penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software

Similar documents
How To Protect Your Data With Athena Software

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

custom hosting for how you do business

Virtual Servers VIRTUAL DATA CENTER OVERVIEW VIRTUAL DATA CENTER BENEFITS

Hedge Funds & the Cloud: The Pros, Cons and Considerations

Matthias Machowinski, Directing Analyst for Enterprise Networks and Video, Infonetics Research, 20152

ProjectManager.com Security White Paper

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

CHIS, Inc. Privacy General Guidelines

Cloud Computing and Records Management

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Powering the Cloud Desktop: OS33 Data Centers

John Essner, CISO Office of Information Technology State of New Jersey

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Cloud models and compliance requirements which is right for you?

CA Cloud Overview Benefits of the Hyper-V Cloud

Cloud Management. Overview. Cloud Managed Networks

BMC s Security Strategy for ITSM in the SaaS Environment

HIPAA/HITECH Compliance Using VMware vcloud Air

Security & Infra-Structure Overview

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Intel Enhanced Data Security Assessment Form

Security from a customer s perspective. Halogen s approach to security

Altius IT Policy Collection Compliance and Standards Matrix

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Cloud Provider Solutions

7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS

( and how to fix them )

Anypoint Platform Cloud Security and Compliance. Whitepaper

Client Security Risk Assessment Questionnaire

Hosting Services VITA Contract VA AISN (Statewide contract available to any public entity in the Commonwealth)

Security Information & Policies

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

Why You Should Consider Cloud- Based Archiving. A whitepaper by The Radicati Group, Inc.

Security Controls What Works. Southside Virginia Community College: Security Awareness

HIPAA Privacy & Security White Paper

PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability

WHY YOU SHOULD CONSIDER CLOUD BASED ARCHIVING.

Using Cloud-Based Technologies in Clinical Trials by Niki Kutac, Director, Product Management

COLOCATION A BUYERS GUIDE

FMCS SECURE HOSTING GUIDE

StratusLIVE for Fundraisers Cloud Operations

Cloud Computing: Legal Risks and Best Practices

Cloud Security Who do you trust?

ACI ON DEMAND DELIVERS PEACE OF MIND

What is the Cloud, and why should it matter?

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Injazat s Managed Services Portfolio

Cloud Contact Center. Security White Paper

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Our Cloud Offers You a Brighter Future

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

<cloud> Secure Hosting Services

Big Data, Big Risk, Big Rewards. Hussein Syed

EARTHLINK BUSINESS. Simplify the Complex

Datto Compliance 101 1

Data Center Build vs. Buy

Troux Hosting Options

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

HIPAA: Compliance Essentials

Tenzing Security Services and Best Practices

The Education Fellowship Finance Centralisation IT Security Strategy

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

The Hybrid Cloud Approach: CA ARCserve D2D On Demand

Making the leap to the cloud: IS my data private and secure?

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance

Our Commitment to Information Security

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

HEC Security & Compliance

WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Fully Managed Secure Data Sharing (a cloud service)

penelope athena software TABLEAU ONLINE DASHBOARD INFORMATION PACKAGE case management software

Transcription:

penelope case management software SOFTWARE AS A SERVICE INFORMATION PACKAGE athena software

"I've worked with major corporations and universities and I am really impressed with Athena's hosted server and its capacity to deliver optimal results day after day. This secure data centre works better than many other organizations with millions invested in IT and cloud hosting." Peter S, W.J. Stelmaschuk and Associates, Canada rock solid Cloud Services. Penelope is a powerful, integrated case management solution that will help transform the way your organization engages with clients, works collaboratively, demonstrates outcomes and delivers quality, best practice services. PENELOPE To achieve maximum impact, Penelope is delivered as part of a suite of comprehensive end to end solutions designed to provide maximum benefit to your organization during all stages of your transformational journey. SOFTWARE AS A SERVICE Along with our best in class professional services delivered via the Penelope Excellence Pathways, we provide rock solid Software as a Service offerings that are local, scalable, secure and privacy standards compliant. RISK MANAGEMENT FRAMEWORK LOCALIZED PROVISION Our SaaS offerings allow you to focus on your core business, reduce risk and save money from outsourcing your data hosting, application management, data protection and much of your disaster recovery needs to a HIGH AVAILABILITY + PERFORMANCE HIPAA/ PIPEDA/ HITECH COMPLIANCE EASY FOR YOUR IT DEPARTMENT provider trusted by organizations around the world.

secure, local, reliable & Compliant. The ultimate goal of our Software as a Service (SaaS) model is to make using Penelope as easy, efficient and secure as possible. At Athena Software, we have implemented a comprehensive set of measures and safeguards that we are confident provide the highest degree of security to protect your data from unauthorized access, protect your data from catastrophic loss and maximize uptime and availability. These measures begin with the physical facility where data is hosted (our data centre), the design and capabilities of Athena s server, and the architecture of the Penelope application. This includes the built-in functional specifications, feature-sets and every aspect of our staff s work with your agency s confidential data within Penelope. Every component of service and security is meticulously planned. We implement data security, integrity and protection strategies that are driven by our relentless attention to detail and commitment to excellence in all aspects of service. Data Protection Residency Assurance CANADA USA NEW ZEALAND Your Data never leaves your Country. UNITED KINGDOM DATA CENTRES SCHEDULED TO LAUNCH IN 2016 AUSTRALIA

untangling the Terminology. What is Software as a Service? Instead of purchasing licenses, provisioning servers, building and managing secure facilities, ensuring multiple redundancies, performing the maintenance, as well as disaster recovery and other complex (and expensive) IT tasks required to manage your own software, our SaaS offering is available from the internet to securely hosted data residing on our servers. DATA IS PROTECTED AND SECURE You always own your data, it never leaves the country where it is securely hosted and we meticulously deploy an advanced risk mitigation procedures, policies and technical, physical and administrative safeguards to protect against unauthorized access. AVAILABLE ON A SUBSCRIPTION MODEL WE TAKE CARE OF SECURITY, INFRASTRUCTURE, PERFORMANCE & AVAILABILITY UPTIME GUARANTEES & SERVICE LEVEL AGREEMENTS SINGLE, EASY TO UNDERSTAND ALL-IN MONTHLY PRICE All software and services are available on a subscription model so you only need to pay for what you need at the time - allowing you to scale according to your own timeframe, requirements and budget. With the subscription model, your up front costs are much lower and speed out over time. We take care of complex server maintenance, capital costs, hardware, backups, firewalls, updates etc. - all you need is a recent web browser and an internet connection to securely access your data anywhere you can connect to there web Athena provides 99.99% uptime guarantees (with generous credits for periods of unplanned downtime if they should occur) as well as clear Service Level Agreements that define response times and escalation paths. Your all-in subscription fee includes access to the software, technical support, fixed file storage space, and many other benefits. Custom tailored solution packages can be built to suit your requirements beyond our standard offerings.

SaaS Benefits. PRIVACY CONTROLS HIPAA / HITECH COMPLIANCE PCI DSS, ISAE 3402, SSAE 16, AT 101, AND CSAE 3416 CERTIFICATIONS AT OUR TIER II DATA CENTRES 99.99% UPTIME GUARANTEE DATA INTEGRITY ALL SYSTEMS ARE FULLY MANAGED BY ATHENA SOFTWARE ENCRYPTION AT REST AND IN TRANSIT PHYSICAL ACCESS CONTROLS MULTI-FACTOR AUTHENTICATION DISCLOSURE PROTECTION PRINCIPLE OF MINIMUM NECESSITY RAPID DEPLOYMENT COMPATIBILITY WITH EXISTING INFRASTRUCTURE SERVICE LEVEL AGREEMENTS RISK MITIGATION SHORTER TIME TO VALUE INTERVAL IMPROVED RESILIENCY WORLD CLASS SECURITY WORLD CLASS AVAILABILITY WORKFORCE MOBILITY PREDICTABLE IT EXPENDITURES ADMINISTRATIVE SAFEGUARDS REDUCED CAPITAL EXPENDITURES FIREWALLS AND INTRUSION DETECTION SYSTEMS FM-200 GAS FIRE SUPPRESSION AND PROVIDE SCALABILITY DEVICE AND MEDIA CONTROLS N+1 POWER REDUNDANCY INCLUDING BATTERY POWER AUDIT CONTROLS DISASTER RECOVERY PREPAREDNESS SUPPLY AND DIESEL GENERATORS PIPEDA COMPLIANCE INDIVIDUALLY LOCKED CABINETS 2 STAGE BIOMETRIC AUTHENTICATION WORLD CLASS REDUNDANCY LOWER COSTS & SCALABILITY SOFTWARE AS A SERVICE ACCESS AND PERFORMANCE MONITORING REDUCED TIME TO BENEFIT Best in Class Service. VIRTUAL MACHINES IMPROVE RESILIENCY BETTER UTILIZATION OF INTERNAL STAFF EASY UPGRADES N+1 COOLING REDUNDANCY MULTI-DIVERSE CARRIER AND FIBRE PATHS AND MULTI-HOMED FULLY REDUNDANT MPLS NETWORK WITH END TO END QoS LONG TERM RELATIONSHIP ENABLED LOW LATENCY AND SWITCHING ARCHITECTURE AUSTRALIA PRIVACY LEGISLATION DATA SECURITY UNIQUE USER AUTHENTICATION DECREASE RISK, COST AND RESPONSIBILITIES CONTINUOUS SECURITY UPGRADES SEAMLESS UPGRADES FASTER GO -LIVE WORK ANYWHERE BETTER PERFORMANCE OUTSOURCED IT MANAGEMENT SCALABILITY SAVE MONEY ON PAY AS YOU GO HARDWARE LOWER TOTAL COST OF OWNERSHIP

data Protection, Integrity & Availability. risk management Framework. Athena Software uses a comprehensive risk management framework modelled after NIST SP 800 37 rev1 and NIST SP 800-39. A formal risk management team evaluates ongoing audits and incidents, conducts an annual multi-faceted risk assessment and implements the resulting risk response plan. The risk assessment approaches used includes threats-based analyses, business process and information system analyses and penetration testing for our hosting facilities. Athena has also developed a comprehensive set of policies and procedures with accompanying staff training programs that govern all activities relating to the protection of confidential data, including protected health information (PHI). Finally, Athena conducts periodic third party security audits and penetration testing. NIST SP 800 37 REV1 & NIST SP 800-39 HIPAA/ HITECH / PIPEDA COMPLIANCE AUSTRALIAN PRIVACY LEGISLATION PHYSICAL SAFEGUARDS TECHNICAL SAFEGUARDS DATA PROTECTION ADMINISTRATIVE SAFEGUARDS Using the principle of MINIMUM NECESSITY means that Athena limits our exposure to protected health information (PHI) to the minimum necessary to accomplish the intended purpose, and in the majority of instances it is not necessary for us to view or acquire PHI at all while completing authorized service requests.

protecting your Privacy. PRIVACY OF ephi BUSINESS ASSOCIATE AGREEMENTS EXTERNAL SECURITY AUDITS POLICIES & PROCEDURES world-class data Privacy. Athena Software is extraordinarily committed to ensuring that protected health information remains confidential, is not viewed, acquired or otherwise accessed by any Athena staff except in response to a specific authorized request from your organization or otherwise as required by law. Data privacy provisions are interwoven into all aspects of our operations - from the design of Penelope to the configuration and management of our data centres to our internal administrative controls to our staff training, management and the way we deliver client services. Athena Software s Business Associate Agreement defines permitted and non-permitted uses and disclosures of protected health information based on the principle of Minimum Necessity. These terms form our standard practices irrespective of jurisdiction. As such, data is not used or disclosed by Athena staff except as authorized by your organization to perform specific service requests or as required by law. Please do not hesitate to contact us with questions or concerns about Athena s security and privacy standards. We will be pleased to provide additional information that further details our comprehensive and meticulously planned and implemented risk management and data security framework.

penelope case management software athena software www.athenasoftware.net info@athenasoftware.net 1st floor, 33 Dupont Street East Waterloo, Ontario Canada N2J 2G8 NORTH AMERICA 1.866.806.6014 AUSTRALIA 02 8005 8037 UK 020 3239 1689 NZ 027 228 0105 FAX 519.570.3147 Page 8 of 8