How Single Sign-On Is Changing Healthcare: SSO Vendor Comparison

Size: px
Start display at page:

Download "How Single Sign-On Is Changing Healthcare: SSO Vendor Comparison"

Transcription

1 How Single Sign-On Is Changing Healthcare: SSO Vendor Comparison Sponsored by Imprivata Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon Institute Research Report

2 How Single Sign-On Is Changing Healthcare: SSO Vendor Comparison Ponemon Institute, June 2011 Introduction Ponemon Institute is pleased to present a comparative analysis of Imprivata Single Sign-On (SSO) with other companies that offer SSO technology. The analysis is based on a research study sponsored by Imprivata to determine what IT practitioners think about the influence SSO is having on the healthcare industry. Single sign-on automates the login process, enabling clinicians and IT practitioners to login only once to their desktop in order to gain faster access to applications removing clicks, keystrokes and complex passwords. In light of the rigorous data security requirements in the healthcare industry, SSO and authentication management are almost always deployed together. The combination is growing in popularity because, as shown by our research, it increases employee productivity, reduces helpdesk calls, and strengthens security. We surveyed a total of 404 individuals who work for healthcare organizations and who use SSO technology. They work in private and public hospitals or integrated delivery healthcare systems. Most of the respondents work in IT functions such as operations, data security, IT compliance, quality assurance, network management, helpdesk operations and other key MIS functions. Of the 404 participants in the study, 65 are customers of Imprivata. Bar Chart 1: Frequency of competitor SSOs used in healthcare organizations Microsoft Sentillion Vergence 19% Imprivata IBM Tivoli Access Manager Encentuate HealthCast exactaccess 1 14% 16% Carefx Fusionfx 12% All others combined CA Technologies Passlogix v-go Single Sign-on Novell SecureLogin 7% 6% Bar Chart 1 shows the frequency of seven SSO products or brands that are known to compete with Imprivata s. Twenty-nine companies represent the other category, which is composed of nominal companies in the SSO marketplace. Comparison of to other SSO providers 2% 4% 6% 8% 1 12% 14% 16% 18% 2 We compare to an aggregate sample of its competitors based on IT practitioners responses to survey questions about clinician satisfaction, efficiency, economic impact and security. Most of our findings compare respondents who use versus those who use another single sign-on (competitor) solution. This cluster of competitors includes seven leading SSO providers as shown in Bar Chart 1 above. Ponemon Institute Research Report Page 1

3 Clinician satisfaction Bar Chart 2: Is your SSO solution important to increasing clinician satisfaction? % 1 11% 12% 3% Yes No Unsure According to Bar Chart 2, 85 percent of users believe SSO increases clinician satisfaction within their healthcare organization. In comparison, 73 percent of respondents using other SSO solutions believe this to be true. Survey respondents were asked to rank the order of six most likely reasons for deploying SSO in their healthcare organization. While not shown in a graphical presentation, users rank clinician satisfaction as the number one reason for using this solution. In contrast, improved security is the number one reason for using competitors solutions. Efficiency Bar Chart 3: Does your SSO solution simplify access to applications and data? % 81% 1 8% 4% Yes No Unsure In our survey we defined efficiency as the total time and related cost savings experienced through the use of SSO versus other authentication methods or not using SSO at all. Bar Chart 3 shows 92 percent of users versus 81 percent of competitor solution users believe SSO simplifies access to applications and data within their healthcare organization. Ponemon Institute Research Report Page 2

4 Bar Chart 4: Why do you believe single sign-on improves efficiency? Directly observed improvements 3 3 Word-of-mouth or comments from clinicians or other users Experienced improvements as a user 26% 2 23% 21% Measured productivity improvements 7% Informal belief or gut feel 9% Bar Chart 4 shows a majority of both and other SSO users say they have either directly observed productivity improvement (35 vs. 30 percent) or personally experienced efficiency gains as a single sign-on user in the workplace (21 vs. 23 percent). Bar Chart 5: Does single sign-on improve healthcare operations? Significant improvement and some improvement combined Improves the efficiency of clinical operations Improves physician access times to EMR applications 63% 69% 82% 88% Improves the efficiency of IT operations 7 Improves the efficiency of administrative activities Improves physician adoption of EMR applications 67% 73% 71% Clinical, IT operations and administration all realize improvements in efficiency. According to Bar Chart 5, 88 percent of users, versus 69 percent of other SSO users, state single sign-on improves the efficiency of clinical operations. Seventy-five percent of users versus 61 percent of other SSO users state single sign-one improves the efficiency of IT operations. Finally, 73 percent of users versus 67 percent of other SSO users believe single sign-on improves to the efficiency of administrative activities. Seventy-one percent of users versus 61 percent of other SSO users believe SSO facilitates clinician adoption of electronic medical record (EMR) applications. Further, 82 percent of users versus 63 percent of other SSO users believe single sign-on reduces physician access times to EMR applications. Ponemon Institute Research Report Page 3

5 Bar Chart 6: How much time does single sign-on save clinicians and IT practitioners? Extrapolated values in minutes per day Time in minutes Clinicians 8.1 IT practitioners 9.3 As shown in Bar Chart 6, the extrapolated average time saving for clinicians who use is 14.6 minutes per day, versus 8.1 minutes per day for users of other SSO solutions. Similarly, the time saving for IT practitioners who use is 14.8 minutes per day, versus 9.3 minutes for the cluster of other competitor s products. Hence, appears to lead to greater time saving than the cluster of other SSO providers. Economic benefits of single sign-on Bar Chart 7: Do you believe that the single sign-on solution supports your organization s effort to demonstrate the meaningful use of electronic medical records? % 2 22% 16% 16% Yes No Unsure Bar Chart 7 shows 61 percent of users versus 59 percent of other SSO users believe single sign-on solutions support their organization s effort to demonstrate the meaningful use of EMR and related information systems. 1 1 The Health Information Technology for Economic and Clinical Health (HITECH) Act (enacted as part of the American Recovery and Reinvestment Act of 2009) defines what healthcare providers need to show in order to qualify for Medicare and Medicaid electronic medical record (EMR) incentives for the meaningful use of certified EMR technology. By putting into action and meaningfully using EMR systems, healthcare providers receive financial incentives. Ponemon Institute Research Report Page 4

6 We asked both and other SSO users to estimate the cost savings associated with SSO deployment in their organizations. Table 1 reports our extrapolation method for determining these cost savings. As can be seen, we estimate an average annual cost savings per clinician of $4,102 for and $2,278 for other competitors solutions used in healthcare. 2 Table 1: Assumptions for clinicians Calculus Average time saving for clinical staff every day in minutes A = Survey Average number of clinicians using single signon B = Survey Time savings for all clinicians per day in minutes C = (A x B) 11,461 6,180 Extrapolated time savings for all clinicians per day in hours D = (C / 60) Cost of average clinical staff member per year E = Estimate $135,000 $135,000 Cost of average clinical staff member per day F = (E / 250 days) Cost of average clinical staff member per hour G = (F / 8 hrs) Cost savings for clinicians each day H =(G x D) $12,894 $6,953 Cost savings for clinicians each year I = (H x 250 days) $3,223,482 $1,738,231 Cost savings per clinician each year J = (I / B) $4,102 $2,278 Bar Chart 8: Perceptions about SSO and its impact on healthcare organizations Strongly agree and agree response combined Single sign-on improves the security of information, applications and IT infrastructure in my organization Single sign-on improves the efficiency of clinical operations in my organization Single sign-on improves the efficiency of administrative and IT operations in my organization Single sign-on improves my organization s ability to comply with data protection and privacy requirements such as HIPAA Efficiency improvements realized from single sign-on translate into tangible cost savings 54% % 7 69% 38% Bar Chart 8 reports 75 percent of users and 54 percent of other SSO users believe single sign-on improves the security of information, applications and IT infrastructure within their organization. Sixty-nine percent of users and 61 percent of other SSO users believe single sign-on improves their organization s ability to comply with difficult data protection and privacy requirements such as those espoused under HIPAA. 2 The extrapolated savings shown in this analysis are based on the assumption that clinician efficiency improvements reduce headcount. Alternatively, we could assume that the efficiency gain actually generates more time with patients, thus increasing hospital revenues. Ponemon Institute Research Report Page 5

7 Caveats Ponemon Institute independently conducted all phases of this project including the survey design, survey administration and the analysis of OneSIgn and other SSO users (two separate samples). Despite careful sampling, data collection and analysis procedures, there is always a possibility that the two samples of respondents were not representative of the underlying population of SSO users in the healthcare environment. There is also the possibility that survey questions did not fully capture each respondent s candid opinions about the SSO products that are presently deployed by organizations. Ponemon Institute Advancing Responsible Information Management Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations. As a member of the Council of American Survey Research Organizations (CASRO), we uphold strict data confidentiality, privacy and ethical research standards. We do not collect any personally identifiable information from individuals (or company identifiable information in our business research). Furthermore, we have strict quality standards to ensure that subjects are not asked extraneous, irrelevant or improper questions. Ponemon Institute Research Report Page 6

How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United States

How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United States How Single Sign-On Is Changing Healthcare A Study of IT Practitioners in Acute Care Hospitals in the United States Sponsored by Imprivata Independently conducted by Ponemon Institute LLC Publication Date:

More information

The TCO of Software vs. Hardware-based Full Disk Encryption Summary

The TCO of Software vs. Hardware-based Full Disk Encryption Summary The TCO of vs. -based Full Disk Encryption Summary Sponsored by WinMagic Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Industry Co-Sponsors Ponemon Institute Research Report

More information

Best Practices in Data Protection Survey of U.S. IT & IT Security Practitioners

Best Practices in Data Protection Survey of U.S. IT & IT Security Practitioners Best Practices in Data Protection Survey of U.S. IT & IT Security Practitioners Sponsored by McAfee Independently conducted by Ponemon Institute LLC Publication Date: October 2011 Ponemon Institute Research.

More information

The Cost of Web Application Attacks

The Cost of Web Application Attacks The Cost of Web Application Attacks Sponsored by Akamai Technologies Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Ponemon Institute Research Report Part 1. Introduction The

More information

IBM QRadar Security Intelligence: Evidence of Value

IBM QRadar Security Intelligence: Evidence of Value IBM QRadar Security Intelligence: Evidence of Value Independently conducted by Ponemon Institute LLC February 2014 Ponemon Institute Research Report Background IBM QRadar: Evidence of Value Ponemon Institute:

More information

The Unintentional Insider Risk in United States and German Organizations

The Unintentional Insider Risk in United States and German Organizations The Unintentional Insider Risk in United States and German Organizations Sponsored by Raytheon Websense Independently conducted by Ponemon Institute LLC Publication Date: July 2015 2 Part 1. Introduction

More information

Global Insights on Document Security

Global Insights on Document Security Global Insights on Document Security Sponsored by Adobe Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report Global Insights on Document Security

More information

Electronic Health Information at Risk: A Study of IT Practitioners

Electronic Health Information at Risk: A Study of IT Practitioners Electronic Health Information at Risk: A Study of IT Practitioners Sponsored by LogLogic Conducted by Ponemon Institute LLC October 15, 2009 Ponemon Institute Research Report Executive summary Electronic

More information

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011

More information

Data Breach: The Cloud Multiplier Effect

Data Breach: The Cloud Multiplier Effect Data Breach: The Cloud Multiplier Effect Sponsored by Netskope Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report Part 1. Introduction Data Breach:

More information

Data Security in Development & Testing

Data Security in Development & Testing Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development

More information

Cloud Security: Getting It Right

Cloud Security: Getting It Right Cloud Security: Getting It Right Sponsored by Armor Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute Research Report Cloud Security: Getting It Right Ponemon

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013 Ponemon Institute Research Report

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report

More information

Understanding Security Complexity in 21 st Century IT Environments:

Understanding Security Complexity in 21 st Century IT Environments: Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted

More information

The Importance of Cyber Threat Intelligence to a Strong Security Posture

The Importance of Cyber Threat Intelligence to a Strong Security Posture The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report

More information

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Achieving Security in Workplace File Sharing Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction Achieving

More information

Boost Healthcare Security and Patient Care with Imprivata Enhanced VDI

Boost Healthcare Security and Patient Care with Imprivata Enhanced VDI White Paper Boost Healthcare Security and Patient Care with Imprivata Enhanced VDI Erik Willey 12.12.2014 SUMMARY: Imprivata OneSign offers an easy-to-implement solution that works seamlessly within a

More information

The SQL Injection Threat Study

The SQL Injection Threat Study The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April 2014 1 The SQL Injection Threat Study Presented by Ponemon Institute, April

More information

Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital

Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital IDC Health Insights: Healthcare Provider IT Strategies BEST PRACTICES #HI238582

More information

Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers

Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers Leading Practices in Behavioral Advertising & Consumer Privacy Study of Internet Marketers and Advertisers Independently Conducted by Ponemon Institute LLC February 2012 Leading Practices in Behavioral

More information

Challenges of Cloud Information

Challenges of Cloud Information The Challenges of Cloud Information Governance: A Global Data Security Study Sponsored by SafeNet Independently conducted by Ponemon Institute LLC Publication Date: October 2014 Ponemon Institute Research

More information

A Study of Retail Banks & DDoS Attacks

A Study of Retail Banks & DDoS Attacks A Study of Retail Banks & DDoS Attacks Sponsored by Corero Network Security Independently conducted by Ponemon Institute LLC Publication Date: December 2012 Ponemon Institute Research Report A Study of

More information

Compliance Cost Associated with the Storage of Unstructured Information

Compliance Cost Associated with the Storage of Unstructured Information Compliance Cost Associated with the Storage of Unstructured Information Sponsored by Novell Independently conducted by Ponemon Institute LLC Publication Date: May 2011 Ponemon Institute Research Report

More information

What You Don t Know Will Hurt You: A Study of the Risk from Application Access and Usage

What You Don t Know Will Hurt You: A Study of the Risk from Application Access and Usage What You Don t Know Will Hurt You: A Study of the Risk from Application Access and Usage Sponsored by ObserveIT Independently conducted by Ponemon Institute LLC June 2015 Ponemon Institute Research Report

More information

The State of Data Security Intelligence. Sponsored by Informatica. Independently conducted by Ponemon Institute LLC Publication Date: April 2015

The State of Data Security Intelligence. Sponsored by Informatica. Independently conducted by Ponemon Institute LLC Publication Date: April 2015 The State of Data Security Intelligence Sponsored by Informatica Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report The State of Data Security

More information

Security of Paper Records & Document Shredding. Sponsored by Cintas. Independently conducted by Ponemon Institute LLC Publication Date: January 2014

Security of Paper Records & Document Shredding. Sponsored by Cintas. Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Security of Paper Records & Document Shredding Sponsored by Cintas Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction

More information

Reputation Impact of a Data Breach U.S. Study of Executives & Managers

Reputation Impact of a Data Breach U.S. Study of Executives & Managers Reputation Impact of a Data Breach U.S. Study of Executives & Managers Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: November 2011 Ponemon

More information

Is Your Company Ready for a Big Data Breach?

Is Your Company Ready for a Big Data Breach? Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication

More information

Data Security in the Evolving Payments Ecosystem

Data Security in the Evolving Payments Ecosystem Data Security in the Evolving Payments Ecosystem Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report

More information

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices

More information

Achieving HIPAA and HITECH Compliance. with Enterprise Single Sign-On

Achieving HIPAA and HITECH Compliance. with Enterprise Single Sign-On Achieving HIPAA and HITECH Compliance with Enterprise Single Sign-On Achieving HIPAA and HITECH Compliance with Enterprise Single Sign-On 1 TABLE OF CONTENTS The Challenges of HIPAA and HITECH Compliance

More information

How to Optimize Epic Clinical Workflows with Imprivata

How to Optimize Epic Clinical Workflows with Imprivata How to Optimize Epic Clinical Workflows with Imprivata Imprivata OneSign gives care providers fast, secure access to patient information by combining single sign-on with strong authentication enabling

More information

The State of Mobile Application Insecurity

The State of Mobile Application Insecurity The State of Mobile Application Insecurity Sponsored by IBM Independently conducted by Ponemon Institute LLC Publication Date: February 2015 Ponemon Institute Research Report Part 1. Introduction The State

More information

Reputation Impact of a Data Breach Executive Summary

Reputation Impact of a Data Breach Executive Summary Reputation Impact of a Data Breach Executive Summary Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: October 2011 Ponemon Institute Research

More information

The Economic and Productivity Impact of IT Security on Healthcare

The Economic and Productivity Impact of IT Security on Healthcare The Economic and Productivity Impact of IT Security on Healthcare Sponsored by Imprivata Independently conducted by Ponemon Institute LLC Publication Date: May 2013 Ponemon Institute Research Report The

More information

The SQL Injection Threat & Recent Retail Breaches

The SQL Injection Threat & Recent Retail Breaches The SQL Injection Threat & Recent Retail Breaches Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2014 1 Part 1. Introduction The SQL Injection Threat &

More information

Understaffed and at Risk: Today s IT Security Department. Sponsored by HP Enterprise Security

Understaffed and at Risk: Today s IT Security Department. Sponsored by HP Enterprise Security Understaffed and at Risk: Today s IT Security Department Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: February 2014 Ponemon Institute Research

More information

Risk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin

Risk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin Risk & Innovation in Cybersecurity Investments Sponsored by Lockheed Martin Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report Part 1. Introduction

More information

The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations

The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations The Billion Dollar Lost Laptop Problem Benchmark study of U.S. organizations Independently conducted by Ponemon Institute LLC Publication Date: 30 September 2010 Ponemon Institute Research Report Part

More information

The Security Impact of Mobile Device Use by Employees

The Security Impact of Mobile Device Use by Employees The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security

More information

Security of Cloud Computing Providers Study

Security of Cloud Computing Providers Study Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011 Ponemon Institute Research Report I. Executive Summary

More information

Security of Cloud Computing Providers Study

Security of Cloud Computing Providers Study Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011 Ponemon Institute Research Report I. Executive Summary

More information

A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS)

A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS) A Planning Guide for Electronic Prescriptions for Controlled Substances (EPCS) The Federal Drug Enforcement Administration (DEA) regulates prescriptions of controlled substances that have risks for abuse.

More information

Sponsored by Zimbra. The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA

Sponsored by Zimbra. The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA Sponsored by Zimbra Independently conducted by Ponemon Institute LLC Publication Date: November 2014 Ponemon Institute

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

Security of Cloud Computing Users Study

Security of Cloud Computing Users Study Security of Cloud Computing Users Study Sponsored by CA Technologies Independently conducted by Ponemon Institute, LLC Publication Date: March 2013 Security of Cloud Computing Users Study March 2013 Part

More information

The State of USB Drive Security

The State of USB Drive Security The State of USB Drive Security U.S. survey of IT and IT security practitioners Sponsored by Kingston Independently conducted by Ponemon Institute LLC Publication Date: July 2011 Ponemon Institute Research

More information

Corporate Data: A Protected Asset or a Ticking Time Bomb?

Corporate Data: A Protected Asset or a Ticking Time Bomb? Corporate Data: A Protected Asset or a Ticking Time Bomb? Sponsored by Varonis Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report Corporate

More information

Meaningful Use, ICD-10 and HIPAA 5010 Overview, talking points and FAQs

Meaningful Use, ICD-10 and HIPAA 5010 Overview, talking points and FAQs Meaningful Use, ICD-10 and HIPAA 5010 Overview, talking points and FAQs Providence Health & Services is committed to using technology and evidence-based practices to deliver the highest quality care in

More information

The Security of Cloud Infrastructure Survey of U.S. IT and Compliance Practitioners

The Security of Cloud Infrastructure Survey of U.S. IT and Compliance Practitioners The Security of Cloud Infrastructure Survey of U.S. IT and Compliance Practitioners Sponsored by Vormetric Independently conducted by Ponemon Institute LLC Publication Date: November 2011 Ponemon Institute

More information

Exposing the Cybersecurity Cracks: A Global Perspective

Exposing the Cybersecurity Cracks: A Global Perspective Exposing the Cybersecurity Cracks: A Global Perspective Part I: Deficient, Disconnected & in the Dark Sponsored by Websense, Inc. Independently conducted by Ponemon Institute LLC Publication Date: April

More information

Perceptions about the Potential Expiration of The Terrorism Risk Insurance Act (TRIA)

Perceptions about the Potential Expiration of The Terrorism Risk Insurance Act (TRIA) Perceptions about the Potential Expiration of The Terrorism Risk Insurance Act (TRIA) Sponsored by Property Casualty Insurers Association of America Independently conducted by Ponemon Institute LLC Publication

More information

State of Web Application Security

State of Web Application Security State of Web Application Security Executive Summary Sponsored by Cenzic & Barracuda Networks Independently conducted by Ponemon Institute LLC Publication Date: February 2011 Ponemon Institute Research

More information

Encryption in the Cloud

Encryption in the Cloud Encryption in the Cloud Who is responsible for data protection in the cloud? Sponsored by Thales e-security Independently conducted by Ponemon Institute LLC Publication Date: July 2012 Ponemon Institute

More information

Economic impact of privacy on online behavioral advertising

Economic impact of privacy on online behavioral advertising Benchmark study of Internet marketers and advertisers Independently Conducted by Ponemon Institute LLC April 30, 2010 Ponemon Institute Research Report Economic impact of privacy on online behavioral advertising

More information

Virtual desktops in hospitals: streamlining clinical workflows

Virtual desktops in hospitals: streamlining clinical workflows Virtual desktops in hospitals: streamlining clinical workflows How providers leverage Citrix and Imprivata solutions to optimize clinical workflows improving quality of care, while complying with industry

More information

Meaningful Use Stage 2. Meeting Meaningful Use Stage 2 with InstantPHR TM. www.getrealhealth.com

Meaningful Use Stage 2. Meeting Meaningful Use Stage 2 with InstantPHR TM. www.getrealhealth.com www.getrealhealth.com Meaningful Use Overview We are at the forefront of the patient engagement era. The American Recovery and Reinvestment Act of 2009 included the Health Information Technology for Economic

More information

Security Metrics to Manage Change: Which Matter, Which Can Be Measured?

Security Metrics to Manage Change: Which Matter, Which Can Be Measured? Security Metrics to Manage Change: Which Matter, Which Can Be Measured? Sponsored by FireMon Independently conducted by Ponemon Institute LLC Publication Date: April 2014 2 Security Metrics to Manage Change:

More information

National Survey on Data Center Outages

National Survey on Data Center Outages National Survey on Data Center Outages Independently conducted by Ponemon Institute LLC Publication Date: 30 September 2010 Part 1. Executive Summary National Survey on Data Center Outages Ponemon Institute,

More information

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS Security solutions for patient and provider access AT A GLANCE Healthcare organizations of all sizes are responding to the demands of patients, physicians,

More information

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon

More information

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013

More information

Advanced Threats in Retail Companies: A Study of North America & EMEA

Advanced Threats in Retail Companies: A Study of North America & EMEA Advanced Threats in Companies: A Study of North America & EMEA Sponsored by Arbor Networks Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Ponemon Institute Research Report

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

Defining the Gap: The Cybersecurity Governance Study

Defining the Gap: The Cybersecurity Governance Study Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining

More information

2014: A Year of Mega Breaches

2014: A Year of Mega Breaches 2014: A Year of Mega Breaches Sponsored by Identity Finder Independently conducted by Ponemon Institute LLC Publication Date: January 2015 Ponemon Institute Research Report Part 1. Introduction 2014: A

More information

CA Technologies Healthcare security solutions:

CA Technologies Healthcare security solutions: CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA

More information

Aftermath of a Data Breach Study

Aftermath of a Data Breach Study Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath

More information

Central Desktop Enterprise Edition (Security Pack)

Central Desktop Enterprise Edition (Security Pack) Central Desktop Enterprise Edition (Security Pack) The Central Desktop Security Pack is included in the Enterprise Edition of Central Desktop. The Enterprise Edition is for companies and organizations

More information

CMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM

CMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM CMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM The Centers for Medicare & Medicaid Services (CMS) and the Office of the National Coordinator

More information

Privacy and Security in a Connected Life: A Study of European Consumers

Privacy and Security in a Connected Life: A Study of European Consumers Privacy and Security in a Connected Life: A Study of European Consumers Sponsored by Trend Micro Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research

More information

Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them.

Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them. Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them. imprivata OneSign The Converged Authentication and Access Management Platform The

More information

Electronic Health Record Adoption

Electronic Health Record Adoption Electronic Health Record Adoption 1 Electronic Health Records (EHR) & Government Regulation Why EHR s are a Hot Topic HITECH Act and American Recovery and Reinvestment Act driving EHR adoption & HIPAA

More information

2012 Application Security Gap Study: A Survey of IT Security & Developers

2012 Application Security Gap Study: A Survey of IT Security & Developers 2012 Application Gap Study: A Survey of IT & s Research sponsored by Innovation Independently Conducted by Ponemon Institute LLC March 2012 1 2012 Application Gap Study: A Survey of IT & s March 2012 Part

More information

Carts, Wall Mounts or Both? Exploring the Best Criteria when Implementing EMR Equipment

Carts, Wall Mounts or Both? Exploring the Best Criteria when Implementing EMR Equipment Carts, Wall Mounts or Both? Exploring the Best Criteria when Implementing EMR Equipment INTRODUCTION Healthcare IT News reports that hospitals are in an EMR (electronic medical record) buying frenzy due

More information

Exposing the Cybersecurity Cracks: A Global Perspective

Exposing the Cybersecurity Cracks: A Global Perspective Exposing the Cybersecurity Cracks: A Global Perspective Part 2: Roadblocks, Refresh and Raising the Human Security IQ Sponsored by Websense Independently conducted by Ponemon Institute LLC Publication

More information

VMware Point of Care Solutions. for Clinicians and Caregivers

VMware Point of Care Solutions. for Clinicians and Caregivers VMware Point of Care Solutions for Clinicians and Caregivers Who is VMware? VMware, the global leader in virtualization and cloud infrastructure, transforms healthcare IT with trusted solutions that improve

More information

Global Survey on Social Media Risks Survey of IT & IT Security Practitioners

Global Survey on Social Media Risks Survey of IT & IT Security Practitioners 0 Global Survey on Social Media Risks Survey of IT & IT Security Practitioners Sponsored by Websense Independently conducted by Ponemon Institute LLC Publication Date: September 2011 1 Global Survey on

More information

State of Web Application Security U.S. Survey of IT & IT security practitioners

State of Web Application Security U.S. Survey of IT & IT security practitioners State of Web Application Security U.S. Survey of IT & IT security practitioners Sponsored by Cenzic & Barracuda Networks Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon

More information

Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R

Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R Table of Contents Introduction.......................................................... 3 The Challenge

More information

How To Understand The Health Care Cloud Computing Market

How To Understand The Health Care Cloud Computing Market HEALTHCARE CLOUD COMPUTING (CLINICAL, EMR, SaaS, PRIVATE, PUBLIC, HYBRID) MARKET Global Trends, Challenges, Opportunities & Forecasts (2012 2017) MarketsandMarkets sales@marketsandmarkets.com www.marketsandmarkets.com

More information

Healthcare Data Interoperability: What s Required to Establish Meaningful Use

Healthcare Data Interoperability: What s Required to Establish Meaningful Use WHITEPAPER Healthcare Data Interoperability: What s Required to Establish Meaningful Use Driving Healthcare Efficiency As the cost of healthcare increases, so does the drive of healthcare organizations

More information

SOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information

SOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT 94% of healthcare organizations

More information

Regional Extension Centers: Support for EMR Adoption and Meaningful Use Achievement. Jennifer McAnally Director, tnrec

Regional Extension Centers: Support for EMR Adoption and Meaningful Use Achievement. Jennifer McAnally Director, tnrec Regional Extension Centers: Support for EMR Adoption and Meaningful Use Achievement Jennifer McAnally Director, tnrec The State of Healthcare Today The United States ranks: 37 th 72 nd 41 st 46 th Overall

More information

Data Loss Risks During Downsizing As Employees Exit, so does Corporate Data

Data Loss Risks During Downsizing As Employees Exit, so does Corporate Data Data Loss Risks During Downsizing As Employees Exit, so does Corporate Data Independently conducted by Ponemon Institute LLC Publication Date: February 23, 2009 Sponsored by Symantec Corporation Ponemon

More information

Caregivers and Computers: The Effect of Electronic Medical Records on Employment and Labor Relations in Nursing Homes

Caregivers and Computers: The Effect of Electronic Medical Records on Employment and Labor Relations in Nursing Homes Caregivers and Computers: The Effect of Electronic Medical Records on Employment and Labor Relations in Nursing Homes FINAL REPORT Submitted to the Quality Care Oversight Committee and 1199SEIU Training

More information

Meaningful Use And Impact on Immunization Outcomes

Meaningful Use And Impact on Immunization Outcomes Meaningful Use And Impact on Immunization Outcomes Objectives Meaningful Use: What does it mean? How it impacts Electronic Health Record (EHR) use What it means to VacTrAK What it means to improved immunization

More information

Privileged User Abuse & The Insider Threat

Privileged User Abuse & The Insider Threat Privileged User Abuse & The Insider Threat Commissioned by Raytheon Company Independently conducted by Ponemon Institute LLC Publication Date: May 2014 1 Privileged User Abuse & The Insider Threat Ponemon

More information

Digital Healthcare: Author. A HIPAA compliant cloud strategy. Choosing a Cloud Service Provider. Alex Ginzburg

Digital Healthcare: Author. A HIPAA compliant cloud strategy. Choosing a Cloud Service Provider. Alex Ginzburg : A HIPAA compliant cloud strategy. Choosing a Cloud Service Provider Author Alex Ginzburg VP of Technology, Intervention Insights, Inc. Kanda Software 200 Wells Ave, Newton, MA 02459 617-340-3850 Over

More information

Applying Lean Principles to Ensure Clinician Productivity while Securing PHI

Applying Lean Principles to Ensure Clinician Productivity while Securing PHI Applying Lean Principles to Ensure Clinician Productivity while Securing PHI Kristi Roose, Information Technology Director Mahaska Health Partnership, Oskaloosa, IA February 23, 2012. 1:00pm DISCLAIMER:

More information

Survey on the Governance of Unstructured Data. Independently Conducted and Published by Ponemon Institute LLC. Sponsored by Varonis Systems, Inc.

Survey on the Governance of Unstructured Data. Independently Conducted and Published by Ponemon Institute LLC. Sponsored by Varonis Systems, Inc. Survey on the Governance of Unstructured Data Independently Conducted and Published by Ponemon Institute LLC Sponsored by Varonis Systems, Inc. June 30, 2008 Please Do Not Quote Without Express Permission.

More information

Regional Extension Centers: Support for EMR Adoption and Meaningful Use Achievement. Raymond Dawson, MBA, MS QSource Director of Operational Services

Regional Extension Centers: Support for EMR Adoption and Meaningful Use Achievement. Raymond Dawson, MBA, MS QSource Director of Operational Services Regional Extension Centers: Support for EMR Adoption and Meaningful Use Achievement Raymond Dawson, MBA, MS QSource Director of Operational Services The State of Healthcare Today The United States ranks:

More information

Enhancing Cybersecurity with Big Data: Challenges & Opportunities

Enhancing Cybersecurity with Big Data: Challenges & Opportunities Enhancing Cybersecurity with Big Data: Challenges & Opportunities Independently Conducted by Ponemon Institute LLC Sponsored by Microsoft Corporation November 2014 CONTENTS 2 3 6 9 10 Introduction The

More information

The State of Data Centric Security

The State of Data Centric Security The State of Data Centric Security Sponsored by Informatica Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report State of Data Centric Security

More information

Dissecting New HIPAA Rules and What Compliance Means For You

Dissecting New HIPAA Rules and What Compliance Means For You Dissecting New HIPAA Rules and What Compliance Means For You A White Paper by Cindy Phillips of CMIT Solutions and Kelly McClendon of CompliancePro Solutions TABLE OF CONTENTS Introduction 3 What Are the

More information

Health Information Technology in Healthcare: Frequently Asked Questions (FAQ) 1

Health Information Technology in Healthcare: Frequently Asked Questions (FAQ) 1 Health Information Technology in Healthcare: Frequently Asked Questions (FAQ) 1 1. What is an Electronic Health Record (EHR), an Electronic Medical Record (EMR), a Personal Health Record (PHR) and e-prescribing?

More information

The basics of Health Information Technology

The basics of Health Information Technology The basics of Health Information Technology 2012 1 What is Health Information Technology? Health IT, or e-health, is increasingly viewed as the most promising tool for improving the overall quality, safety

More information