On the Road to HIMSS 2013

HIMSSlogoWe hope you can join Layered Tech at the Healthcare Information and Management Systems Society (HIMSS) 2013 Annual Conference on March 3-7, 2013.  This conference and exhibition will bring together thousands of healthcare executives and IT professionals to address the challenges and opportunities presented by today’s changing healthcare landscape.

HIMSS 2013 will feature many dynamic programs and presentations, including Bill Clinton as one of the keynote speakers.  Stop by Layered Tech’s booth 5605 to learn about our HIPAA compliant hosting solutions and our ability to offer the industry’s only 100% Compliance Guarantee.  Hope to see you there!

This year’s conference will be held March 3-7 at the Ernest N. Morial Convention Center in New Orleans.  For more information, please visit http://www.himssconference.org/index.aspx.

Security as a Subset of Risk Management

What does Risk Management mean to you?  If you have read my blog you know that I focus on topics like Security or Compliance.  You may have noticed, as well, that my title is Chief Risk Officer and you may have wondered how this fits together.  Compliance cannot exist without the appropriate controls (security) in place.  Moreover, Risk Management can be said to be the art of balancing the value of the cost of a control versus the value of the benefit derived from the control.

Continue reading ‘Security as a Subset of Risk Management’

2012 Reflection and 2013 Road Ahead

With the holiday season upon us and another year coming to a close, we wish to express appreciation to our clients, partners and shareholders for their continued support of Layered Tech.

PCI, HIPAA and FISMA compliant managed service provider, Layered TechWe had many accomplishments in 2012, all with the objective of setting the standard for what clients should expect from their PCI-, HIPAA- and FISMA-compliant managed hosting provider.  Our extraordinary team of security and compliance experts worked day and night to understand the goals of our clients and solve their business challenges.

Continue reading ’2012 Reflection and 2013 Road Ahead’

The Payment Processing Chain – Holistic Risk Management

ATM keypadA lot of people in the credit card industry focus on the compliance and security component of the payment processing chain that they control.  This is expected and is the right thing to do.  Most people do not have an appreciation of the steps needed for a successful transaction.  Some merchants, cards and banks could have varying processes but most transactions involve, at a minimum, a consumer, a merchant, a payment gateway or processor, the card brand and the bank issuing the card.  In order for a transaction to complete, the reverse path is taken to validate the transaction.  Add in credits, refunds and loyalty programs and that’s a lot of moving parts in a system that appears to act instantaneously.  The system works well and we all depend on that.
Continue reading ‘The Payment Processing Chain – Holistic Risk Management’

Update on FISMA Compliant Cloud Offering for Microsoft

White HouseEarlier this year Microsoft Corporation contracted with Layered Tech to provide “Microsoft Dynamics for Government – Hosted by Layered Tech”; a FISMA compliant cloud offering for their Dynamics solutions.

Continue reading ‘Update on FISMA Compliant Cloud Offering for Microsoft’

Intelligence in the Cloud – Security and Compliance

dciaWe hope you can join Layered Tech at the “Intelligence in the Cloud” workshop, which is a unique opportunity to understand the challenges of migrating secure multimedia assets to the cloud.  The workshop, jointly sponsored by the National Association of Broadcasters (NAB) and the Distributed Computing Industry Association (DCIA), will focus on how military and government agencies with responsibilities for intelligence gathering can safely leverage the benefits of cloud computing.
Continue reading ‘Intelligence in the Cloud – Security and Compliance’

Holiday Security – Manage Your Risks

Credit CardsWelcome to the holiday season!  Along with the holiday cheer, parties, presents and spending come some risks of which we should all be aware.  Situational Awareness is a phrase that some might not recognize.  Situational Awareness entails being aware of your surroundings and environment and adapting your behaviors to address the risks being presented.

Continue reading ‘Holiday Security – Manage Your Risks’

FISMA Compliant Business Solutions for Federal Government

MS-DynamicsWhen is a cloud business solution right for your agency?

An interview with Suzie Adams, Federal Chief Technology Advisor for Microsoft

This week, Microsoft Dynamics announced the availability of new cloud-based business solutions built specifically for federal government agencies. These solutions are delivered through a FISMA-compliant, federal-only infrastructure environment hosted by Microsoft partner Layered Tech. The solutions provide agencies with a private and secured cloud hosting environment built specifically to deploy mission critical solutions, enabling federal agencies to collaborate, manage data, improve processes, and access actionable business intelligence, while taking advantage of the flexibility, security, performance and cost savings of a cloud delivery model.

The FutureFed blog team had the opportunity to catch up with Susie Adams, Microsoft’s Federal Chief Technology Advisor, to help give some perspective to this announcement and answer a few questions on cloud offerings for federal agencies.

READ THE FULL BLOG HERE.

Update on Layered Tech’s Acquisition of NEW WORLD APPS

nwa-lt logo-vertWe are now 90 days into the merger of Layered Tech and NEW WORLD APPS, so we thought it would be helpful to send out an update from the front lines: How is the integration going?

Continue reading ‘Update on Layered Tech’s Acquisition of NEW WORLD APPS’

5 Questions to Ask Your Cloud Service Provider

Cloud SecurityQuite often, cloud service providers neglect to make security and compliance of their cloud environments their responsibility. Many service providers leave it to the client to manage their own security. This is not ideal. The client cannot control all elements of the environment and is at a disadvantage.  It is startling to me, that 69% of cloud service providers do not believe that security is their responsibility, and even more, do not offer easy to implement security controls as a service according to the Ponemon Institute in 2011.
Continue reading ’5 Questions to Ask Your Cloud Service Provider’