.deploymet.service decide ware Sa Fracisco Sydey
A Guide to Better Postal Services Procurement. A GUIDE TO better POSTAL SERVICES PROCUREMENT
A Guide to Better Postal Services Procuremet A GUIDE TO better POSTAL SERVICES PROCUREMENT itroductio The NAO has published a report aimed at improvig the procuremet of postal services i the public sector
WHERE CHANGE IS POSSIBLE
WHERE CHANGE IS POSSIBLE gree workspaces AT TIDES, WE HAVE BEEN WORKING WITH PEOPLE LIKE YOU FOR MORE THAN 30 YEARS TO MAKE THE WORLD A BETTER PLACE. Our missio is to parter with philathropists, foudatios,
Creating Tomorrow s Contact Center Today
Creatig Tomorrow s Cotact Ceter Today Cotact ceters that wat to be relevat i the era of social media eed to trasform from slow-movig, reactive orgaizatios ito real-time ad eve proactive departmets that
Transformation of Storage Technology Industry: Digital Trends and their Impact
A Poit of View Trasformatio of Storage Techology Idustry: Digital Treds ad their Impact The Evolvig Storage Idustry Ladscape With limitless possibilities throw ope by the Digital Five Forces Big Data ad
leasing Solutions We make your Business our Business
if you d like to discover how Bp paribas leasig Solutios Ca help you to achieve your goals please get i touch leasig Solutios We make your Busiess our Busiess We look forward to hearig from you you ca
SOCIAL MEDIA. Keep the conversations going
SOCIAL MEDIA Keep the coversatios goig Social media is where most of the world is. It is therefore a ope source of cosumer data, a chael of commuicatio ad a platform for establishig relatioships with customers.
CCH Accountants Starter Pack
CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice
Ideate, Inc. Training Solutions to Give you the Leading Edge
Ideate, Ic. Traiig News 2014v1 Ideate, Ic. Traiig Solutios to Give you the Leadig Edge New Packages For All Your Traiig Needs! Bill Johso Seior MEP - Applicatio Specialist Revit MEP Fudametals Ad More!
Telecom. White Paper. Prioritizing Mice Flows in Software Defined Networks for Enhanced Monetization and User Experience
Telecom White Paper Prioritizig Mice Flows i Software Defied Networks for Ehaced Moetizatio ad User Experiece About the Authors Partha Datta Partha Datta has bee workig with Tata Cosultacy Services (TCS)
Information Security Compliance
T A Uified Approach to Iformatio Security Compliace By M. Peter Adler he iformatio age has led to a heighteed cocer that persoal iformatio is ot beig protected. The high speed at which private iformatio
ELearning courses Competition / Antitrust
ELearig courses Competitio / Atitrust Clifford Chace ad Thomso Reuters elearig Regulators are takig a icreasigly tough stace o competitio / atitrust compliace. Failure to comply with the relevat legislatio
LEASE-PURCHASE DECISION
Public Procuremet Practice STANDARD The decisio to lease or purchase should be cosidered o a case-by case evaluatio of comparative costs ad other factors. 1 Procuremet should coduct a cost/ beefit aalysis
Prescribing costs in primary care
Prescribig costs i primary care LONDON: The Statioery Office 13.50 Ordered by the House of Commos to be prited o 14 May 2007 REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 454 Sessio 2006-2007 18 May
Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks
Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.
CREATIVE MARKETING PROJECT 2016
CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members
ContactPro Desktop for Multi-Media Contact Center
CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers
Skytron Asset Manager
Skytro Asset Maager Meet Asset Maager Skytro Asset Maager is a wireless, pateted RFID asset trackig techology specifically desiged for hospital facilities to deliver istat ROI withi a easy to istall, fully
INVESTING IN SOCIAL CHANGE TOOLS FOR SOCIAL INNOVATION
INVESTING IN SOCIAL CHANGE TOOLS FOR SOCIAL INNOVATION At Tides, we have bee workig for more tha 30 years with people like you to make the world a better place. Our missio is to parter with activists,
CCH CRM Books Online Software Fee Protection Consultancy Advice Lines CPD Books Online Software Fee Protection Consultancy Advice Lines CPD
Books Olie Software Fee Fee Protectio Cosultacy Advice Advice Lies Lies CPD CPD facig today s challeges As a accoutacy practice, maagig relatioships with our cliets has to be at the heart of everythig
The Agile Supply Chain:
A Poit of View The Agile Supply Chai: Drivig ad Supportig Agility through Sales ad Operatios Plaig Agility ad the Supply Chai The supply chai is the core of the busiess for early all product-producig eterprises.
Securing your business
Iteratioal Chamber of Commerce The world busiess orgaizatio Securig your busiess A compaio for small or etrepreeurial compaies to the 2002 OECD Guidelies for the security of etworks ad iformatio systems:
E-Plex Enterprise Access Control System
Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet
Harnessing Natural and Human Capital 2009 10
NATURAL RESOURCES INSTITUTE Haressig Natural ad Huma Capital 2009 10 www.ri.org Who we are The Natural Resources Istitute (NRI) is a specialist istitute of the Uiversity of Greewich. We provide research,
PRICE BAILEY CHARITIES & NOT FOR PROFIT THE RIGHT ADVICE FOR LIFE
PRICE BAILEY CHARITIES & NOT FOR PROFIT THE RIGHT ADVICE FOR LIFE OUR EXPERTISE To arrage a meetig with a member of for more iformatio about Price Bailey, At Price Bailey, we recogise that charity ad ot-for-profit
Platform Solution. White Paper. Transaction Based Pricing in BPO: In Tune with Changing Times
Platform Solutio White Paper Trasactio Based Pricig i BPO: I Tue with Chagig Times About the Author(s) Raj Agrawal Curret Desigatio Raj heads the Platform Solutios Uit at TCS. I his career spaig over 19
Connecting the Business, Development, and Operational dots in an enterprise [BizDevOps] - A TCS Approach
White Paper Coectig the Busiess, Developmet, ad Operatioal dots i a eterprise [BizDevOps] - A TCS Approach Eterprises are uder cotiuous pressure to deliver iovative solutios that drive busiess results.
FOCUS 2015 PATHWAYS EXTRAORDINARY EXPERIENCES COMMUNITY CONNECTIONS OPERATIONAL EXCELLENCE STRATEGIC PLAN. INSPIRE n TRANSFORM n CONNECT
INSPIRE TRANSFORM CONNECT FOCUS 2015 STRATEGIC PLAN PATHWAYS EXTRAORDINARY EXPERIENCES COMMUNITY CONNECTIONS OPERATIONAL EXCELLENCE FOCUS 2015 is our refreshed strategic pla that builds o ad stregthes
FortiGuard Fortinet s Global Security Research and Protection
SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft
