Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Enhance the privacy of your patients by utilizing our engaging HIPAA Privacy & Security training programs tailored for healthcare entities and their business partners. We also provide a specialized Texas HB300 privacy course. Equip your healthcare workforce with essential knowledge and skills to maintain safety while safeguarding both patients and your organization from preventable injuries and downtime through our OSHA safety training designed specifically for the healthcare sector. Maintain adherence to crucial HR/EEO regulations while fostering a workplace free from harassment. Our mobile-optimized courses feature sexual harassment prevention training specifically for the states of California and New York. Promote a culture of safety and ensure environmental compliance with our extensive array of OSHA safety training modules created for both manufacturing and general industries. Additionally, enhance employee performance and refine operational efficiency with our training courses focusing on leadership development, customer service, performance management, and interview techniques, ultimately leading to a more productive and compliant workplace. This comprehensive approach will not only protect your patients but also contribute to the overall success of your organization.

Description

Evaluate risks, strengthen governance frameworks, enhance compliance efforts, broaden visibility, and ensure business continuity throughout your GRC initiative concerning privacy, security, IT, and legal departments. Managing cybersecurity can feel daunting for organizations, regardless of their size. Our services allow you to concentrate on your core activities while we handle your security and privacy measures. We will create compliance-driven software specifically designed to meet the unique needs of your organization, its industry, available resources, and client base. Transition your operations into a technology-enabled model by digitizing all essential processes. Are you aware of which privacy laws are relevant to your business? We are here to assist you with every step of the compliance process. Remember that your employee and business information forms the very essence of your organization; are you ensuring its protection? Additionally, maintaining robust data security not only safeguards your assets but also builds trust with your clients.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Evolve Technologies

Founded

2001

Country

United States

Website

evolveelearning.com

Vendor Details

Company Name

IWASSA

Country

Egypt

Website

www.iwassa.com

Product Features

Learning Management Systems (LMS)

Academic / Education
Asynchronous Learning
Blended Learning
Built-In Course Authoring
Corporate / Business
Customizable
Gamification
Learner Portal
Mobile Learning
Open Source
SCORM Compliance
Synchronous Learning
Video Conferencing
eCommerce
eLearning Companies

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Mastery Training Reviews

Mastery Training

Mastery Technologies

Alternatives

Tovuti LMS Reviews

Tovuti LMS

Tovuti