Author: hello@tarasovs.me

Resilient Network Systems Reimagines Identity Access Management for Secure External Sharing

Distributed Network Solution Goes Beyond Identity to Focus on Contextual AccessDecember 08, 2016 09:00 AM Eastern Standard Time SAN FRANCISCO–(BUSINESS WIRE)–As 2017 approaches, cloud computing, mobility and the Internet of Things continue to erode traditional organizational boundaries. The ability to share data freely is becoming a key driver of competitive

Resilient and Team win Phase 1 of the Move Health Data Forward Challenge

Resilient along with its partners WebShield Inc., SAFE-BioPharma (@SAFE_BioPharma), Carebox (@CareboxHealth) and InterSystems (@InterSystems) are delighted to announce that we have won Phase 1 of the Move Health Data Forward Challenge.  This prestigious challenge is staged by The Department of Health and Humans Services’ Office of the National Coordinator for Health Information

3 Reasons You Need a Virtual Data Room

3 Reasons You Need a Virtual Data Room The top performing businesses in 2016 will perfect the art of connection — in fact, this economy has been labeled the Connection Economy. Consider the largest “taxi company” doesn’t own a car (Uber); the largest “hotel chain” doesn’t own a building (AirBnB); and the

HHS announces Phase 1 winners of the Move Health Data Forward Challenge

Proposals designed to help consumers share their personal health data easily and securely The Department of Health and Humans Services’ Office of the National Coordinator for Health Information Technology (ONC) today announced the Phase 1 winners of the Move Health Data Forward Challenge. Winners were selected based on their proposals for using

Bridge Building: Harnessing the Power of Great Partnerships with Laserfiche

We live in a connected world where we are meant to succeed through partnerships: the Wright Brothers introduced us to fixed-wing flight and opened the world to air travel; Lennon and McCartney were the creative force behind the Beatles—one of the most influential music bands in history; Larry Page and

Compliance: Why It Matters and How to Achieve It

Compliance: Why It Matters and How to Achieve It Why Compliance? According to a recent report on data security compliance, industries ranging from retail to healthcare to banking claim that protecting data to comply with corporate policies, industry regulations, or data privacy laws is very important, especially in sectors which are highly

Structure Security Conference 2016 – Three Themes

This week, we attended the Structure Security conference in San Francisco’s Presidio Golden Gate Club. It was billed as a conference that “will highlight the best practices that security professionals are using to protect some of the world’s largest companies and institutions, and examine the future of security products, services,

Attorneys: Is Your Information Governance Rock Solid?

Attorneys: Is Your Information Governance Rock Solid? Great architecture begins with a rock-solid foundation. Builders envision elaborate structures, but when the foundation is not firm, trouble is sure to follow. At best, a building leans; at worst, it completely topples over. In the Information Age, businesses, especially law firms, don’t

Duplicates: Files vs Records & Why You Need to Know the Difference

Duplicates: Files vs Records & Why You Need to Know the Difference Within each database, and eventually, each enterprise content management (ECM) system, businesses must manage the limits of storage. Relational databases are filled with countless records and files; unfortunately, many of those are duplicated, which take up much-needed storage