PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

Thin clients a malware-free desktop option

Managing, maintaining and securing PCs always has brought some level of agony for security professionals. Whether it's a virus, worm, spyware, corrupted files or incessant patching, something always is bringing PCs down. That's a headache David Barter, technical services manager for Androscoggin Home Care & Hospice of Lewiston, Maine, knows all too well. "Systems in four of our remote offices were breaking often," he says. And part of the problem was that those Windows-based PCs were getting bogged with spyware. That just wasn't acceptable for Androscoggin, considering the increased reliance on electronic health records to deliver care, the security requirements associated with HIPAA, and just how much care Androscoggin delivers each year. More than 375 physicians utilize the hospice and home care services the non-profit provides. And, in 2005, Androscoggin served more than 8,000 patients and families, and provided more than 140,000 home care and hospice visits. "The PCs were just killing us," says Barter. That was just part of ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue