DigitalPersona for Healthcare Organizations

Similar documents
Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Solution. Imagine... a New World of Authentication.

Choosing the right two-factor authentication solution for healthcare

Single Secure Credential to Access Facilities and IT Resources

COSTS, THREATS AND ACCESS

Imprivata 2014 Desktop Virtualisation Trends in Europe Report

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

DigitalPersona Altus. Solution Guide

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

DigitalPersona Pro Enterprise

ENTERPRISE PASSWORD RESET. ReACT. So your Help Desk doesn t have to.

A Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Identity Management as a Service

THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act

Citrix Consulting. Guide to Consulting Methodology and Services

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Increase user productivity and security by integrating identity management and enterprise single sign-on solutions.

Endpoint Protection with DigitalPersona Pro

GDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED.

How Identity as a Service Makes UCaaS/SaaS Integrations More Scalable, Productive, and Secure

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Secure Access for Microsoft Office 365 & SaaS Applications

Advanced encryption and message control to complement and enhance your security investment in ZixDLP.

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Mobile Data Security Essentials for Your Changing, Growing Workforce

white paper SMS Authentication: 10 Things to Know Before You Buy

Maximize your move to Microsoft in the cloud

Safeguard protected health information with ShareFile

Virtual Machine Encryption Security & Compliance in the Cloud

Healthcare mobility: selecting the right device for better patient care

Case Study. Medical Information Records, LLC. Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

Next Generation Authentication

Dissecting NIST Digital Identity Guidelines

Self-Serve Password Reset

The Benefits of EPCS Beyond Compliance August 15, 2016

Centrify for Dropbox Deployment Guide

Make security part of your client systems refresh

CA Security Management

INTERVIEW TRANSCRIPT Barriers to Adopting Multifactor Authentication

User-to-Data-Center Access Control Using TrustSec Design Guide

The Device Has Left the Building

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

How Next Generation Trusted Identities Can Help Transform Your Business

HIPAA Compliance Checklist

VMware Enterprise Desktop Virtualization. Robin Crewe Senior Director, Virtual Desktop Infrastructure (VDI)

VAM. Epic epcs Value-Added Module (VAM) Deployment Guide

White Paper. The North American Electric Reliability Corporation Standards for Critical Infrastructure Protection

THE RSA AUTHENTICATION DECISION TREE

How BlackBerry 2FA and BlackBerry UEM Help This Law Enforcement Agency to Protect and Serve New York

HIPAA Regulatory Compliance

World s Most Secure Government IT Solution

Defender 5: The Right Way to Prove, Identify and Establish Trust

Top Reasons To Audit An IAM Program. Bryan Cook Focal Point Data Risk

How to Align Information Security and Safety in Healthcare

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

Five Reasons It s Time For Secure Single Sign-On

HP ELITEPAD 1000 G2 POWERED BY INTEL IN HEALTHCARE

The Windstream Enterprise Advantage for Healthcare

HIPAA Compliance Assessment Module

PROFESSIONAL SERVICES (Solution Brief)

Five Tips to Mastering Enterprise Mobility

TAM Enterprise Single Sign-on. TivoliNow! August 3-4, Charles Hoffman

A comprehensive security solution for enhanced mobility and productivity

Data Loss Prevention Best Practices for Healthcare

PasswordCourier Transparent Synchronization

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Challenges and. Opportunities. MSPs are Facing in Security

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

MEETING HIPAA/HITECH DATA ACCESS AND PASSWORD REQUIREMENTS IN THE WINDOWS HEALTHCARE ENTERPRISE

NRG Oncology and VisionTree Optimal Care (VTOC) Frequently Asked Questions

Cloud Communications for Healthcare

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

White Paper. Enabling Mobile Users and Staying Compliant. How Healthcare Organizations Manage Both

Test Data Management for Security and Compliance

PKI is Alive and Well: The Symantec Managed PKI Service

Evaluating the Security of Your IT Network. Vulnerability Scanning & Network Map

McAfee Embedded Control for Healthcare

LastPass Enterprise Recommended Policies Guide

Identity and Authentication PKI Portfolio

Demonstrating HIPAA Compliance

Secure HIPAA Compliant Cloud Computing

Whitepaper. Comprehensive Print Management in a Healthcare Environment

The simplified guide to. HIPAA compliance

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

STORAGE EFFICIENCY: MISSION ACCOMPLISHED WITH EMC ISILON

Critical HIPAA Privacy & Security Crossover Areas

Crash course in Azure Active Directory

Regulatory Compliance Using Identity Management

VMware Horizon View. Read more VMWARE solutions. Contact Us MicroAge.com

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an

For Healthcare Providers: How All-Flash Storage in EHR and VDI Can Lower Costs and Improve Quality of Care

Single Sign-On. Introduction

Transcription:

DigitalPersona for Healthcare Organizations RAPID, SECURE AUTHENTICATION FOR MEDICAL PROVIDERS AND STAFF Secure Access to Electronic Health Records Streamline Clinical Workflow Reduce Cybersecurity Costs Protect Patient Data

Protecting and Simplifying Access to EHRs PROTECTING ACCESS TO PATIENT DATA IS A REQUIREMENT Market studies show more than 85% of healthcare organizations that experienced breaches incurred a remediation at an average cost of up to $2M each.* To avoid such losses, hospitals and medical practices are deploying strong authentication solutions that can manage how clinical staff access systems that use that data. This approach makes IT security stronger, easier to manage and more affordable. FAST ACCESS TO HEALTH RECORDS, REGULATORY COMPLIANCE While Electronic Health Record (EHR) and clinical systems are intended to make crucial information available to medical staff when they need it most, traditional security mechanisms often get in the way. When lives are at stake, clinical staff can t afford time needed to reset forgotten passwords or fumbling with cards or tokens. They need secure ways to get immediate access to data and applications from any computer, at any time. The result is more time with patients, higher quality patient care and more satisfaction among clinical staff and patients. IT needs solutions that achieve compliance with regulations, while preserving the workflow doctors and nurses require. SECURITY INFRASTRUCTURE COST CONTAINMENT Even with the risks and costs of security breaches, many hospitals and clinics struggle with tight IT security budgets. Most organizations have fewer than two employees dedicated to taking care of their security and compliance efforts. Strong security is a must; but to be practical, it also has to be affordable and easy to manage for IT and end users. Healthcare Security Checklist Eliminate common and shared passwords Ensure each user has unique credentials Use strong authentication for PCs and shared kiosks Deploy biometrics and other strong authentication factors that do not require password memorization at shared workstations Simplify application access with single sign-on (SSO) Allow seamless log in to all clinical applications, from any computer Extend security to virtualized environment Secure and simplify access for users roaming across computers that authenticate into a virtualized desktop environment Tie security with user provisioning Seamlessly deploy credentials and apply security policies to new users Allow for monitoring and audit Ensure that your authentication solution enables audit trail * The Ponemon Institute

Composite Authentication for Healthcare DigitalPersona is used by clinics and hospitals worldwide for more secure, compliant, easy and rapid authentication of medical providers and back-office staff into critical applications, workstations and networks. Leveraging your existing infrastructure, there is no ripping and replacing. DigitalPersona s technology integrates seamlessly with all environments both cloud and client-server to fit your existing workflows and supports all operating system platforms. KEY BENEFITS FOR HEALTHCARE ORGANIZATIONS Increase Security And Reduce Fraud Multifactor authentication that supports the widest range of authentication credentials, including biometrics which provide proof of presence. Centralized Control for IT IT managers use familiar Active Directory tools to centrally control security policies and authentication events. Support Regulatory Compliance The ability to use multiple factors and create complex passwords that users do not have to remember assists with meeting HIPAA and HITECH mandates. Event logs provide audit trails of who accessed what and when. Eliminate Forgotten Passwords and Boost Productivity Easy to use. Users simply scan a finger instead of remembering and entering complex passwords. Increases productivity. Reduce IT Support Costs The average cost of a password-related IT support call is $70 (USD). DigitalPersona composite authentication significantly reduces the frequency of these types of calls. A BROAD ARRAY OF AUTHENTICATION FACTORS WHAT YOU KNOW WHO YOU ARE WHAT YOU HAVE WHAT YOU DO WHERE YOU ARE WHEN YOU ACT Password PIN Recovery Questions Fingerprint Smartcards and USBs Contactless Card Proximity Card Bluetooth Device Keystroke Behavioral Biometrics* GPS Location IP Address Geo-Fencing Time Frame Geo-Velocity One-Time Password TRADITIONAL FACTORS RISK-BASED FACTORS

DigitalPersona Architecture DigitalPersona is an advanced authentication solution that fits well into healthcare environments. It deploys into any type of hospital environment complex or simple working with back-end systems to scale up to any size. The wide range of authentication methods ensures healthcare workers receive quick, secure access to the critical systems they need. DigitalPersona provides a flexible, scalable and secure architecture that allows hospitals and healthcare organizations to deploy strong multifactor employee authentication to shared computing resources, applications and workflows. Covered applications include: Allscripts, CareFusion, Cerner Millennium, Epic, GE Centricity, Kronos, McKesson, Meditech, Pyxis, QuadraMed, Softlab and more. Authentication Workflow Password Manager Controls The Traditional Login Screen The ability to manually input a user ID and password can be disabled so that the DigitalPersona solution is now managing a randomized complex password that requires no memorization. VERIFY YOUR IDENTITY SMART CARD PASSWORD FINGERPRINT VERIFY YOUR IDENTITY SMART CARD PASSWORD FINGERPRINT Users Authenticate Rapidly The user provides their assigned credential, such as a fingerprint, card, PIN or one-time password (OTP) to rapidly complete authentication. Security is further protected. John Smith ******** DigitalPersona Completes Application Login Once authenticated by the DigitalPersona authentication server, the user s credentials are automatically populated to complete the login process. John Smith ********

Composite Authentication Use Cases for Healthcare Preparing for Rounds When clinical staff prepare for visits, they log in to many applications and access patient data. With DigitalPersona, logging in to any application is seamless and more secure with strong authentication and SSO. No more shared or memorized passwords, notes or helpdesk calls. Accessing Medical Records After visiting a patient, doctors and nurses update their records and prescribe medication from the shared thin clients available in patients rooms. With fingerprint biometrics, authorized personnel quickly and securely log in to their clinical applications or personal virtual desktop. Dispensing Medications Nurses often use mobile carts equipped with laptops. With DigitalPersona randomized complex password, which does not need memorization if a biometric authentication factor is in place, any authorized nurse can easily authenticate using fingerprints, smart cards or other easy credentials when dispensing controlled substances. Offsite Patient Visit Doctors may forget their passwords when using laptops or tablets offsite. DigitalPersona provides an access recovery feature to avoid lockouts due to forgotten passwords. No network or Internet connection is required. On Boarding New Staff When new employees are hired, they register their fingerprints or other approved credentials as part of the regular HR process. Their credentials are automatically provisioned throughout the environment so they can access their accounts, applications or virtual desktops from any computer.

Crossmatch 3950 RCA Boulevard, Suite 5001 Palm Beach Gardens, FL 33410 Tel: +1 561 622 1650 Fax: +1 561 622 9938 crossmatch.com About Crossmatch Crossmatch helps organizations solve their identity management challenges through biometrics. Our enrollment and authentication solutions are trusted to create, validate and manage identities for a wide range of government, law enforcement, financial institution, retail and commercial applications. Our solutions are designed using proven biometric technologies, flexible enrollment and strong multi-factor authentication software, and deep industry expertise. We offer an experienced professional services capability to assess, design, implement and optimize our identity management solutions for a customer s individual challenges. Our products and solutions are utilized by over 200 million people in more than 80 countries. Copyright 2017 2018 Crossmatch. All rights reserved. Specifications are subject to change without prior notice. Crossmatch and the Crossmatch logo are registered trademarks of Cross Match Technologies, Inc. in the United States and other countries. DigitalPersona and the DigitalPersona logo are registered trademarks of DigitalPersona, Inc. in the United States and other countries. DigitalPersona, Inc. is owned by the parent company of Cross Match Technologies, Inc. All other brand and product names are trademarks or registered trademarks of their respective owners. 20180511