Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems
|
|
- Coleen Barrett
- 8 years ago
- Views:
Transcription
1 Content-Centric Networking Applications For Medical Devices and Healthcare Management Systems DISCUSSION DOCUMENT JULY PARC, 3333 Coyote Hill Road, Palo Alto, California USA
2 Executive Summary This is a proposition for the design and deployment of a communication platform for medical devices and healthcare management systems based on PARC s Content-Centric Networking (CCN) technology. It includes use case scenarios and innovation propositions for medical device and healthcare provisioning companies. 1. Introduction Personal wellness, remote health monitoring, and assisted living are growing healthcare markets that are expanding the use of mobile devices and services that can securely record, store, and share personal healthcare data. Smartphones and tablets are increasing in both consumer and healthcare sectors and there are thousands of medical and healthcare applications available. Consumers, healthcare providers, medical equipment vendors, and physicians are recognizing the benefits of mobile healthcare devices and services to monitor and share patient vitals with physicians, to provide personal access to aggregated health information, and to use in emergency response situations where there is limited access to infrastructure. However, these devices, systems, and applications also present challenges around ensuring privacy and security, connecting multiple heterogeneous devices, and aggregating and sharing information. Such obstacles hinder the usability and deployment of solutions using existing networking technologies. Instead of piecing together network components and security services or segmenting infrastructure and information, we argue there is a clear need to develop a secure unified communication platform for access, storage, and transmission of health and wellness data. 2. About Content-Centric Networking (CCN) CCN is an alternative approach to the networking architecture based on the principle that a communication network should allow a user to focus on the data he or she needs, rather than having to reference a specific, physical location from where that data is to be retrieved. CCN enables content caching to reduce congestion and improve delivery speed, a simpler configuration of network devices, and building security into the network at the data level. The initiative continues to gain momentum with an open source code release, Android implementation release, commercial engagements with prominent industrial partners, government funding for a multi-institution project, and the CCN community meeting recently hosted at PARC. 3. Strategic Vision CCN enables secure, infrastructure-independent, easy-to-manage communication between medical devices for personal use and point-of-care access. The CCN platform, with its strong security and device association and configurability, is the ideal architecture for infrastructure-less emergency settings because it does not rely on a traditional client-server model. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 2
3 Some specific benefits of CCN technology include: Plug and Play Device Communication The intuitive device association enables configuration of medical devices that can communicate with each other to efficiently share and transport data. CCN-based enrollment and device association mechanisms allow for intuitive pairing, configuration, and set up of multiple devices. Trust and Security The data-centric security model enables secure sharing of sensitive content. CCN s security model is focused on securing the content itself, as opposed to endpoints. Regardless of where the packets travel across the network, content is protected. This fundamental protection does not prevent the use of additional security measures (i.e., encrypted transmission between sites to meet regulatory requirements). Scalable Dissemination CCN s fully distributed architecture eliminates single points of failure and centralized bottlenecks by moving away from traditional client-server architectures and focusing on content as the means of communication. Utilizing the storage and communication capabilities on heterogeneous devices enables scalable dissemination and propagation to provide a platform for health and wellness data, not only for the users, but also approved providers and partners. Healthcare Data and Access Management CCN s approach to healthcare information management is not constrained to a single device repository and does not require deploying complicated infrastructure for centralized health records servers. CCN s fundamental properties not only allow applications and services to operate on mobile devices, but excel at utilizing their mobility and limited resources. This new platform allows health and wellness data to be personalized for privacy and access control, allowing for different views of the data to different groups or categories (e.g., friends, family, physicians) through CCN encryption methods. Information can be shared through pre-established links, such as daily health summaries going to a relative, or through opportunistic links, such as an in-person medical examination at a doctor s office. 4. Potential Initiatives and Use Cases Here are some potential initiatives and use cases for CCN with medical devices and healthcare management systems. Further details of the implementation and additional use cases can be outlined with a potential partner company once goals and objectives are aligned. A unified communications platform for mobile medical devices and healthcare management systems CCN-based technologies allow medical devices to wirelessly enroll, share, and access sensitive content securely without the need for deployed infrastructure or backend systems support. Using CCN s data-centric cryptographic methods, health and wellness data can be shared securely with privacy levels defined and set by the user or provider. CCN s highly usable enrollment procedures can be applied to multiple medical device types. The protocol-agnostic communication model of CCN enables the building of a low-cost communication platform for a set of heterogeneous devices. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 3
4 Use cases include: A newly acquired medical device, such as a blood pressure monitor, can configure itself to pair and synchronize with other devices such as a patient s or nurse s smartphone or tablet. This use case can also be generalized to alternative devices and settings. A user can privately monitor her weight as part of personal wellness routine, share the cholesterol level securely with the clinic, and make her fitness routine available to her friends. CCN s cryptographic methods enable applications and systems to create interfaces to define and implement privacy levels and secure sharing of personal device data. When connected, CCN enabled services and devices are able to disseminate personal health records as appropriate. For example, while at home on their network or in the doctor s office, a patient s mobile device can seamlessly transmit data collected using medical devices to the provider s backend storage service without configuration or explicitly connecting to the service. A user can have secure access to all her health records whether at home, at work, or on the move. Wellness data can be transmitted to a partner or healthcare provider that does not use the provider s platform. Emergency Response Scenarios CCN-based secure data sharing without the reliance on dedicated support infrastructure enables new products and services for emergency response scenarios. A CCN-enabled emergency response device can be used on a patient to collect and synchronize data as tests are performed with an emergency caregiver s device. The data can also be synchronized with an attendant s tablet or other devices in an ambulance and (optionally) with a backend database. The device can disseminate the data securely as the ambulance arrives at the hospital to deliver all the vitals to the doctor in charge. The data can also facilitate a patient s admission by having the patient s credentials or insurance information retrieved and integrated with the pertinent information from providers. The data sharing remains secure and free from the danger of a privacy breach. Federal regulations are easily incorporated for communication between devices; they are simply an added layer of protection around the secured content transmissions. 5. CCN Differentiation CCN s healthcare information management approach differentiates products by providing benefits that are either impossible to realize today, or require complicated networks, systems, and configurations. CCN s architecture and supporting libraries reduce development and deployment costs by working with general, multi-user and heterogeneous devices. CCN s properties make it trivial to secure and share data between devices, allowing monitoring systems at clinics, home and on personal mobile devices. This approach leaves the patient in control of their information while enabling flexible information sharing. Patient and doctors can share historic data when the patient visits their doctor without requiring a cloud-based infrastructure. Alerts can be defined by a doctor and accepted by a patient, then sent to the doctor as needed based on an explicit pairing between the two, facilitating easy, confidential sharing. Caregiver and family relationships securely define those roles. Systems and applications built on CCN can also be customized to user needs. Federal regulations can be used to guide data ownership and protection while opening up access to approved parties with secured enrollment and access control. Usability for both the owner of the data, and those who need access to it is of extremely high importance. With CCN as the underlying architecture, one can be sure that the data in the system is correct, unmodified and protected, all while allowing it to naturally flow where it is needed. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 4
5 6. An Opportunity for Joint Innovation PARC welcomes collaborators to develop services and systems leveraging CCN and its unique benefits for health information management.ccn enables the collection, storage, and trusted sharing of personal information with strong access control for pre-established relationships and ad hoc needs. Specific examples of innovation may include: A person-centric trust model for ehealth information, specifically how users and health providers express identity and how the system uses those trust relationships for information sharing and aggregation. Exploring how core CCN technologies, like identity and access control by encryption, could be applied for healthcare information management. This would lead to innovations in existing information management and dissemination systems. Collecting and disseminating medical device data aggregated on multiple devices without centralized services, including accessing same-patient data records collected via multiple sources such as in-home monitors and doctor s office visits. Lightweight pairing, authentication, revocation, and secure data sharing over open wireless ISM broadcast channels. A content-oriented paradigm for restricted data views and summarization with access control by encryption. Ethnographic study of personal mobile health usage leading to consumer-friendly device designs and interfaces that solve real-world problems. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 5
6 Next Steps Over the years, PARC has developed a roadmap for defining projects in a way that maximizes the likelihood of success. Status Step Outcomes PARC Introductions If Client believes further exploration is warranted, select one to - Business Model three areas to focus on for further exploration - Technology Opportunities Overview of Client s Strategic Interests and Current Capabilities Project Formulation Validation Detailed Proposal Development Contract Development Program Delivery Client provides overview of strategic priorities, internal capabilities/resources. PARC and Client determine areas for further investigation. PARC and Client s internal stakeholders design ways to address Client s strategic priorities. Usually includes technical and business case development. Executives at both Client and PARC agree that the direction outlined is of mutual interest. Although there is no commitment to enter into a contract, each company s executives have reviewed the high-level project and commit to further development of the proposal. Client and PARC team members refine a detailed Statement of Work to achieve desired business results. This includes development of mutually acceptable terms and conditions. After the business and technical parameters have been established, PARC translates these into a Project Agreement for legal review. Once both parties have signed the Project Agreement, senior technical staff of each organization will lead the work at PARC and at the Client. PARC, a Xerox company, is in The Business of Breakthroughs. Practicing open innovation, we provide custom R&D services, technology, expertise, best practices, and IP to global Fortune 500 and Global 1000 companies, startups, and government agency partners. We create new business options, accelerate time to market, augment internal capabilities, and reduce risk for our clients Palo Alto Research Center Incorporated. All Rights Reserved. PARC, the PARC logo and The Business of Breakthroughs are service marks of Palo Alto Research Center Incorporated. All other trademarks used herein are the property of their respective owners. PARC, 3333 Coyote Hill Road, Palo Alto, California USA engage@parc.com page 6
Intuitive Device Configuration and Home Media Sharing with Content-Centric Networking
Intuitive Device Configuration and Home Media Sharing with Content-Centric Networking DISCUSSION DOCUMENT MARCH 2012 PARC, 3333 Coyote Hill Road, Palo Alto, California 94304 USA +1 650 812 4000 engage@parc.com
More informationHow To Optimize Data Center Performance
Data Center Optimization WHITE PAPER PARC, 3333 Coyote Hill Road, Palo Alto, California 94304 USA +1 650 812 4000 engage@parc.com www.parc.com Abstract Recent trends in data center technology have created
More informationEnterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
More informationSolutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
More informationEnabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R
Enabling Fast and Secure Clinician Workflows with One-Touch Desktop Roaming W H I T E P A P E R Table of Contents Introduction.......................................................... 3 The Challenge
More informationBusiness Case for Voltage SecureMail Mobile Edition
WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationCloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage
Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationEnterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationEMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care
EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing
More informationIBM Data Security Services for endpoint data protection endpoint encryption solution
Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such
More informationA Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS
A Unified View of Network Monitoring One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS Executive Summary In the past few years, the enterprise computing technology has changed
More informationPermeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
More informationMENDIX FOR MOBILE APP DEVELOPMENT WHITE PAPER
MENDIX FOR MOBILE APP DEVELOPMENT WHITE PAPER TABLE OF CONTENTS Market Demand for Enterprise Mobile Mobile App Development Approaches Native Apps Mobile Web Apps Hybrid Apps Mendix Vision for Mobile App
More informationMobile Data Security Essentials for Your Changing, Growing Workforce
Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity
More informationAKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry
AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationSecuring Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
More informationCloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationCA XOsoft Content Distribution v4
PRODUCT BRIEF: CA XOSOFT CONTENT DISTRIBUTION CA XOsoft Content Distribution v4 CA XOSOFT CONTENT DISTRIBUTION (FORMERLY CA XOSOFT WANSYNC CD) IS A SIMPLE, HIGHLY FLEXIBLE AND COST-EFFECTIVE CONTENT DELIVERY,
More informationA Guide Through the BPM Maze
A Guide Through the BPM Maze WHAT TO LOOK FOR IN A COMPLETE BPM SOLUTION With multiple vendors, evolving standards, and ever-changing requirements, it becomes difficult to recognize what meets your BPM
More informationUnified Device Management Allows Centralized Governance of Corporate Network Devices
Unified Device Management Allows Centralized Governance of Corporate Network Devices Published July 2013 The recent bring your own device trend that allows employees to use devices they own for business
More informationMOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper
MOBILIZING ORACLE APPLICATIONS ERP An Approach for Building Scalable Mobility Solutions A RapidValue Solutions Whitepaper TABLE OF CONTENTS Executive Overview Typical Architecture for Mobilizing Oracle
More informationWireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device The Healthcare Sector at the NCCoE MARCH, 3 2016 THE NATIONAL CYBERSECURITY LAB HELPS SECURE HIT 1. About Us: The National Cybersecurity
More informationV1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
More informationAn Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
More informationParticipatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network
Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza ngqlut003@myuct.ac.za UCT Department of Computer Science Abstract:
More informationMoving Network Management from OnSite to SaaS. Key Challenges and How NMSaaS Helps Solve Them
Moving Network Management from OnSite to SaaS Key Challenges and How NMSaaS Helps Solve Them Executive Summary In areas such as sales force automation and customer relationship management, cloud-based
More informationDRIVING BUSINESS VALUE WITH VBLOCK INFRASTRUCTURE PLATFORMS
DRIVING BUSINESS VALUE WITH VBLOCK INFRASTRUCTURE PLATFORMS Private clouds, built on pervasive virtual infrastructures, are increasingly appealing to organizations looking to deliver IT resources to end
More informationORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility
ORACLE MOBILE SUITE COMPLETE MOBILE DEVELOPMENT AND DEPLOYMENT PLATFORM KEY FEATURES Productivity boosting mobile development framework Cross device/os deployment Lightweight and robust enterprise service
More informationCTERA Enterprise File Services Platform Architecture for HP Helion Content Depot
CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption Putting cloud storage
More informationBalancing Security and Speed: Developing Mobile Apps for Enterprise
Balancing Security and Speed: Developing Mobile Apps for Enterprise Contents Executive Summary 3 The Realities of Developing Secure Enterprise Applications 3 How Data Leaves Mobile Devices 3 Partnering
More informationProduct Overview: Software Update Management for Automotive. Wireless software update & management service for Automotive manufacturers
B L A C K B E R R Y M 2 M S O L U T I O N S Product Overview: Software Update Management for Automotive Wireless software update & management service for Automotive manufacturers Product Overview BlackBerry
More informationIndustrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
More informationperspective Microservices A New Application Paradigm Abstract
perspective Microservices A New Application Paradigm Abstract Microservices Architecture is introducing the concept of developing functionality as a number of small self-contained services. This paper
More informationCellular Wireless technology: Creating a link between people and the healthcare community
Cellular Wireless technology: Creating a link between people and the healthcare community Introduction Demands on health-care systems worldwide have increased to the point where the delivery and cost of
More informationA guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services
A guide to HP enterprise mobility solutions Expanding the potential of your business with advanced mobility services Going mobile, staying ahead These days, hardworking enterprise IT and technology managers
More informationSecuring Health Data in a BYOD World
BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security
More informationThis document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
More informationEXECUTIVE SUMMARY Cloud Backup for Endpoint Devices
EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org
More informationThe Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service
The Technical Differential: Technical WHITE PAPER Table of Contents Executive Summary...3 Partnering With VMware Makes Business Sense...3 The VMware DaaS Blueprint...3 The VMware Technology Advantage...4
More informationMobility and cloud transform access and delivery of apps, desktops and data
Mobility and cloud transform access and delivery of apps, desktops and data Unified app stores and delivery of all apps (Windows, web, SaaS and mobile) and data to any device, anywhere. 2 The cloud transforms
More informationHow To Unify Your Wireless Architecture Without Limiting Performance or Flexibility
w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you
More informationcan you effectively plan for the migration and management of systems and applications on Vblock Platforms?
SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible
More informationWhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationPreemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
More informationLow-Cost Multi-Service Home Gateway Creates New Business Opportunities
4000 Bridgeway, Suite 303 Sausalito, CA 94965 http://www.coactive.com Voice: (415) 289-1722 Fax: (415) 289-1320 info@coactive.com Low-Cost Multi-Service Home Gateway Creates New Business Opportunities
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationMiami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
More informationGet Control of Your Data Center. Application Delivery Controllers
White Paper Get Control of Your Data Center Application Delivery Controllers May 2011 Get Control of Your Data Center Access. Security. Delivery. Introduction Data center and networking technologies have
More informationNew York ehealth Collaborative. Health Information Exchange and Interoperability April 2012
New York ehealth Collaborative Health Information Exchange and Interoperability April 2012 1 Introductions Information exchange patient, information, care team How is Health information exchanged Value
More informationBiometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
More informationPrivacy and Identity Management for Europe
Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information
More informationHow To Protect Data On Network Attached Storage (Nas) From Disaster
White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains
More informationSOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business
SOLUTION BRIEF MOBILE SECURITY Securely Accelerate Your Mobile Business CA Technologies allows you to accelerate mobile innovation for customers and employees without risking your enterprise data or applications.
More informationTwo-Factor Authentication
WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance
More informationTop. Reasons Federal Government Agencies Select kiteworks by Accellion
Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government
More informationMobility for Me. When used effectively Contextual Mobility can:
Mobility for Me Over 250 communications providers around the world trust TIBCO with the management of their products, services and the customers that use them. 2 Mobility for Me Create a communications
More informationComparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
More informationOpen Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
More informationFIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
More informationBlackBerry Mobile Voice System
BlackBerry Mobile Voice System Mobile Unified Communications BlackBerry Mobile Voice System (BlackBerry MVS) brings desk phone features to BlackBerry smartphones. Work with one business number at the office
More informationHow To Use A Vmware View For A Patient Care System
Delivering Epic Hyperspace Through VMware View Using Kiosk Mode and Zero Clients Reference Implementation for a VMware Point-of-Care Solution WHITE PAPER About VMware Reference Implementations VMware Reference
More informationThe PerspecSys PRS Solution and Cloud Computing
THE PERSPECSYS KNOWLEDGE SERIES Solving Privacy, Residency and Security in the Cloud Data Compliance and the Enterprise Cloud Computing is generating an incredible amount of excitement and interest from
More informationMOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More informationHYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA
HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA Executive Summary While a number of organizations are gaining experience and increased
More informationMastering the Mobile Challenge
Enterprise Device Enablement Mastering the Mobile Challenge How enterprises and vendors can improve viability, applicability, and security of mobile deployments Introduction Welcome to the post-pc world,
More informationactivecho Frequently Asked Questions
activecho Frequently Asked Questions What are the benefits of activecho? activecho allows your organization to provide an on-premise, managed and secure alternative to Dropbox and other file synching and
More informationOracle Real Time Decisions
A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)
More informationStreamlining Healthcare Business Interactions
WHITE PAPER Streamlining Healthcare Business Interactions Sponsored by: Axway Lynne Dunbrack December 2014 IDC HEALTH INSIGHTS OPINION Today's changing healthcare IT (HIT) environments are generating a
More informationGO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime
YOUR Enterprise GO!es MOBILE The Challenge Mobile devices are the latest and hottest channel for m- services delivery and mobile marketing campaigns. Today s enterprises are deploying consumer-oriented
More informationIBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite
IBM Software IBM Business Process Management Suite Increase business agility with the IBM Business Process Management Suite 2 Increase business agility with the IBM Business Process Management Suite We
More informationEmergency Medical Data Management through an Enhanced Cloudbased Push Messaging Mechanism
Emergency Medical Data Management through an Enhanced Cloudbased Push Messaging Mechanism Vassiliki Koufi, Flora Malamateniou, and George Vassilacopoulos University of Piraeus, Department of Digital Systems,
More informationCellular Data Offload. And Extending Wi-Fi Coverage. With Devicescape Easy WiFi
Cellular Data Offload And Extending Wi-Fi Coverage With Devicescape Easy WiFi Case Study October 2010 List of Acronyms 3G Third Generation 4G Fourth Generation API Application Programming Interface AP
More informationBest Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
More informationMobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE
Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE Solution Overview The VMware View Mobile Secure Desktop solution is a powerful architecture intended
More informationEnd-to-End Innovation Solutions. for Telehealth and Remote Patient Monitoring
End-to-End Innovation Solutions for Telehealth and Remote Patient Monitoring S3 Group is a global provider of telehealth solution consultancy to medical device vendors and healthcare providers. S3 Group
More informationHow To Get To A Cloud Storage And Byod System
Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although
More informationFor healthcare, change is in the air and in the cloud
IBM Software Healthcare Thought Leadership White Paper For healthcare, change is in the air and in the cloud Scalable and secure private cloud solutions can meet the challenges of healthcare transformation
More informationA Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationTransform your organization
Transform your organization through Business Mobility >80% More than 80 percent of organizations recognize the impact of mobile transformation on internal and external stakeholders and have created dedicated
More informationThe 9 Pillars of Enterprise Mobility
The 9 Pillars of Enterprise Mobility Building a framework that benefits IT, users and the business An Enterprise Mobility Program (EMP) focuses on policies, processes and enabling technologies that align
More informationSmartphone Enterprise Application Integration
WHITE PAPER MARCH 2011 Smartphone Enterprise Application Integration Rhomobile - Mobilize Your Enterprise Overview For more information on optimal smartphone development please see the Rhomobile White
More informationBackup and Recovery: The Benefits of Multiple Deduplication Policies
Backup and Recovery: The Benefits of Multiple Deduplication Policies NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change
More informationIBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
More informationAPI Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
More informationFor more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health
More information