Something big is coming to ISC West Booth #13115


Healthcare cyber-physical identity & access management

Security is of the utmost importance in the healthcare setting so that patients and staff alike can focus their attention on improved clinical outcomes. Unfortunately, visitors are often a contributing factor to safety incidents – and the burden on hospital staff has increased exponentially since the onset of the pandemic. Let’s review the current state of healthcare workplace safety and how an automated, cyber-physical approach can help eliminate administrative hassle and strengthen safety protocols.

Beyond compliance - managing risk 
for the healthcare enterprise.

Delivering quality healthcare is a combined effort requiring close cooperation between provider networks, hospitals, medical specialties as well as lab and testing services. Add to this the dimension of prescription management, pharmaceutical supply chain and retail pharmacy. The claims and delivery management systems for health insurance carriers, HMOs and PMOs all need access to medical records.

Patient information must flow seamlessly across all delivery organizations and health insurers. Regulations like HIPAA and industry best practice frameworks like HITRUST require that primary healthcare providers not only vigorously protect patient privacy, but also take responsibility for enforcing the same standards of Security and Safety due diligence for their partner providers.

Alert Enterprise Solutions

The cost to operate systems in existing silos is expensive and full of risk. Alert Enterprise delivers a single unifying platform with a dual-focused objective:
  • Real-time validation of certification and credentials during access provisioning
  • Manage deprovisioning process and cross-linkage of access termination from multiple systems simultaneously – physical, logical and operational
  • Powerful data modelling to bring to light potential compliance violations and control system risks, as well as IT security gaps before a potential NERC violation
  • Identify compliance gaps in real-time and suggest remedial actions to remain in compliance with HIPAA, Sarbanes-Oxley, NIST SP800-xx, PCI and ISO-2700x standards
  • Enforcement of security policies and procedures across vendor and partner ecosystems following HITRUST provisions
  • Visual risk and remediation modeling with ability to display key assets on geo-spatial maps with drill-down details on event and asset criticality; ability to integrate physical security alerts and surveillance video

Potential costs for violations and non-compliance can be extraordinary.

Compliance & Auditing

PCI Requirements


Get active enforcement with a configurable rules engine and automate compliance management. Meet requirements for HIPAA, TSA, NERC CIP and more.

Compliance & Auditing

HIPPA Violation


The amount the organization could be expected to pay per year per finding related to HIPPA compliance violations.

Compliance & Auditing

Sarbanes-Oxley Act


The amount the organization could be expected to pay in the event of a SOX compliance violation.

Data Breach – General


The average cost of a data breach of PCI, PHI, PII, etc. data due to malicious or criminal cyber / insider attacks, system or human errors. – Ponemon Institute Research, 2017

Insider Threat


The average total cost of insider threat and careless or negligent employees and contractors are the root cause of most incidents. –Ponemon Institute Research, 2018

Compliance & Auditing

Loss of Business/Contract


While the total cost is unknown, depending upon the type of breach or violation, a healthcare enterprise could be at risk of losing existing business and new business should its reputation related to protecting data be damaged.

Active policy enforcement for IT 
and building access.

Hundreds of access points, thousands of employees and scores of service provider organizations make up the extended healthcare enterprise. Determining risk to this broad enterprise involves managing roles and critical access for each. Do employees or contractors have the right training and certification to access personal health information? Safeguarding confidential personal health and financial information also means monitoring who has physical access to the records. Did the badge access and system access for terminated employees get turned off at the right time?

Alert Enterprise software delivers real-time integration of Identity Access Governance with Physical Access Control and Human Resource applications. The converged security approach automates policy enforcement and compliance, helping you automatically validate employee background checks, training and certification, authorization to view patient information and other vendor services.

A graphic demonstrating identity and access governance in the healthcare sector

The integrated Alert Enterprise solution

Alert Enterprise brings everything from new data insights to workflow processes to smart dashboards—all while integrating with multiple Physical Access Control Systems (PACS), ERP Systems, HR systems, Patient Records Management, Clinical Systems, Pharmacy Management Systems and other critical applications found in hospital and other healthcare environments.

You’ve identified the risk, now what? Alert Enterprise delivers next steps.

Identifying the risks alone is not enough. Organizations need to make sure that immediate steps are being taken to mitigate risks. Alert Enterprise automates remediation and helps you to analyze risks, and visualize remediation paths before taking action. Business analysts, IT security and physical security teams can collaborate visually and implement the next steps – which may include reviewing correlated risk recommendations for selected employees and removing physical access to certain parts of the facility or system access to certain applications that contain sensitive data.

Unique Customer Benefits

  • Training, PRA compliance
  • Certification requirements
  • Healthcare Content Packs: SOX, GDPR, HIPAA, HITRUST, Health Level 7 (HL7) Integration
  • Full audits controls and chain of custody
  • Access review and recertification
  • Immediate badge deactivation and access removal for offboarding, termination and expired training/certification
  • Access rights and approvals to secure areas
  • Visitor screening and approvals
  • Risk-based security controls
  • Unique identity / reconciliation of IT and Physical Security
  • Segregation of duties
     – Privilege users
     – Secondary approvals
  • Segregation of data
     – Privacy / Encryption
     – Secondary approvals
  • Eliminate access creep
  • Eliminate orphan accounts
  • Automate manual data entry
  • Automate manual paper process
     – HR driven
     – Access requests
  • Eliminate duplicates, errors
  • Streamline badge operation
  • Improve security investigation
  • Leverage existing investments
  • Partner Channel Access Management with Self-Service Portal

Take the first step to greater hospital safety.

Your facility’s staff, patients and visitors will thank you.