SlideShare a Scribd company logo
1 of 2
Download to read offline
MedStar Health Chooses SafeNet Strong
                                                                                         Authentication to Protect Access to
                                                                                         Critical Hospital Applications
                                                                                         CASE STUDY




Background
MedStar Health is a $2.9 billion non-profit healthcare organization                          Business Problem and Customer Need
and a community-based network of seven hospitals and other                                  Managing medical records of thousands of patients, MedStar
healthcare services in the Baltimore-Washington region. As the area’s                       Health needed to provide a strong authentication solution,
largest health system, it is one of its largest employers, with more                        ensuring secure access for the doctors and nurses remotely
than 23,000 employees and 4,600 affiliated physicians.                                       accessing vital hospital applications. Specifically, MedStar health
                                                                                            wanted to secure access to two critical medical applications –
                                                                                            applications which store data from more the 139,000 inpatient
                                                                                            admissions, and more than 900,000 outpatient visits each year.
                                                                                            Specific requirements included:

                                                                                              • Secure remote access for MedStar Health’s doctors, clinicians,
                                                                                                nurses and administrative staff to critical online patient
                                                                                                records

                                                                                              • Comply with privacy regulations outlined stipulated by HIPAA
                                                                                                and HITECH

                                                                                              • Ensure a high level of security combine with ease of use and
                                                                                                portability for end users




MedStar Health Chooses SafeNet Strong Authentication to Protect Access to Critical Hospital Applications Case Study                                         1
Benefits
The Solution: SafeNet eToken USB Authenticator                                                     • Strong two-factor authentication – staff must possess token and
More than 1,500 clinicians within seven MedStar-operated                                             token password in order to access sensitive data
hospitals now use the USB-based SafeNet eToken USB
                                                                                                   • Professional service and support – assistance in deployment
authenticator to gain access to two critical medical applications.
                                                                                                     makes implementation easy
MedStar Health staff members who need to remotely access
private patient data need only their eToken USB authenticator and                                  • Small and mobile – eToken’s small size means it is the ideal
token password.                                                                                      solution, especially when it comes to remote access

                                                                                                   • Portable and easy to use - The size of an average house key,
                                                                                                     eToken is convenient to carry around and easy to use
“Our clinicians realize the importance of properly                                                 • Ensures compliance with HIPAA and HITECH privacy regulations
securing patient data, and we continue to receive
                                                                                                   • Reduced costs associated with protecting data - Strong
positive feedback praising eToken’s simple, yet                                                      authentication has reduced the costs associated data breaches,
powerful authentication technology.”                                                                 as well as the costs associated with password management

-Jason Kreuter, Ph.D.
Associate Director
MedStar e-Health and MedStar Clinical Portal                                                    “SafeNet has been great to work with, as they have
                                                                                                helped us deploy eToken with customized security
                                                                                                applications used by clinicians throughout our
About MedStar Health
MedStar Health is a $2.9 billion non-profit healthcare organization
                                                                                                network of hospitals,” Our clinicians realize the
and a community-based network of seven hospitals and other                                      importance of properly securing patient data, and
healthcare services in the Baltimore-Washington region. As the area’s                           we continue to receive positive feedback praising
largest health system, it is one of its largest employers, with more
                                                                                                eToken’s simple, yet powerful authentication
than 23,000 employees and 4,600 affiliated physicians, all of whom
support MedStar Health’s patient-first philosophy that combines                                  technology.”
care, compassion and clinical excellence with an emphasis on                                    -Jason Kreuter, Ph.D.
customer service. We prove this everyday with over 145,000 inpatient                            Associate Director
admissions and more than one million outpatient visits each year. To                            MedStar e-Health and MedStar Clinical Portal
learn more about MedStar Health, visit:
http://www.medstarhealth.org/

About SafeNet
Founded in 1983, SafeNet is a global leader in information security.
SafeNet protects its customers’ most valuable assets, including
identities, transactions, communications, data, and software
licensing, throughout the data lifecycle. More than 25,000 customers
across both commercial enterprises and government agencies, and in
over 100 countries, trust their information security needs to SafeNet.




                                               Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
                                               Follow Us: www.safenet-inc.com/connected
                                               ©2011 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
                                               All other product names are trademarks of their respective owners. CS (EN)-03.04.11

MedStar Health Chooses SafeNet Strong Authentication to Protect Access to Critical Hospital Applications Case Study                                                 2

More Related Content

What's hot

Hit poster
Hit posterHit poster
Hit postersherv
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd Iaetsd
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoGlen Koskela
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture TelemedicineAlessandro Sappia
 
A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...cloud100
 
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...ijceronline
 
Effective Systems Management for Healthcare
Effective Systems Management for HealthcareEffective Systems Management for Healthcare
Effective Systems Management for HealthcareSolarWinds
 
DSA/M3 Serviceofferings
DSA/M3 ServiceofferingsDSA/M3 Serviceofferings
DSA/M3 Serviceofferingsmarymaz
 
PocketJet6 Midwest Palliative & Hospice Case Study
PocketJet6 Midwest Palliative & Hospice Case StudyPocketJet6 Midwest Palliative & Hospice Case Study
PocketJet6 Midwest Palliative & Hospice Case StudyBrother Mobile Solutions
 
iCloud Healthcare
iCloud  HealthcareiCloud  Healthcare
iCloud HealthcareiCloud Inc.
 
CDSS implementation with CDA generation and integration for health informatio...
CDSS implementation with CDA generation and integration for health informatio...CDSS implementation with CDA generation and integration for health informatio...
CDSS implementation with CDA generation and integration for health informatio...ijtsrd
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcarekhalidhassan105
 

What's hot (19)

Hit poster
Hit posterHit poster
Hit poster
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal health
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
Projecte del St. Olavs Trondheim University Hospital.
Projecte del St. Olavs Trondheim University Hospital.Projecte del St. Olavs Trondheim University Hospital.
Projecte del St. Olavs Trondheim University Hospital.
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
 
Gynocular
GynocularGynocular
Gynocular
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Pro Emtech - Promed
Pro Emtech - PromedPro Emtech - Promed
Pro Emtech - Promed
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
 
A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...
 
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
 
Effective Systems Management for Healthcare
Effective Systems Management for HealthcareEffective Systems Management for Healthcare
Effective Systems Management for Healthcare
 
DSA/M3 Serviceofferings
DSA/M3 ServiceofferingsDSA/M3 Serviceofferings
DSA/M3 Serviceofferings
 
PocketJet6 Midwest Palliative & Hospice Case Study
PocketJet6 Midwest Palliative & Hospice Case StudyPocketJet6 Midwest Palliative & Hospice Case Study
PocketJet6 Midwest Palliative & Hospice Case Study
 
iCloud Healthcare
iCloud  HealthcareiCloud  Healthcare
iCloud Healthcare
 
CDSS implementation with CDA generation and integration for health informatio...
CDSS implementation with CDA generation and integration for health informatio...CDSS implementation with CDA generation and integration for health informatio...
CDSS implementation with CDA generation and integration for health informatio...
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
 

Similar to MedStar Health Chooses SafeNet Strong Authentication to Protect Access to Critical Hospital Applications

MeritCare Success Story
MeritCare Success StoryMeritCare Success Story
MeritCare Success StoryImprivata
 
Ericsson Mobile Health - Mobile Monitoring and Diagnosing
Ericsson Mobile Health - Mobile Monitoring and DiagnosingEricsson Mobile Health - Mobile Monitoring and Diagnosing
Ericsson Mobile Health - Mobile Monitoring and DiagnosingEricsson France
 
Midwest Regional Health - EHR
Midwest Regional Health - EHRMidwest Regional Health - EHR
Midwest Regional Health - EHRWILLIE GREER
 
OhioHealth's Dublin Methodist Hospital Success Story
OhioHealth's Dublin Methodist Hospital Success StoryOhioHealth's Dublin Methodist Hospital Success Story
OhioHealth's Dublin Methodist Hospital Success StoryImprivata
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
Newcastle upon Tyne Hospitals NHS Success Story
Newcastle upon Tyne Hospitals NHS Success StoryNewcastle upon Tyne Hospitals NHS Success Story
Newcastle upon Tyne Hospitals NHS Success StoryImprivata
 
Openappchallengemcr
OpenappchallengemcrOpenappchallengemcr
Openappchallengemcrhealth2dev
 
Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Nrip Nihalani
 
MCS EMR & EHR And mMd. Net 2010
MCS EMR  & EHR And mMd. Net 2010MCS EMR  & EHR And mMd. Net 2010
MCS EMR & EHR And mMd. Net 2010edwardabrown3
 
Introduction-to-Healthcare-Application-Development.pdf
Introduction-to-Healthcare-Application-Development.pdfIntroduction-to-Healthcare-Application-Development.pdf
Introduction-to-Healthcare-Application-Development.pdfaastiksisgain
 
Preparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTPreparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTAlcatel-Lucent Enterprise
 
Healthcare Whitepaper
Healthcare WhitepaperHealthcare Whitepaper
Healthcare WhitepaperEdgevalue
 
Unit VI Case StudyAnimal use in toxicity testing has long been .docx
Unit VI Case StudyAnimal use in toxicity testing has long been .docxUnit VI Case StudyAnimal use in toxicity testing has long been .docx
Unit VI Case StudyAnimal use in toxicity testing has long been .docxdickonsondorris
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 
REMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptxREMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptxDr. Ravikiran H M Gowda
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care settingDr. Samir Sawli
 
Role of information technology on health
Role of information technology on healthRole of information technology on health
Role of information technology on healthNisha Yadav
 

Similar to MedStar Health Chooses SafeNet Strong Authentication to Protect Access to Critical Hospital Applications (20)

MeritCare Success Story
MeritCare Success StoryMeritCare Success Story
MeritCare Success Story
 
Ericsson Mobile Health - Mobile Monitoring and Diagnosing
Ericsson Mobile Health - Mobile Monitoring and DiagnosingEricsson Mobile Health - Mobile Monitoring and Diagnosing
Ericsson Mobile Health - Mobile Monitoring and Diagnosing
 
Midwest Regional Health - EHR
Midwest Regional Health - EHRMidwest Regional Health - EHR
Midwest Regional Health - EHR
 
OhioHealth's Dublin Methodist Hospital Success Story
OhioHealth's Dublin Methodist Hospital Success StoryOhioHealth's Dublin Methodist Hospital Success Story
OhioHealth's Dublin Methodist Hospital Success Story
 
Transforming healthcare
Transforming healthcareTransforming healthcare
Transforming healthcare
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
Newcastle upon Tyne Hospitals NHS Success Story
Newcastle upon Tyne Hospitals NHS Success StoryNewcastle upon Tyne Hospitals NHS Success Story
Newcastle upon Tyne Hospitals NHS Success Story
 
Openappchallengemcr
OpenappchallengemcrOpenappchallengemcr
Openappchallengemcr
 
Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability Clinical Data Standards and Data Portability
Clinical Data Standards and Data Portability
 
MCS EMR & EHR And mMd. Net 2010
MCS EMR  & EHR And mMd. Net 2010MCS EMR  & EHR And mMd. Net 2010
MCS EMR & EHR And mMd. Net 2010
 
Mobile Health
Mobile HealthMobile Health
Mobile Health
 
Introduction-to-Healthcare-Application-Development.pdf
Introduction-to-Healthcare-Application-Development.pdfIntroduction-to-Healthcare-Application-Development.pdf
Introduction-to-Healthcare-Application-Development.pdf
 
Preparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTPreparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoT
 
Healthcare Whitepaper
Healthcare WhitepaperHealthcare Whitepaper
Healthcare Whitepaper
 
PHR PPT (1).pptx
PHR PPT (1).pptxPHR PPT (1).pptx
PHR PPT (1).pptx
 
Unit VI Case StudyAnimal use in toxicity testing has long been .docx
Unit VI Case StudyAnimal use in toxicity testing has long been .docxUnit VI Case StudyAnimal use in toxicity testing has long been .docx
Unit VI Case StudyAnimal use in toxicity testing has long been .docx
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
REMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptxREMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptx
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care setting
 
Role of information technology on health
Role of information technology on healthRole of information technology on health
Role of information technology on health
 

More from SafeNet

eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference GuideSafeNet
 
Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudSafeNet
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlSafeNet
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilityNot Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilitySafeNet
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudSafeNet
 
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelCloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelSafeNet
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeNet
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSafeNet
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...SafeNet
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...SafeNet
 
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...SafeNet
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementSafeNet
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessSafeNet
 
Building Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and StrategiesBuilding Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and StrategiesSafeNet
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...SafeNet
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetSafeNet
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...SafeNet
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet
 

More from SafeNet (20)

eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
 
Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the Cloud
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilityNot Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the Cloud
 
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelCloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
 
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk Management
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
Building Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and StrategiesBuilding Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and Strategies
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

MedStar Health Chooses SafeNet Strong Authentication to Protect Access to Critical Hospital Applications

  • 1. MedStar Health Chooses SafeNet Strong Authentication to Protect Access to Critical Hospital Applications CASE STUDY Background MedStar Health is a $2.9 billion non-profit healthcare organization Business Problem and Customer Need and a community-based network of seven hospitals and other Managing medical records of thousands of patients, MedStar healthcare services in the Baltimore-Washington region. As the area’s Health needed to provide a strong authentication solution, largest health system, it is one of its largest employers, with more ensuring secure access for the doctors and nurses remotely than 23,000 employees and 4,600 affiliated physicians. accessing vital hospital applications. Specifically, MedStar health wanted to secure access to two critical medical applications – applications which store data from more the 139,000 inpatient admissions, and more than 900,000 outpatient visits each year. Specific requirements included: • Secure remote access for MedStar Health’s doctors, clinicians, nurses and administrative staff to critical online patient records • Comply with privacy regulations outlined stipulated by HIPAA and HITECH • Ensure a high level of security combine with ease of use and portability for end users MedStar Health Chooses SafeNet Strong Authentication to Protect Access to Critical Hospital Applications Case Study 1
  • 2. Benefits The Solution: SafeNet eToken USB Authenticator • Strong two-factor authentication – staff must possess token and More than 1,500 clinicians within seven MedStar-operated token password in order to access sensitive data hospitals now use the USB-based SafeNet eToken USB • Professional service and support – assistance in deployment authenticator to gain access to two critical medical applications. makes implementation easy MedStar Health staff members who need to remotely access private patient data need only their eToken USB authenticator and • Small and mobile – eToken’s small size means it is the ideal token password. solution, especially when it comes to remote access • Portable and easy to use - The size of an average house key, eToken is convenient to carry around and easy to use “Our clinicians realize the importance of properly • Ensures compliance with HIPAA and HITECH privacy regulations securing patient data, and we continue to receive • Reduced costs associated with protecting data - Strong positive feedback praising eToken’s simple, yet authentication has reduced the costs associated data breaches, powerful authentication technology.” as well as the costs associated with password management -Jason Kreuter, Ph.D. Associate Director MedStar e-Health and MedStar Clinical Portal “SafeNet has been great to work with, as they have helped us deploy eToken with customized security applications used by clinicians throughout our About MedStar Health MedStar Health is a $2.9 billion non-profit healthcare organization network of hospitals,” Our clinicians realize the and a community-based network of seven hospitals and other importance of properly securing patient data, and healthcare services in the Baltimore-Washington region. As the area’s we continue to receive positive feedback praising largest health system, it is one of its largest employers, with more eToken’s simple, yet powerful authentication than 23,000 employees and 4,600 affiliated physicians, all of whom support MedStar Health’s patient-first philosophy that combines technology.” care, compassion and clinical excellence with an emphasis on -Jason Kreuter, Ph.D. customer service. We prove this everyday with over 145,000 inpatient Associate Director admissions and more than one million outpatient visits each year. To MedStar e-Health and MedStar Clinical Portal learn more about MedStar Health, visit: http://www.medstarhealth.org/ About SafeNet Founded in 1983, SafeNet is a global leader in information security. SafeNet protects its customers’ most valuable assets, including identities, transactions, communications, data, and software licensing, throughout the data lifecycle. More than 25,000 customers across both commercial enterprises and government agencies, and in over 100 countries, trust their information security needs to SafeNet. Contact Us: For all office locations and contact information, please visit www.safenet-inc.com Follow Us: www.safenet-inc.com/connected ©2011 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. CS (EN)-03.04.11 MedStar Health Chooses SafeNet Strong Authentication to Protect Access to Critical Hospital Applications Case Study 2