ENSURING YOUR ENTERPRISE IMAGE-VIEWER IS FULLY SECURE

Similar documents
Secure, diagnostically-cleared, mobile access to imaging and information.

FileCloud Security FAQ

The Essential Security Checklist. for Enterprise Endpoint Backup

REGULATIONS AND COMPLIANCE FOR ENTERPRISE MOBILE HEALTH APPLICATIONS

The BiGuard SSL VPN Appliances

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Regulations and compliance for enterprise mhealth applications

Mobile Access Software Blade

Central Administration QuickStart Guide

Image Enabled EMR / EHR

Centricity 360 Case Exchange

When enterprise mobility strategies are discussed, security is usually one of the first topics

Secure Your Enterprise with Usher Mobile Identity

Remote Desktop Access for the Mobile Workforce

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

activecho Driving Secure Enterprise File Sharing and Syncing

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Enterprise Security with mobilecho

How To Secure An Emr-Link System Architecture

What is the Barracuda SSL VPN Server Agent?

CareGiver Remote Support Information Technology FAQ

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

THE LINK OFFLINE DATA ARCHITECTURE

How To Secure Your Data Center From Hackers

OCR UPDATE Breach Notification Rule & Business Associates (BA)

Get Success in Passing Your Certification Exam at first attempt!

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

NCSU SSO. Case Study

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

uturenet & its Document Imaging Services

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Data Security and Governance with Enterprise Enabler

VMware Point of Care Solutions. for Clinicians and Caregivers

FutureNet Technologies Corporation has become a vital player in the Medical

Security Overview Enterprise-Class Secure Mobile File Sharing

Tableau Online Security in the Cloud

QLIKVIEW MOBILE SECURITY

ShadowLink 2. Overview. May 4, ONLINE SUPPORT emdat.com/ticket/ PHONE SUPPORT (608) ext. 1

2003, Rainbow Technologies, Inc.

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

How To Manage A Plethora Of Identities In A Cloud System (Saas)

Using a VPN with Niagara Systems. v0.3 6, July 2013

IMPLEMENTING FORENSIC READINESS USING PERFORMANCE MONITORING TOOLS

Security Architecture Whitepaper

Xerox DocuShare Security Features. Security White Paper

Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Copyright Telerad Tech RADSpa. HIPAA Compliance

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

White Paper. Securing and Integrating File Transfers Over the Internet

Revolution R Enterprise DeployR 7.1 Enterprise Security Guide. Authentication, Authorization, and Access Controls

Citrix ShareFile Enterprise technical overview

White Paper. Revolutionizing Remote Secure Access: Strong, Adaptive Authentication for Healthcare

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

BES10 Cloud architecture and data flows

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Guide to Web Hosting in CIS. Contents. Information for website administrators. ITEE IT Support

ClockWork Enterprise 5

5 HIPAA-Compliant Best Practices for Mobile Devices in Healthcare

Introduction to the Mobile Access Gateway

Medicaid Enterprise Systems Conference 2012

SOOKASA WHITEPAPER HIPAA COMPLIANCE.

Windows NT Server Operating System Security Features Carol A. Siegel Payoff

Ensuring the security of your mobile business intelligence

SSL VPN Technology White Paper

MEGA Web Application Architecture Overview MEGA 2009 SP4

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Secure Remote Control Security Features for Enterprise Remote Access and Control

BlackBerry Enterprise Service 10. Version: Configuration Guide

Flexible Identity Federation

Kony Mobile Application Management (MAM)

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

AccessPoint BACPAC. Don t Look So Down. BACPAC Features. BACPAC Benefits sales@freelandsystems.

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Moving Beyond User Names & Passwords

owncloud Architecture Overview

SECURITY DOCUMENT. BetterTranslationTechnology

AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Solving Healthcare's BIG Data Problem... Imaging and Cloud Infrastructure

Windows Phone 8.1 in the Enterprise

BRING YOUR OWN DEVICE. Protecting yourself when employees use their own devices for business

UCLH VPN User Guide. January VPN User Guide v

Securing ArcGIS Server Services: First Steps

owncloud Architecture Overview

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

The MDPHnetDistributed Querying Approach for Public Health. Jeffrey Brown, PhD MichealKlompas, MD, MPH MDPHnet Research Team October 18, 2012

Healthcare Solution Brief. Simpli-fi Point of Care Solution Improving patient care with a simple, cost-effective and resilient wireless network

Why a Reverse Proxy with My Instant Communicator for mobiles??

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Unified Access for Enterprise Users

DreamFactory Security Whitepaper Customer Information about Privacy and Security

Transcription:

ENSURING YOUR ENTERPRISE IMAGE-VIEWER IS FULLY SECURE Ensuring the security of information and applications is a critical priority for all organizations, particularly those in the healthcare field. The architecture and features of the right enterprise imageviewer enable medical images and information to be securely and conveniently accessible to users from anywhere in the world, without compromising network or information security. This guide describes strategies to ensure your enterprise images are fully secure, even when you provide the flexibility of mobile health solutions to practitioners.

Healthcare Breaches and Costs Data security continues to be a major health IT concern. A study conducted in 2012 by the Healthcare Information and Management Systems Society (HIMSS) found that 34% of respondents named security breaches as a top concern, and 23% said their organizations experienced a breach in the last year. 1 This concern is only increasing with the use of mobile devices in healthcare. Devices are being used to access patient records and if downloaded data were to ever go missing, it would put the hospital at huge risk. Best practice is to ensure that patient data never reaches the end device. It is equally important to manage devices that are brought in from a users home. 2 2a There are countless ways for there to be a breach with patient data, from laptops or mobile devices being stolen to passwords being leaked. HIPAA violations can range from $50,000 to $1.5 million in fines, with a recent case reaching a record setting $4.8 million in fines. Steps to Protect Your Enterprise More employees are starting to use mobile devices for business purposes across every industry, providing convenience and flexibility. However, mobile devices continue to be a significant source of data breaches. To help with mobile security, organizations should: 1. Educate staff on the importance of mobile security. 2. Use security features on devices. 3. Put network security policies in place. 4. Use authentication for all users. 5. Use secure connections. 6. Ensure that your solution has built-in encryption and user authentication - secure LDAP and Active Directory, that can be fully integrated into your IT policies and infrastructure. 7. Ensure they are using an enterprise viewer that is completely secure. 1 Source: http://www.rheumatologynetwork.com/practice-management/your-patient-data-secure 2 Source: http://www.onesourcedoc.com/blog/bid/95168/10-examples-of-hipaa-violations 2a Source: http://www.hhs.gov/news/press/2014pres/05/20140507b.html

Calgary Scientific Approach to Security Security has been part of the design of our enterprise image-viewing solution, ResolutionMD, since its inception. The solution ensures a fully secure experience in the following ways: 1. No patient data is actually left persistent on the client mobile device or browser session. Once a session times out or is ended, the data in memory is deleted and no data is persistent on the device. If a phone or tablet is lost or stolen there is no concern about patient data being left behind and accessible. 2. The ResolutionMD server is set up to require clients to enter login credentials for production use. 3. The ResolutionMD client is typically further secured with the use of SSL. SSL implemented in conjunction with the ResolutionMD Server ensures that all data transmission between the client device and the server are encrypted so as not to be interpreted while in transit from a network. 4. Optionally, a VPN can be added as a secure conduit through which the end user device can communicate with the ResolutionMD server. Other solutions will send patient data to the end-user device, allowing easy access to that data if the devices are stolen. In some cases, data is not being left on the device, but is being rendered on the users laptop or mobile device which can lead to data being left in the memory. Some solutions are not integrated into the IT environment and require additional or different passwords to access the application and the data. This means that if a device goes missing IT departments have no control over the access and cannot shut down the breach. As mentioned above, ResolutionMD does not download data to any device and is 100% secure.

ResolutionMD Architecture LDAP PACS REPORTS NON DICOM LDAPS DICOM Q/R WEB SERVICE WEB SERVICE HTTP REST Apache Tomcat HTTPS REST Hospital Firewall Hospital LAN Image Rendering Services Internet 2D 3D MIP/MPR Server ios/android/flex ios/android/flex DMZ Images are queried from the PACS on demand, with no images being stored on the ResolutionMD server. Images are then rendered and made available for display to the end user device. This keeps the patient data safe behind the firewall. Users are authenticated against the site LDAP for full integration into IT policies.

Mobile solutions can empower caregivers, enhance efficiency and improve patient care, but only if healthcare data remains protected at all times. With Calgary Scientific s ResolutionMD as part of the cloud-based Dell Unified Clinical Archive, physicians can securely view images and render a diagnosis from any web or mobile device across the enterprise or even outside the walls of the hospital. Sid Nair Vice President/General Manager Healthcare and Life Sciences at Dell Services

ResolutionMD enables doctors to securely view patient images and reports from a wide variety of computers and mobile devices, collaborate with other practitioners and diagnose from any location. Whether you are a single facility or a large healthcare system with tens of thousands of users, ResolutionMD is the best choice for seamless image access across multiple departments. The FDA cleared, CFDA registered, Health Canada licensed and CE marked mobile medical diagnosis software can be integrated into any EMR and easily plugs into existing distributed storage systems. ResolutionMD s federated approach is an important differentiator from other solutions as highly sensitive data is never moved to a device and no additional data storage locations are created. ResolutionMD is currently installed in leading healthcare institutions around the world via a network of more than 45 world class healthcare partners. To see ResolutionMD in action, access the self-serve demo.