Archive for the 'Layered Technologies' Category

Page 3 of 12

HIPAA Security Rule Controls: Do You Have Them?

HIPAA security rules and HIPAA compliance requirementsRecent changes to the HIPAA Rules through the HIPAA Omnibus Final Rule, may affect the way healthcare professionals do business. The changes, which became effective March 26, 2013, now apply the Security Rule not only to covered entities but also to business associates of covered entities and subcontractors of business associates. This means that any organization involved with electronic protected health information (EPHI) must have and follow a well-written information security policy with established practices and guidelines that protect this EPHI from falling into the wrong hands. Failure to comply with the HIPAA Rules could result in fines up to $1.5 million for all violations of an identical provision in a calendar year.
Continue reading ‘HIPAA Security Rule Controls: Do You Have Them?’

Are Security Fears Keeping You Out of the Cloud?

Remain safe in the cloud with Layered Tech cloud security and cloud solutionsThe First Annual Big Cloud Event took place in Minneapolis, MN in June.  Layered Tech was a sponsor of this event, and I delivered a presentation on Big Cloud Adoption. This event was billed as the first annual; the second event is already scheduled for March of 2014 in Las Vegas, NV. Although many cloud-related topics were discussed at the event, many discussions focused on cloud adoption, or the lack thereof, for Fortune 1000 companies.
Continue reading ‘Are Security Fears Keeping You Out of the Cloud?’

Should You Care About Application Performance Management?

Every customer running revenue-critical business applications should consider adding application performance monitoring and management.  For this reason, we have taken our experience deploying application performance monitoring tools for our customers and released a standard managed solution.  Our new Application Performance Management (APM) service, powered by AppDynamics, offers a “managed with” model in which we integrate APM with our customers’ managed hosting and cloud service. We handle the deployment, configuration, monitoring and assist clients with utilizing the APM solution.

Continue reading ‘Should You Care About Application Performance Management?’

Layered Tech Commitment to Privacy Continues with Safe Harbor Recertification

With the prevalence of cybercrime, governments have enacted laws; organizations have established standards; and companies such as Layered Tech have implemented considerable administrative, technical, and physical controls on information security to protect the confidentiality, integrity, and availability of data.

Continue reading ‘Layered Tech Commitment to Privacy Continues with Safe Harbor Recertification’

ETA Eye Openers

At the 2013 Electronic Transactions Association (ETA) Annual Meeting and Expo  in New Orleans recently, I had the opportunity to give a presentation on Hacktivism titled Managing Risk for Online Threats and Hacktivism Actions. Attending these shows allows me to experience a little bit of local culture (the food and the venue were awesome), network with colleagues and learn about what is trending in the cloud space. I’m not surprised that the trending theme this year revolved around mobile technology.
Continue reading ‘ETA Eye Openers’

Take the Plunge Into the Cloud

Plunge into the cloud with Layered Tech cloud hosting and cloud servicesI have spent the last 12 years working in sales in the hosting industry, and I must say that the last 4+ have been the most interesting with the emergence of cloud hosting in the market. I spend my days working with current and future cloud users, and from what I have gathered over the past few years, new cloud adopters usually have three major concerns when it comes to hosting their applications in the cloud:
Continue reading ‘Take the Plunge Into the Cloud’

E-Pay Innovator Drives Mobile Commerce in Developing Countries

It was a pleasure to serve as a judge for the e-Pay Innovation award at the recent ETA Expo in New Orleans, LA.  The winner of the $10,000 award was Trak for developing technology aimed at moving Brazil’s population from a paper payment system to a more efficient electronic format.

The ETA Technology Committee oversaw the event, which was part of the 2013 Annual Event and Expo in New Orleans. The Bill and Melinda Gates Foundation provided funding for the winner of the e-Pay Innovation Award and offered scholarships for several startup companies to exhibit in the Payments Next Zone section of the Expo.
Continue reading ‘E-Pay Innovator Drives Mobile Commerce in Developing Countries’

Up and to the Right: Layered Tech advances in Gartner Magic Quadrant

Gartner Research logoGartner recently published the 2013 edition of the Magic Quadrant for Managed Hosting which included Layered Tech. Since our first inclusion in 2010, Layered Tech has significantly increased our ranking and position with respect to completeness of vision and ability to execute. We have consistently moved up and to the right.

Continue reading ‘Up and to the Right: Layered Tech advances in Gartner Magic Quadrant’

Tips to Guard Against Hacks and Attacks

I attended the 2013 InnoTech San Antonio Technology Innovation Conference & Expo on April 17th.  InnoTech is the region’s largest business-to-business technology event.

This conference has grown to the point of needing to move to the Henry B. Gonzalez Convention Center.

Along with the tracks offered in Mobility, Women in Tech, Infrastructure, Big Data with Analytics and IT Leadership, I participated in the Cyber Security Symposium.  I moderated a panel of experts on Security – It’s All About Perspective.  The panel had representation from corporate leaders, consultants and higher education.  The panel members were Mark Krisak, Director of Information Security, HEB; Chip Meadows, Sr. Security Analyst, UTSA; Joe Oranday, Vice President, Enterprise Information Security, Frost; Steve Werby, President and Senior Information Security Consultant, Befriend.
Continue reading ‘Tips to Guard Against Hacks and Attacks’

Data Protection – Not Always a Slam Dunk

It’s March Madness time, one of my favorite times of year. Maybe it’s playing college basketball brackets with friends and co-workers that has me thinking of infrastructure strategy in basketball terms. But anyway, it occurs to me that while backup and recovery isn’t sexy, it is critical — and not always a slam dunk.

Continue reading ‘Data Protection – Not Always a Slam Dunk’