The document discusses selecting technologies to help organizations comply with HIPAA regulations, focusing on intrusion detection systems, web application protection, and log management. It provides questions to consider for each technology when evaluating solutions. Intrusion detection systems should detect known bad activity and work across environments. Web application firewalls should protect websites from attacks and work across cloud providers. Log management solutions should archive logs long-term, enable searching, and include pre-built HIPAA reports. The document also provides an overview of Alert Logic and its Security-as-a-Service solutions to help meet HIPAA compliance needs.