Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems

Size: px
Start display at page:

Download "Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems"

Transcription

1 Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems DISCUSSION DOCUMENT JULY PARC, 3333 Coyote Hill Road, Palo Alto, California USA

2 Executive Summary This is a proposition for the design and deployment of a communication platform for medical devices and healthcare management systems based on PARC s Content-Centric Networking (CCN) technology. It includes use case scenarios and innovation propositions for medical device and healthcare provisioning companies. 1. Introduction Personal wellness, remote health monitoring, and assisted living are growing healthcare markets that are expanding the use of mobile devices and services that can securely record, store, and share personal healthcare data. Smartphones and tablets are increasing in both consumer and healthcare sectors and there are thousands of medical and healthcare applications available. Consumers, healthcare providers, medical equipment vendors, and physicians are recognizing the benefits of mobile healthcare devices and services to monitor and share patient vitals with physicians, to provide personal access to aggregated health information, and to use in emergency response situations where there is limited access to infrastructure. However, these devices, systems, and applications also present challenges around ensuring privacy and security, connecting multiple heterogeneous devices, and aggregating and sharing information. Such obstacles hinder the usability and deployment of solutions using existing networking technologies. Instead of piecing together network components and security services or segmenting infrastructure and information, we argue there is a clear need to develop a secure unified communication platform for access, storage, and transmission of health and wellness data. 2. About Content-Centric Networking (CCN) CCN is an alternative approach to the networking architecture based on the principle that a communication network should allow a user to focus on the data he or she needs, rather than having to reference a specific, physical location from where that data is to be retrieved. CCN enables content caching to reduce congestion and improve delivery speed, a simpler configuration of network devices, and building security into the network at the data level. The initiative continues to gain momentum with an open source code release, Android implementation release, commercial engagements with prominent industrial partners, government funding for a multi-institution project, and the CCN community meeting recently hosted at PARC. 3. Strategic Vision CCN enables secure, infrastructure-independent, easy-to-manage communication between medical devices for personal use and point-of-care access. The CCN platform, with its strong security and device association and configurability, is the ideal architecture for infrastructure-less emergency settings because it does not rely on a traditional client-server model. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 2

3 Some specific benefits of CCN technology include: Plug and Play Device Communication The intuitive device association enables configuration of medical devices that can communicate with each other to efficiently share and transport data. CCN-based enrollment and device association mechanisms allow for intuitive pairing, configuration, and set up of multiple devices. Trust and Security The data-centric security model enables secure sharing of sensitive content. CCN s security model is focused on securing the content itself, as opposed to endpoints. Regardless of where the packets travel across the network, content is protected. This fundamental protection does not prevent the use of additional security measures (i.e., encrypted transmission between sites to meet regulatory requirements). Scalable Dissemination CCN s fully distributed architecture eliminates single points of failure and centralized bottlenecks by moving away from traditional client-server architectures and focusing on content as the means of communication. Utilizing the storage and communication capabilities on heterogeneous devices enables scalable dissemination and propagation to provide a platform for health and wellness data, not only for the users, but also approved providers and partners. Healthcare Data and Access Management CCN s approach to healthcare information management is not constrained to a single device repository and does not require deploying complicated infrastructure for centralized health records servers. CCN s fundamental properties not only allow applications and services to operate on mobile devices, but excel at utilizing their mobility and limited resources. This new platform allows health and wellness data to be personalized for privacy and access control, allowing for different views of the data to different groups or categories (e.g., friends, family, physicians) through CCN encryption methods. Information can be shared through pre-established links, such as daily health summaries going to a relative, or through opportunistic links, such as an in-person medical examination at a doctor s office. 4. Potential Initiatives and Use Cases Here are some potential initiatives and use cases for CCN with medical devices and healthcare management systems. Further details of the implementation and additional use cases can be outlined with a potential partner company once goals and objectives are aligned. A unified communications platform for mobile medical devices and healthcare management systems CCN-based technologies allow medical devices to wirelessly enroll, share, and access sensitive content securely without the need for deployed infrastructure or backend systems support. Using CCN s data-centric cryptographic methods, health and wellness data can be shared securely with privacy levels defined and set by the user or provider. CCN s highly usable enrollment procedures can be applied to multiple medical device types. The protocol-agnostic communication model of CCN enables the building of a low-cost communication platform for a set of heterogeneous devices. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 3

4 Use cases include: A newly acquired medical device, such as a blood pressure monitor, can configure itself to pair and synchronize with other devices such as a patient s or nurse s smartphone or tablet. This use case can also be generalized to alternative devices and settings. A user can privately monitor her weight as part of personal wellness routine, share the cholesterol level securely with the clinic, and make her fitness routine available to her friends. CCN s cryptographic methods enable applications and systems to create interfaces to define and implement privacy levels and secure sharing of personal device data. When connected, CCN enabled services and devices are able to disseminate personal health records as appropriate. For example, while at home on their network or in the doctor s office, a patient s mobile device can seamlessly transmit data collected using medical devices to the provider s backend storage service without configuration or explicitly connecting to the service. A user can have secure access to all her health records whether at home, at work, or on the move. Wellness data can be transmitted to a partner or healthcare provider that does not use the provider s platform. Emergency Response Scenarios CCN-based secure data sharing without the reliance on dedicated support infrastructure enables new products and services for emergency response scenarios. A CCN-enabled emergency response device can be used on a patient to collect and synchronize data as tests are performed with an emergency caregiver s device. The data can also be synchronized with an attendant s tablet or other devices in an ambulance and (optionally) with a backend database. The device can disseminate the data securely as the ambulance arrives at the hospital to deliver all the vitals to the doctor in charge. The data can also facilitate a patient s admission by having the patient s credentials or insurance information retrieved and integrated with the pertinent information from providers. The data sharing remains secure and free from the danger of a privacy breach. Federal regulations are easily incorporated for communication between devices; they are simply an added layer of protection around the secured content transmissions. 5. CCN Differentiation CCN s healthcare information management approach differentiates products by providing benefits that are either impossible to realize today, or require complicated networks, systems, and configurations. CCN s architecture and supporting libraries reduce development and deployment costs by working with general, multi-user and heterogeneous devices. CCN s properties make it trivial to secure and share data between devices, allowing monitoring systems at clinics, home and on personal mobile devices. This approach leaves the patient in control of their information while enabling flexible information sharing. Patient and doctors can share historic data when the patient visits their doctor without requiring a cloud-based infrastructure. Alerts can be defined by a doctor and accepted by a patient, then sent to the doctor as needed based on an explicit pairing between the two, facilitating easy, confidential sharing. Caregiver and family relationships securely define those roles. Systems and applications built on CCN can also be customized to user needs. Federal regulations can be used to guide data ownership and protection while opening up access to approved parties with secured enrollment and access control. Usability for both the owner of the data, and those who need access to it is of extremely high importance. With CCN as the underlying architecture, one can be sure that the data in the system is correct, unmodified and protected, all while allowing it to naturally flow where it is needed. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 4

5 6. An Opportunity for Joint Innovation PARC welcomes collaborators to develop services and systems leveraging CCN and its unique benefits for health information management.ccn enables the collection, storage, and trusted sharing of personal information with strong access control for pre-established relationships and ad hoc needs. Specific examples of innovation may include: A person-centric trust model for ehealth information, specifically how users and health providers express identity and how the system uses those trust relationships for information sharing and aggregation. Exploring how core CCN technologies, like identity and access control by encryption, could be applied for healthcare information management. This would lead to innovations in existing information management and dissemination systems. Collecting and disseminating medical device data aggregated on multiple devices without centralized services, including accessing same-patient data records collected via multiple sources such as in-home monitors and doctor s office visits. Lightweight pairing, authentication, revocation, and secure data sharing over open wireless ISM broadcast channels. A content-oriented paradigm for restricted data views and summarization with access control by encryption. Ethnographic study of personal mobile health usage leading to consumer-friendly device designs and interfaces that solve real-world problems. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 5

6 Next Steps Over the years, PARC has developed a roadmap for defining projects in a way that maximizes the likelihood of success. Status Step Outcomes PARC Introductions If Client believes further exploration is warranted, select one to - Business Model three areas to focus on for further exploration - Technology Opportunities Overview of Client s Strategic Interests and Current Capabilities Project Formulation Validation Detailed Proposal Development Contract Development Program Delivery Client provides overview of strategic priorities, internal capabilities/resources. PARC and Client determine areas for further investigation. PARC and Client s internal stakeholders design ways to address Client s strategic priorities. Usually includes technical and business case development. Executives at both Client and PARC agree that the direction outlined is of mutual interest. Although there is no commitment to enter into a contract, each company s executives have reviewed the high-level project and commit to further development of the proposal. Client and PARC team members refine a detailed Statement of Work to achieve desired business results. This includes development of mutually acceptable terms and conditions. After the business and technical parameters have been established, PARC translates these into a Project Agreement for legal review. Once both parties have signed the Project Agreement, senior technical staff of each organization will lead the work at PARC and at the Client. PARC, a Xerox company, is in The Business of Breakthroughs. Practicing open innovation, we provide custom R&D services, technology, expertise, best practices, and IP to global Fortune 500 and Global 1000 companies, startups, and government agency partners. We create new business options, accelerate time to market, augment internal capabilities, and reduce risk for our clients Palo Alto Research Center Incorporated. All Rights Reserved. PARC, the PARC logo and The Business of Breakthroughs are service marks of Palo Alto Research Center Incorporated. All other trademarks used herein are the property of their respective owners. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 6

Intuitive Device Configuration and Home Media Sharing with Content-Centric Networking

Intuitive Device Configuration and Home Media Sharing with Content-Centric Networking Intuitive Device Configuration and Home Media Sharing with Content-Centric Networking DISCUSSION DOCUMENT MARCH 2012 PARC, 3333 Coyote Hill Road, Palo Alto, California 94304 USA +1 650 812 4000 engage@parc.com

More information

How To Optimize Data Center Performance

How To Optimize Data Center Performance Data Center Optimization WHITE PAPER PARC, 3333 Coyote Hill Road, Palo Alto, California 94304 USA +1 650 812 4000 engage@parc.com www.parc.com Abstract Recent trends in data center technology have created

More information

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions. Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R

Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R Table of Contents Introduction.......................................................... 3 The Challenge

More information

Business Case for Voltage SecureMail Mobile Edition

Business Case for Voltage SecureMail Mobile Edition WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Enterprise Data Protection

Enterprise Data Protection PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing

More information

IBM Data Security Services for endpoint data protection endpoint encryption solution

IBM Data Security Services for endpoint data protection endpoint encryption solution Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such

More information

A Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS

A Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS A Unified View of Network Monitoring One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS Executive Summary In the past few years, the enterprise computing technology has changed

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

MENDIX FOR MOBILE APP DEVELOPMENT WHITE PAPER

MENDIX FOR MOBILE APP DEVELOPMENT WHITE PAPER MENDIX FOR MOBILE APP DEVELOPMENT WHITE PAPER TABLE OF CONTENTS Market Demand for Enterprise Mobile Mobile App Development Approaches Native Apps Mobile Web Apps Hybrid Apps Mendix Vision for Mobile App

More information

Mobile Data Security Essentials for Your Changing, Growing Workforce

Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity

More information

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

CA XOsoft Content Distribution v4

CA XOsoft Content Distribution v4 PRODUCT BRIEF: CA XOSOFT CONTENT DISTRIBUTION CA XOsoft Content Distribution v4 CA XOSOFT CONTENT DISTRIBUTION (FORMERLY CA XOSOFT WANSYNC CD) IS A SIMPLE, HIGHLY FLEXIBLE AND COST-EFFECTIVE CONTENT DELIVERY,

More information

A Guide Through the BPM Maze

A Guide Through the BPM Maze A Guide Through the BPM Maze WHAT TO LOOK FOR IN A COMPLETE BPM SOLUTION With multiple vendors, evolving standards, and ever-changing requirements, it becomes difficult to recognize what meets your BPM

More information

Unified Device Management Allows Centralized Governance of Corporate Network Devices

Unified Device Management Allows Centralized Governance of Corporate Network Devices Unified Device Management Allows Centralized Governance of Corporate Network Devices Published July 2013 The recent bring your own device trend that allows employees to use devices they own for business

More information

MOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper

MOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper MOBILIZING ORACLE APPLICATIONS ERP An Approach for Building Scalable Mobility Solutions A RapidValue Solutions Whitepaper TABLE OF CONTENTS Executive Overview Typical Architecture for Mobilizing Oracle

More information

Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device

Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device The Healthcare Sector at the NCCoE MARCH, 3 2016 THE NATIONAL CYBERSECURITY LAB HELPS SECURE HIT 1. About Us: The National Cybersecurity

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza ngqlut003@myuct.ac.za UCT Department of Computer Science Abstract:

More information

Moving Network Management from OnSite to SaaS. Key Challenges and How NMSaaS Helps Solve Them

Moving Network Management from OnSite to SaaS. Key Challenges and How NMSaaS Helps Solve Them Moving Network Management from OnSite to SaaS Key Challenges and How NMSaaS Helps Solve Them Executive Summary In areas such as sales force automation and customer relationship management, cloud-based

More information

DRIVING BUSINESS VALUE WITH VBLOCK INFRASTRUCTURE PLATFORMS

DRIVING BUSINESS VALUE WITH VBLOCK INFRASTRUCTURE PLATFORMS DRIVING BUSINESS VALUE WITH VBLOCK INFRASTRUCTURE PLATFORMS Private clouds, built on pervasive virtual infrastructures, are increasingly appealing to organizations looking to deliver IT resources to end

More information

ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility

ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility ORACLE MOBILE SUITE COMPLETE MOBILE DEVELOPMENT AND DEPLOYMENT PLATFORM KEY FEATURES Productivity boosting mobile development framework Cross device/os deployment Lightweight and robust enterprise service

More information

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption Putting cloud storage

More information

Balancing Security and Speed: Developing Mobile Apps for Enterprise

Balancing Security and Speed: Developing Mobile Apps for Enterprise Balancing Security and Speed: Developing Mobile Apps for Enterprise Contents Executive Summary 3 The Realities of Developing Secure Enterprise Applications 3 How Data Leaves Mobile Devices 3 Partnering

More information

Product Overview: Software Update Management for Automotive. Wireless software update & management service for Automotive manufacturers

Product Overview: Software Update Management for Automotive. Wireless software update & management service for Automotive manufacturers B L A C K B E R R Y M 2 M S O L U T I O N S Product Overview: Software Update Management for Automotive Wireless software update & management service for Automotive manufacturers Product Overview BlackBerry

More information

Industrial Communication. Securing Industrial Wireless

Industrial Communication. Securing Industrial Wireless Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...

More information

perspective Microservices A New Application Paradigm Abstract

perspective Microservices A New Application Paradigm Abstract perspective Microservices A New Application Paradigm Abstract Microservices Architecture is introducing the concept of developing functionality as a number of small self-contained services. This paper

More information

Cellular Wireless technology: Creating a link between people and the healthcare community

Cellular Wireless technology: Creating a link between people and the healthcare community Cellular Wireless technology: Creating a link between people and the healthcare community Introduction Demands on health-care systems worldwide have increased to the point where the delivery and cost of

More information

A guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services

A guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services A guide to HP enterprise mobility solutions Expanding the potential of your business with advanced mobility services Going mobile, staying ahead These days, hardworking enterprise IT and technology managers

More information

Securing Health Data in a BYOD World

Securing Health Data in a BYOD World BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

The Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service

The Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service The Technical Differential: Technical WHITE PAPER Table of Contents Executive Summary...3 Partnering With VMware Makes Business Sense...3 The VMware DaaS Blueprint...3 The VMware Technology Advantage...4

More information

Mobility and cloud transform access and delivery of apps, desktops and data

Mobility and cloud transform access and delivery of apps, desktops and data Mobility and cloud transform access and delivery of apps, desktops and data Unified app stores and delivery of all apps (Windows, web, SaaS and mobile) and data to any device, anywhere. 2 The cloud transforms

More information

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you

More information

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

can you effectively plan for the migration and management of systems and applications on Vblock Platforms? SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Low-Cost Multi-Service Home Gateway Creates New Business Opportunities

Low-Cost Multi-Service Home Gateway Creates New Business Opportunities 4000 Bridgeway, Suite 303 Sausalito, CA 94965 http://www.coactive.com Voice: (415) 289-1722 Fax: (415) 289-1320 info@coactive.com Low-Cost Multi-Service Home Gateway Creates New Business Opportunities

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Miami University. Payment Card Data Security Policy

Miami University. Payment Card Data Security Policy Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that

More information

Get Control of Your Data Center. Application Delivery Controllers

Get Control of Your Data Center. Application Delivery Controllers White Paper Get Control of Your Data Center Application Delivery Controllers May 2011 Get Control of Your Data Center Access. Security. Delivery. Introduction Data center and networking technologies have

More information

New York ehealth Collaborative. Health Information Exchange and Interoperability April 2012

New York ehealth Collaborative. Health Information Exchange and Interoperability April 2012 New York ehealth Collaborative Health Information Exchange and Interoperability April 2012 1 Introductions Information exchange patient, information, care team How is Health information exchanged Value

More information

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda

More information

Privacy and Identity Management for Europe

Privacy and Identity Management for Europe Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information

More information

How To Protect Data On Network Attached Storage (Nas) From Disaster

How To Protect Data On Network Attached Storage (Nas) From Disaster White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains

More information

SOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business

SOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business SOLUTION BRIEF MOBILE SECURITY Securely Accelerate Your Mobile Business CA Technologies allows you to accelerate mobile innovation for customers and employees without risking your enterprise data or applications.

More information

Two-Factor Authentication

Two-Factor Authentication WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance

More information

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government

More information

Mobility for Me. When used effectively Contextual Mobility can:

Mobility for Me. When used effectively Contextual Mobility can: Mobility for Me Over 250 communications providers around the world trust TIBCO with the management of their products, services and the customers that use them. 2 Mobility for Me Create a communications

More information

Comparing Mobile VPN Technologies WHITE PAPER

Comparing Mobile VPN Technologies WHITE PAPER Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

BlackBerry Mobile Voice System

BlackBerry Mobile Voice System BlackBerry Mobile Voice System Mobile Unified Communications BlackBerry Mobile Voice System (BlackBerry MVS) brings desk phone features to BlackBerry smartphones. Work with one business number at the office

More information

How To Use A Vmware View For A Patient Care System

How To Use A Vmware View For A Patient Care System Delivering Epic Hyperspace Through VMware View Using Kiosk Mode and Zero Clients Reference Implementation for a VMware Point-of-Care Solution WHITE PAPER About VMware Reference Implementations VMware Reference

More information

The PerspecSys PRS Solution and Cloud Computing

The PerspecSys PRS Solution and Cloud Computing THE PERSPECSYS KNOWLEDGE SERIES Solving Privacy, Residency and Security in the Cloud Data Compliance and the Enterprise Cloud Computing is generating an incredible amount of excitement and interest from

More information

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA

HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA Executive Summary While a number of organizations are gaining experience and increased

More information

Mastering the Mobile Challenge

Mastering the Mobile Challenge Enterprise Device Enablement Mastering the Mobile Challenge How enterprises and vendors can improve viability, applicability, and security of mobile deployments Introduction Welcome to the post-pc world,

More information

activecho Frequently Asked Questions

activecho Frequently Asked Questions activecho Frequently Asked Questions What are the benefits of activecho? activecho allows your organization to provide an on-premise, managed and secure alternative to Dropbox and other file synching and

More information

Oracle Real Time Decisions

Oracle Real Time Decisions A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)

More information

Streamlining Healthcare Business Interactions

Streamlining Healthcare Business Interactions WHITE PAPER Streamlining Healthcare Business Interactions Sponsored by: Axway Lynne Dunbrack December 2014 IDC HEALTH INSIGHTS OPINION Today's changing healthcare IT (HIT) environments are generating a

More information

GO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime

GO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime YOUR Enterprise GO!es MOBILE The Challenge Mobile devices are the latest and hottest channel for m- services delivery and mobile marketing campaigns. Today s enterprises are deploying consumer-oriented

More information

IBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite

IBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite IBM Software IBM Business Process Management Suite Increase business agility with the IBM Business Process Management Suite 2 Increase business agility with the IBM Business Process Management Suite We

More information

Emergency Medical Data Management through an Enhanced Cloudbased Push Messaging Mechanism

Emergency Medical Data Management through an Enhanced Cloudbased Push Messaging Mechanism Emergency Medical Data Management through an Enhanced Cloudbased Push Messaging Mechanism Vassiliki Koufi, Flora Malamateniou, and George Vassilacopoulos University of Piraeus, Department of Digital Systems,

More information

Cellular Data Offload. And Extending Wi-Fi Coverage. With Devicescape Easy WiFi

Cellular Data Offload. And Extending Wi-Fi Coverage. With Devicescape Easy WiFi Cellular Data Offload And Extending Wi-Fi Coverage With Devicescape Easy WiFi Case Study October 2010 List of Acronyms 3G Third Generation 4G Fourth Generation API Application Programming Interface AP

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE Solution Overview The VMware View Mobile Secure Desktop solution is a powerful architecture intended

More information

End-to-End Innovation Solutions. for Telehealth and Remote Patient Monitoring

End-to-End Innovation Solutions. for Telehealth and Remote Patient Monitoring End-to-End Innovation Solutions for Telehealth and Remote Patient Monitoring S3 Group is a global provider of telehealth solution consultancy to medical device vendors and healthcare providers. S3 Group

More information

How To Get To A Cloud Storage And Byod System

How To Get To A Cloud Storage And Byod System Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although

More information

For healthcare, change is in the air and in the cloud

For healthcare, change is in the air and in the cloud IBM Software Healthcare Thought Leadership White Paper For healthcare, change is in the air and in the cloud Scalable and secure private cloud solutions can meet the challenges of healthcare transformation

More information

A Standards-based Mobile Application IdM Architecture

A Standards-based Mobile Application IdM Architecture A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

Transform your organization

Transform your organization Transform your organization through Business Mobility >80% More than 80 percent of organizations recognize the impact of mobile transformation on internal and external stakeholders and have created dedicated

More information

The 9 Pillars of Enterprise Mobility

The 9 Pillars of Enterprise Mobility The 9 Pillars of Enterprise Mobility Building a framework that benefits IT, users and the business An Enterprise Mobility Program (EMP) focuses on policies, processes and enabling technologies that align

More information

Smartphone Enterprise Application Integration

Smartphone Enterprise Application Integration WHITE PAPER MARCH 2011 Smartphone Enterprise Application Integration Rhomobile - Mobilize Your Enterprise Overview For more information on optimal smartphone development please see the Rhomobile White

More information

Backup and Recovery: The Benefits of Multiple Deduplication Policies

Backup and Recovery: The Benefits of Multiple Deduplication Policies Backup and Recovery: The Benefits of Multiple Deduplication Policies NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change

More information

IBM MobileFirst Managed Mobility

IBM MobileFirst Managed Mobility Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the

More information

API Architecture. for the Data Interoperability at OSU initiative

API Architecture. for the Data Interoperability at OSU initiative API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models

More information

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum. For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health

More information