E-PROCUREMENT
toggle menu

The following terms of use (“Terms of Use”) apply to all visitors to or users of this Web site (this "Site"), which Site is owned and operated by Derive Technologies. or one of its affiliates (collectively, "DERIVE TECHNOLOGIES"). Please feel free to browse this Site; however, your access and use of this Site is subject to these Terms of Use and all applicable laws. By accessing, browsing and/or using this Site, you acknowledge that you have read, understand and accept, without limitation or qualification, these Terms of Use. If you do not agree with any of these Terms of Use, do not use this Site. DERIVE TECHNOLOGIES reserves the right, in its sole discretion, to modify, alter or otherwise update these Terms of Use at any time. By using this Site you agree to be bound by such modifications, alterations or updates and should therefore periodically visit this page to determine the then-current Terms of Use to which you are bound.

COPYRIGHTS AND TRADEMARKS

The documents and information on this Site are copyrighted materials of DERIVE TECHNOLOGIES, third parties or both. You are granted permission to display, copy and download the materials on this Site for personal, non-commercial use only, provided you do not modify such materials and that you retain all copyright and other proprietary notices contained in such materials. Except as expressly permitted in the immediately preceding sentence, you may not reproduce in any form, or by any means (including without limitation by “mirroring” on another server) any portion of the materials on this Site without DERIVE TECHNOLOGIES’ prior written consent.

The trademarks, logos and service marks (“Marks”) displayed on this Site are the property of DERIVE TECHNOLOGIES or third parties.  You are not permitted to use the Marks without the prior written consent of DERIVE TECHNOLOGIES or such third party that owns the Mark.

Any feedback or other information you provide at this Site shall be deemed to be non-confidential and DERIVE TECHNOLOGIES shall be free to use such information on an unrestricted basis.

GLOBAL AVAILABILITY

Information DERIVE TECHNOLOGIES publishes on this Site may contain references or cross references to DERIVE TECHNOLOGIES products, programs and services that are not announced or available in your country. Such references do not imply that DERIVE TECHNOLOGIES intends to announce such products, programs or services in your country. Consult DERIVE TECHNOLOGIES' business contact for information regarding the products, programs and services that may be available to you.

LIMITATION OF LIABILITY AND GENERAL DISCLAIMER

ALL INFORMATION AND ANY SOFTWARE AVAILABLE FOR DOWNLOAD ON THIS SITE IS PROVIDED "AS IS," WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED.  DERIVE TECHNOLOGIES AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT.  Although DERIVE TECHNOLOGIES has attempted to provide accurate information on this Site, information on this Site may contain inadvertent technical inaccuracies or typographical errors and DERIVE TECHNOLOGIES assumes no responsibility for the accuracy of the information on this Site.  Information on this Site may be changed or updated without notice. DERIVE TECHNOLOGIES may also make improvements and/or changes in the products or services described on this Site at any time without notice.

DERIVE TECHNOLOGIES’ obligations with respect to its products and services are governed solely by the agreements under which they are provided. If you obtain a product or service from DERIVE TECHNOLOGIES through this Site that is provided without an agreement, that product or service is provided "AS IS" with no warranties whatsoever, express or implied, and your use of that product or service is at your own risk.

This Site may contain links to third-party Internet sites. Your access to and use of any other Internet sites linked to this Site is at your own risk.  DERIVE TECHNOLOGIES provides these links merely as a convenience and DERIVE TECHNOLOGIES does not endorse or accept any responsibility for the content, or the use, of such sites, even if they contain an DERIVE TECHNOLOGIES logo. It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, Trojan horses, and other items of a destructive nature. In addition, the mention of non-DERIVE TECHNOLOGIES products or services is for information purposes only and constitutes neither an endorsement nor a recommendation by DERIVE TECHNOLOGIES.

IN NO EVENT WILL DERIVE TECHNOLOGIES OR ITS SUPPLIERS BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR SAVINGS, BUSINESS INTERRUPTION OR LOSS OR DAMAGE TO DATA, ARISING OUT OF ANY USE OF, OR INABILITY TO USE, THIS SITE OR ANY SITE LINKED TO THIS SITE, EVEN IF DERIVE TECHNOLOGIES OR ITS SUPPLIERS HAVE BEEN EXPRESSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

JURISDICTION AND CHOICE OF LAW

This Site is controlled and operated by DERIVE TECHNOLOGIES from its offices within the United States. DERIVE TECHNOLOGIES makes no representation that materials on this Site are appropriate or available for use in other locations, and access to such materials from territories where their content is illegal is prohibited. Those who choose to access this Site from other locations do so on their own initiative and are responsible for compliance with applicable local laws.

These Terms of Use shall be governed by, construed and enforced in accordance with the laws of the State of New York as applied to agreements entered into and to be performed entirely within such State. Any action you, any third party or DERIVE TECHNOLOGIES brings to enforce these Terms of Use or otherwise in connection with any matters related to this Site shall be brought only in the state courts of the State of New York or the Federal District Court for the Southern District of New York.

blog

25
Sep

Critical Issues for Datacenter Managers – Hybrid Multi-cloud Environments

25.09.2023
Today's datacenter managers are tasked with providing the underlying computational, networking, and storage infrastructure necessary to support a wide array of business services and applications for internal and external users. All of this must be...
25
Sep

Understanding Pros and Cons of Hybrid Multi-Cloud Platforms 101

25.09.2023
Derive's Datacenter Practice Lead, Heman Yung, discusses important aspects of hybrid multi-cloud platforms—strengths as well as potential challenges. Q: What is a hybrid multi-cloud platform? A hybrid multi-cloud platform is a combination of...
17
Aug

How to Prevent Internal IT Security Threats

17.08.2023
When companies think about preventing IT security threats, they automatically visualize hackers shrouded in hoodies writing malware code. However, organizations should keep in mind their own employees.  While some insider threats originate from...
17
Aug

How Emerging AI Creates Cybersecurity Risk

17.08.2023
Almost as soon as generative artificial intelligence (AI) technologies, such as ChatGPT, came on the scene, the public began to imagine dystopian scenarios. Critics of emerging AI warned of ChatGPT’s ability to create deep fakes. The comedian...
28
Jul

Transformative Advances in Healthcare Technology

28.07.2023
Technology as a whole continues to evolve rapidly and the healthcare arena is certainly no exception. In this blog we look at selected areas of advancements with commentary by Derive’s VP of Business Development, Bill...
27
Jul

Securing Mobile Devices for Remote Work: 10 Cybersecurity Tips for Businesses Prioritizing Protection

27.07.2023
In today's digital landscape, remote work has increasingly become the norm for businesses in every industry. As more employees work from home, the security of their mobile devices, particularly phones, has become a critical concern for...
10
Jul

What the SEC’s New Cybsercurity Requirements Mean For You

10.07.2023
Any business worth their salt has read the cyber landscape of the last few years and shored up their digital defenses to protect against attacks. The practice of cybersecurity protection, however, is soon to transition from a best practice into a...
21
Jun

How to Improve Your SMB’s Resiliency

21.06.2023
While the goal of IT security is to prevent cyberattacks, small and medium-sized businesses (SMBs) need to be prepared to recover quickly if a breach is successful. Rapid recovery lessens the economic and reputational impact of a breach. Resilient...
01
Jun

How to Improve Your Healthcare Organization’s Security Awareness

01.06.2023
Because healthcare organizations are often targeted by ransomware attacks through phishing emails, promoting security awareness is crucial. Hackers send emails to hospitals and medical centers that seem to come from co-workers or authority figures....
01
Jun

How Healthcare Organizations Can Create a Cybersecurity Framework

01.06.2023
As the target of ransomware and other types of cyberattacks, healthcare organizations need to follow a cybersecurity framework that prevents breaches and the resulting loss of patient data. A Cybersecurity Framework (CSF) is a set of guidelines and...
01
Jun

Top 3 Cyberthreats Faced by Healthcare Providers

01.06.2023
Today, no type of business or organization is exempt from cybersecurity risk. Healthcare providers find themselves targeted by advanced threats because the information in electronic health records (EHRs) is valuable. Hackers can sell patient...
01
Jun

5 Ways to Strengthen Your SMB’s Security Posture 

01.06.2023
Small and medium-sized businesses (SMBs) often lack the resources needed to adopt a strong security posture. Given the unrelenting escalation of cyberattacks, SMBs can’t afford to skimp on security. With attacks potentially costing companies...
22
May

3 Ways a Healthcare Tablet Can Improve Patient Care

22.05.2023
From admission to discharge, healthcare professionals rely on accurate data to deliver quality care. Positive patient identification, medication tracking, and staff communication are just a few of the crucial workflows hinging on dependable data...
17
May

Learning Models and Generative AI in Managed Cybersecurity Services

17.05.2023
As businesses big and small across the healthcare industry become increasingly reliant on technology to optimize and deliver patient care, effective managed cybersecurity services (outsourced management of security procedures and systems) have never...
16
Nov

Baseline Security Practices for the Modern SMB

16.11.2022
Baseline Security Practices for the Modern SMB Cyberattacks around the world are continuing to escalate in both frequency and severity, exacerbated by current global events. Ransomware attacks in particular are an ever-growing threat vector, with the...
17
Oct

5 Reasons Healthcare Cybersecurity Is Crucial

17.10.2022
5 Reasons Healthcare Cybersecurity Is Crucial Healthcare cybersecurity has never been more important. With cybersecurity attacks rising in frequency and severity in recent years, catalyzed by the Covid-19 pandemic and the ongoing war in Ukraine,...
01
Jun

Derive Tech's 3 Most Critical Cybersecurity Services for Enterprise Businesses

01.06.2022
Derive Tech's 3 Most Critical Cybersecurity Services for Enterprise Businesses Now more than ever businesses big and small are racing to fortify their cybersecurity defenses to protect themselves against online threats. Russian cyberattacks have...
01
Jun

Everything You Need to Know About Enterprise Cyberattacks in 2022

01.06.2022
Everything You Need to Know About Enterprise Cyberattacks in 2022 Cybersecurity threats against enterprise businesses, particularly sophisticated and high-value ransomware attacks, are growing more prevalent by the day…and largely originate...
25
Mar

Creating an Unbreakable Cold Chain for Proper Vaccine Storage

25.03.2020
Now more than ever, cold storage is the key to safeguarding vaccine efficacy. Temperature-sensitive medications like the top COVID-19 vaccines require careful tracking since even the smallest deviation above approved storage temperatures can...
04
Mar

How Hospitals are Increasing Asset Availability to Handle High Patient Volume

04.03.2020
Increased patient volume has long been a prevalent issue in healthcare. With every flu season, hospitals nationwide have adapted and converted facilities to accommodate a swell of patients. While COVID-19 hospitalizations have been in a...
17
Feb

Three Technologies Curbing the Prevalence of Healthcare Misidentification

17.02.2020
An estimated 1 in every 2,326 blood specimens is inaccurately labeled, translating into a recurrent error risk once every two weeks for a standard-sized hospital. Specimen and patient misidentification have been age-old issues in...
28
Jan

What are the Components of an Efficient Telehealth System?

28.01.2020
A mere five years ago, telehealth was slowly making its presence known, used by less than 20% of healthcare facilities in the U.S. However, during the coronavirus outbreak, that number skyrocketed by 154% within the first weeks of...
15
Jan

How Enhanced Mobility Overcomes the Challenges in Modern Healthcare

15.01.2020
Before the pandemic, new healthcare technologies such as telehealth and clinal mobile devices were already making an impact worldwide. However, now as we continue to move through unprecedented demands, the push for innovation has been superseded by...