Your SlideShare is downloading. ×
0
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Protecting the Healthcare Database
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Protecting the Healthcare Database

826

Published on

Protecting the privacy and security of personal health information

Protecting the privacy and security of personal health information

Published in: Health & Medicine
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
826
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. PROTECTING THE HEALTHCARE DATABASE<br />FROM SINGLE PROVIDERS TO THE HOSPITAL ENTERPRISE, KEEPING PROTECTED HEALTH INFORMATION PRIVATE AND SECURE<br />
  2. DATABASE THREATS<br />Today's database vulnerabilities along with known security threats continue to challenge even the best organizations<br />Emerging and developing threat or attack technologies will present new and serious risks to unprotected information<br />Healthcare organizations must have a better way to protect themselves <br />
  3. DATABASE THREATS<br />The healthcare database is becoming more vulnerable to attack<br />Data storage continues to increase<br />More people have greater access<br />Hackers are more sophisticated<br />Technology has advanced<br />Malicious intent greater<br />Opportunity exists for financial gain<br />
  4. DATABASE ACCESS<br />Many different people and departments, both inside and outside the organization, have access to information stored in the healthcare database <br />IT Staff<br />Internal employees<br />Vendors<br />Insurance Companies<br />Outside Physician offices and clinics<br />Lab & Imaging Center personnel<br />
  5. DATABASE ACCESS<br />Insider attacks will continue to grow as one of the key reasons for a database breach<br />Immune to firewalls and other security systems<br />Many employees have excessive privileges<br />Organizations are lax with level of access rules<br />Disgruntled employees<br />Insider searches for data on celebrities or public figures<br />Unintentional insider mistakes <br />Phishing response by legitimate users<br />
  6. PREVENTING A DATABASE BREACH<br />All organizations need to:<br />Reassess existing security practices and policies<br />Develop a comprehensive strategy<br />Assess the overall IT environment<br />Evaluate possible situations and scenarios of unauthorized access<br />Implement a professional grade encryption solution for data-at-rest<br />
  7. WHICH ENCRYPTION SOLUTION IS BEST?<br />SOFTWARE <br />OR <br />APPLIANCE-BASED / HARDWARE?<br />
  8. APPLIANCE-BASED ENCRYPTION<br />Hardware or Appliance-based encryption, a superior data-at-rest security solution foreliminating insider threat<br />Technology works with Database, Web or Application Servers<br />Offloads high speed encryption processing from database for improved system performance<br />Non-proprietary, can be used with any OS<br />Scalable to almost any size organization<br />Ideal for Hosted or Cloud Applications<br />Unlike software solutions, encryption keys are not stored with encrypted data<br />
  9. JANA SERIES TECHNOLOGY<br />Award winning appliance-based encryption technology<br />Scalable to any size healthcare provider<br />Manufactured by Dark Matter Labs in the USA<br />Complies with State and Federal security and privacy rules (HIPAA, PCI)<br />Appliance-based for superior performance and security<br />Interfaces with database, web, application or customized servers<br />
  10. JANA SERIES TECHNOLOGY<br />JANA appliances are award winning encryption solutions that completely offload intense cryptographic processing from overworked servers<br />3 Devices designed for small to enterprise-wide applications<br />Employs government certified algorithms<br />Completely independent of database, operating system, and application<br />Units differentiate based on processing power, speed, number of Ethernet ports and high availability capability<br />
  11. JANA SERIES TECHNOLOGY<br /> Complete Key Management<br />Multiple-user key-splitting during key entry <br />Key configurations can be fully backed-up <br />Seamlessly rotate keys according to your business requirements without having to decrypt and re-encrypt all of data <br />Fully logged, comprehensive access controls to modify or utilize keys <br />Encryption and Decryption permissions, by users or applications, can be separated for enhanced security <br /><ul><li>Multiple-user key-splitting during key entry
  12. Key configurations can be fully backed-up
  13. Seamlessly rotate keys according to your business requirements without having to decrypt and re-encrypt all of data
  14. Fully logged, comprehensive access controls to modify or utilize keys
  15. Encryption and Decryption permissions, by users or applications, can be separated for enhanced security </li></li></ul><li>APPLICATION DIAGRAM <br />
  16. DARK MATTER LABS<br />Designs and manufacturers superior quality encryption devices to protect data-at-rest<br />Features industry leading key management, scalability, compliance and flexibility<br />Has unbeatable performance and security<br />Uses revolutionary encryption technology that is easy to install, simple to use, and does not require licensing fees<br />Protects the security of data in any organization <br />
  17. PROTECTING THE HEALTHCARE DATABASE<br />All healthcare providers who access and store protected health information are responsible for preventing a security breach. <br />Types of facilities that have databases that could be open to unauthorized access:<br />Hospitals<br />Physician Offices<br />Pharmacies<br />Clinics<br />Labs<br />Psychiatry Offices<br />Imaging Centers / X-ray<br />Dentists<br />Protect your database with appliance-based technology for state-of-the-art security <br />
  18. PROTECTING THE HEALTHCARE DATABASE<br />www.darkmatterlabs.net<br />

×