SlideShare a Scribd company logo
1 of 2
Download to read offline
HIPAA                               Hitachi ID Solutions Supporting HIPAA Compliance

The Hitachi ID                          The HIPAA Challenge
Management Suite                        Regulatory compliance with the Health Insurance Portability and Account-
                                        ability Act (HIPAA) has created significant challenges for healthcare providers
The Hitachi ID Management Suite is      and payers. While insurance portability is a uniquely American issue, HIPAA
an integrated solution for managing     includes requirements for patient privacy protection. Privacy protection is also
user onboarding, security manage-       a requirement in most other, non US jurisdictions. To view the full text of the
ment and deactivation processes.        HIPAA act go to http://aspe.hhs.gov/admnsimp/pl104191.htm
It uses automation, self-service,
consolidated and delegated ad-
                                        Privacy protection depends on effective internal controls, including:
ministration to reduce IT support
cost, improve user productivity and
strengthen security.                    • Who can access sensitive patient data?
                                        • How are these users authenticated?
Sample Healthcare organizations         • What can they see and modify?
that use the Hitachi ID Management      • Are users held accountable for their actions?
Suite:
                                        These requirements are met by classic AAA infrastructure: Authentication,
• Blue Shield of California             Authorization and Audit. AAA infrastructure has been standard in enterprise ap-
• Cancer Care Ontario                   plications for years. Unfortunately, a large and growing number of applications,
• Hospital Corporation of America       combined with high staff mobility have made it much harder to manage user
• Humana Inc.
                                        data. As a result, users get access rights inappropriate to their jobs and users
• Independence Blue Cross
                                        may be inadequately authenticated. Problems with user security include:
• Indian River Memorial Hospital
• Mount Carmel Health
• Siemens Health Services               • Orphan accounts
• St John’s Regional Medical Center     • Dormant accounts
• University of Wisconsin Hospital      • Stale or excess privileges
  and Clinics Authority                 • Weak passwords
                                        • Vulnerable caller authentication at the help desk

                                        These weaknesses are not in the AAA technology -- they are in the business
                                        processes for managing user data.



                                        The Solution
                                        Organizations must implement sound processes to manage identities and en-
                                        titlements, so that only the right users get access to the right data, at the right
                                        time. This is accomplished by:
                                        • Correlating different user IDs to people.
                                        • Controlling how users acquire and when they lose security rights.
                                        • Logging current and historic access rights, to support audits.
                                        • Periodic audits of user privileges, carried out by managers and data owners.
                                        • Controlling access to administrative accounts.
                                        • Requiring strong passwords or two-factor authentication.
                                        • Using reliable processes to authenticate callers to the help desk.
Hitachi-ID.com

Rapid Deployment                                                                                                                              Technical Specifications
Identity management systems can be challenging to implement. Common                                                                           TARGET SYSTEM Integration
problems include poor user data quality, costly role engineering and hard to                                                                  Directory: Windows domains, Active Directory,
manage workflow systems. To overcome these problems, the Hitachi ID Man-                                                                      eDirectory, Novell NDS, any LDAP
                                                                                                                                              File/Print: Windows NT, 2000, 2003; Novell Net-
agement Suite:                                                                                                                                Ware, Samba, PathWorks, OS2
                                                                                                                                              Databases: Oracle, Sybase, SQL Server, DB2/
• Leverages auto-discovery and self-service to find and map login IDs.                                                                        UDB, Informix
                                                                                                                                              Unix: Linux, Sun, HP, IBM, Compaq, SGI, Unisys,
• Avoids costly role engineering entirely.                                                                                                    SCO, DG; passwd, shadow, TCB, Kerberos, NIS,
• Simplifies workflow management: one process to authorize all requests.                                                                      NIS+
                                                                                                                                              Mainframes: MVS/OS390/zOS, VM/ESA, Unisys,
                                                                                                                                              Siemens
The Hitachi ID Management Suite                                                                                                               Minis: OS400, OpenVMS, Tandem
The Hitachi ID Management Suite is an integrated solution for managing user                                                                   Applications: Oracle, PeopleSoft, SAP; open
                                                                                                                                              plug-ins for SQL, ASPs, web services and more
lifecycles. It automates setup, maintenance and termination of user profiles,
                                                                                                                                              Groupware: MS Exchange, Lotus Notes, Novell
passwords and access rights. It supports stronger security, and therefore                                                                     GroupWise
HIPAA compliance, with the following components:                                                                                              Networking: RAS, routers, firewalls
                                                                                                                                              Flexible Agents: Target API, Telnet, TN3270,
                                                                                                                                              TN5250, HTTP(S), Web Services, command-line,
Hitachi ID Automated Discovery                                                                                                                SQL code, LDAP attributes
Map user IDs to owners and identify orphan and dormant accounts.
                                                                                                                                              Support Integration
                                                                                                                                              Automatically create, update and close tickets
Hitachi ID Password Manager                                                                                                                   on:
Enforce a global password policy and ensure that when users forget their pass-                                                                • Axios Assyst 	           • HP Service Manager
                                                                                                                                              • SupportSoft SmartIssue 	 • Tivoli Service Desk
word, they are still reliably authenticated.                                                                                                  • Magic Service Desk 	     • Peregrine Service
                                                                                                                                              • Clarify eFrontOffice 	   • FrontRange HEAT
                                                                                                                                              • BMC Remedy AR System
Hitachi ID Identity Manager
Automatically deactivate access for terminated employees. Report on current
                                                                                                                                              Additional integrations through e-mail, ODBC,
and past security rights.                                                                                                                     web services and web forms integration.


Hitachi ID Access Certifier
Prompt managers, application owners and group owners to periodically review
security rights within their scope of authority. Deactivate inappropriate rights.

Hitachi ID Privileged Password Manager
Periodically randomize administrator passwords and control access to those
accounts by authenticating, authorizing and logging access.




                                                                                                                                            500, 1401 - 1 Street SE
© 2012 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID, P-Synch, ID-Synch, ID-Access, ID-Discover, ID-Telephony, AdMax and         Calgary AB Canada T2G 2J3
ID-Certify are registered trademarks of Hitachi ID Systems, Inc. in the United States and Canada. All other marks, symbols and trademarks   Tel: 1.403.233.0740 Fax: 1.403.233.0725
are the property of their respective owners.                                                                                                E-Mail: info@Hitachi-ID.com

More Related Content

What's hot

Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Systems, Inc.
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration StrategiesJoe Honan
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationNovell
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
Ensuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsEnsuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsYuan Zhou
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMOKsystem
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15 Suraj Kumar.A.S
 
Jive World 12 - Apps 202
Jive World 12 - Apps 202Jive World 12 - Apps 202
Jive World 12 - Apps 202weitzelm
 

What's hot (19)

Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration Strategies
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor Authentication
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Ensuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsEnsuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applications
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCM
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Omni - The Integration Company
Omni - The Integration CompanyOmni - The Integration Company
Omni - The Integration Company
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Oracle a TBIZ2011
Oracle a TBIZ2011Oracle a TBIZ2011
Oracle a TBIZ2011
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15
 
Jive World 12 - Apps 202
Jive World 12 - Apps 202Jive World 12 - Apps 202
Jive World 12 - Apps 202
 

Similar to Hitachi ID Solutions Supporting HIPAA Compliance

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access ManagementKalyana Sundaram
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementBeyondTrust
 

Similar to Hitachi ID Solutions Supporting HIPAA Compliance (20)

Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 

More from Hitachi ID Systems, Inc.

Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication ManagementHitachi ID Systems, Inc.
 

More from Hitachi ID Systems, Inc. (18)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Hitachi ID Solutions Supporting HIPAA Compliance

  • 1. HIPAA Hitachi ID Solutions Supporting HIPAA Compliance The Hitachi ID The HIPAA Challenge Management Suite Regulatory compliance with the Health Insurance Portability and Account- ability Act (HIPAA) has created significant challenges for healthcare providers The Hitachi ID Management Suite is and payers. While insurance portability is a uniquely American issue, HIPAA an integrated solution for managing includes requirements for patient privacy protection. Privacy protection is also user onboarding, security manage- a requirement in most other, non US jurisdictions. To view the full text of the ment and deactivation processes. HIPAA act go to http://aspe.hhs.gov/admnsimp/pl104191.htm It uses automation, self-service, consolidated and delegated ad- Privacy protection depends on effective internal controls, including: ministration to reduce IT support cost, improve user productivity and strengthen security. • Who can access sensitive patient data? • How are these users authenticated? Sample Healthcare organizations • What can they see and modify? that use the Hitachi ID Management • Are users held accountable for their actions? Suite: These requirements are met by classic AAA infrastructure: Authentication, • Blue Shield of California Authorization and Audit. AAA infrastructure has been standard in enterprise ap- • Cancer Care Ontario plications for years. Unfortunately, a large and growing number of applications, • Hospital Corporation of America combined with high staff mobility have made it much harder to manage user • Humana Inc. data. As a result, users get access rights inappropriate to their jobs and users • Independence Blue Cross may be inadequately authenticated. Problems with user security include: • Indian River Memorial Hospital • Mount Carmel Health • Siemens Health Services • Orphan accounts • St John’s Regional Medical Center • Dormant accounts • University of Wisconsin Hospital • Stale or excess privileges and Clinics Authority • Weak passwords • Vulnerable caller authentication at the help desk These weaknesses are not in the AAA technology -- they are in the business processes for managing user data. The Solution Organizations must implement sound processes to manage identities and en- titlements, so that only the right users get access to the right data, at the right time. This is accomplished by: • Correlating different user IDs to people. • Controlling how users acquire and when they lose security rights. • Logging current and historic access rights, to support audits. • Periodic audits of user privileges, carried out by managers and data owners. • Controlling access to administrative accounts. • Requiring strong passwords or two-factor authentication. • Using reliable processes to authenticate callers to the help desk.
  • 2. Hitachi-ID.com Rapid Deployment Technical Specifications Identity management systems can be challenging to implement. Common TARGET SYSTEM Integration problems include poor user data quality, costly role engineering and hard to Directory: Windows domains, Active Directory, manage workflow systems. To overcome these problems, the Hitachi ID Man- eDirectory, Novell NDS, any LDAP File/Print: Windows NT, 2000, 2003; Novell Net- agement Suite: Ware, Samba, PathWorks, OS2 Databases: Oracle, Sybase, SQL Server, DB2/ • Leverages auto-discovery and self-service to find and map login IDs. UDB, Informix Unix: Linux, Sun, HP, IBM, Compaq, SGI, Unisys, • Avoids costly role engineering entirely. SCO, DG; passwd, shadow, TCB, Kerberos, NIS, • Simplifies workflow management: one process to authorize all requests. NIS+ Mainframes: MVS/OS390/zOS, VM/ESA, Unisys, Siemens The Hitachi ID Management Suite Minis: OS400, OpenVMS, Tandem The Hitachi ID Management Suite is an integrated solution for managing user Applications: Oracle, PeopleSoft, SAP; open plug-ins for SQL, ASPs, web services and more lifecycles. It automates setup, maintenance and termination of user profiles, Groupware: MS Exchange, Lotus Notes, Novell passwords and access rights. It supports stronger security, and therefore GroupWise HIPAA compliance, with the following components: Networking: RAS, routers, firewalls Flexible Agents: Target API, Telnet, TN3270, TN5250, HTTP(S), Web Services, command-line, Hitachi ID Automated Discovery SQL code, LDAP attributes Map user IDs to owners and identify orphan and dormant accounts. Support Integration Automatically create, update and close tickets Hitachi ID Password Manager on: Enforce a global password policy and ensure that when users forget their pass- • Axios Assyst • HP Service Manager • SupportSoft SmartIssue • Tivoli Service Desk word, they are still reliably authenticated. • Magic Service Desk • Peregrine Service • Clarify eFrontOffice • FrontRange HEAT • BMC Remedy AR System Hitachi ID Identity Manager Automatically deactivate access for terminated employees. Report on current Additional integrations through e-mail, ODBC, and past security rights. web services and web forms integration. Hitachi ID Access Certifier Prompt managers, application owners and group owners to periodically review security rights within their scope of authority. Deactivate inappropriate rights. Hitachi ID Privileged Password Manager Periodically randomize administrator passwords and control access to those accounts by authenticating, authorizing and logging access. 500, 1401 - 1 Street SE © 2012 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID, P-Synch, ID-Synch, ID-Access, ID-Discover, ID-Telephony, AdMax and Calgary AB Canada T2G 2J3 ID-Certify are registered trademarks of Hitachi ID Systems, Inc. in the United States and Canada. All other marks, symbols and trademarks Tel: 1.403.233.0740 Fax: 1.403.233.0725 are the property of their respective owners. E-Mail: info@Hitachi-ID.com