SlideShare a Scribd company logo
1 of 2
Download to read offline
Healthcare organizations are held to the highest standard when it comes
to managing and protecting patient healthcare information (PHI). Rules and
requirements are provided by a variety of regulatory and industry bodies
including HIPAA, HITECH, and HIMSS. Federal stimulus packages also exist,
such as Meaningful Use to ensure hospitals and care facilities leverage
technology to properly manage electronic health records (EHR).
And while it’s your responsibility to navigate through this landscape and
deliver on these mandates, you must also keep pace with a healthcare
environment that never stands still. A few years ago it was the adoption
of laptops for mainstream use in healthcare. Today it’s iPads, tablets, and
other ultra portable devices.
This expansion of endpoint type is simply a reflection of the reality within
healthcare which has spent the past decade morphing into a model of
mobility. With government pushing healthcare out of the hospital and into
the home to reduce the cost of care, an IT strategy that supports mobility
has become an absolute requirement.
HEALTHCARE
Devices containing PHI data can be anywhere and
must be secured and managed remotely. Ideally,
solutions should be SaaS-based or installable using
existing servers and hardware components:
Endpoint Security
•	 Differing levels of risk (misplaced, lost, stolen)
require different levels of security
•	 Pre-emptive security measures should be in
place to prevent a reportable breach before it
happens
•	 No reliance on end user behavior
•	 Lost or stolen devices should be recoverable so
hardware budgets can be spent meaningfully
•	 Provable method of data removal
•	 Understand the cause of a reportable security
breach so it doesn’t happen again
Endpoint Management
•	 Block viruses and bad downloads so the device
does not become a point of risk
•	 Measure and manage vulnerability using
standard Security Content Automation Protocol
reports
•	 Protect the network from faulty updates using
automated patch management
•	 Reduce footprint and increase efficiencies
through effective power management policies
•	 Collect data from each device for proactive
maintenance before the device is compromised
•	 Remote management console that can be used
by all IT administrators to manage all devices
If your healthcare organization is entrusted to manage
PHI, then you need to have the right tools to secure and
manage your endpoints.
Endpoint Security
Endpoint Management
HEALTHCARE
“Computrace immediately gave us visibility into our laptop population. We can see where
the laptop is, who is logging in and what software is installed. It also allows us to verify
that the laptop’s encryption is up to our standard – which is key for regulatory compliance. It
has taken us from 30% IT asset auditing capability to well over 95% on computers that are
outside our facilities.”
Brad Myrvold | Systems Manager of Desktop Technology | Allina Hospitals & Clinics
“Absolute Manage provides new ways to automate the setup and configuration of our
machines, so it’s safe to say the software isn’t just helping us streamline and manage our
current process.. It’s also enabling us to think ahead and prepare for the future in ways that
we haven’t had the time or capacity for in the past.”
Michael Scarpelli | Technical Support Manager | La Jolla Institute for Allergy & Immunology
“As we began increasing the number of laptops across our organization, we saw a
corresponding rise in laptop theft. I was attending a Microsoft training course where a
colleague suggested that we investigate Computrace. The more we learned about the product,
it became obvious that Computrace could significantly benefit our computer security strategy.”
Alison Wells | Manager of Client Services | Community Medical Centers
www.absolute.com
Hospitals & Clinics
Computrace
®
Products
Centrally track and secure IT assets within a
single cloud-based console. Easily identify
computers that have gone missing, enforce
software policies, remotely invoke pre-emptive
and reactive security measures to safeguard
each device and the data it contains.
Absolute Secure Drive
Self-encrypting drives (SEDs) are the latest
evolution of encryption, built directly into the
hardware of each device at the factory. Absolute
Secure Drive provides the console through
which you can configure and set up each SED,
administer users, authentication methods,
policies, and system maintenance through to
end of life.
Absolute Manage
Manage PC, Mac, iOS, Android, and Windows®
Phone devices from within a single console
using a Mac or a PC. Remotely perform
standard maintenance routines and take
strategic and responsive measures based upon
the requirements of each device.
Mobile Device Management
Remotely manage iOS, Android, and Windows®
Phone devices wirelessly (over 3G or Wi-Fi).
Configure, query, and even wipe or lock each
device. Manage and deploy profiles to configure
email, restrict applications, set up VPN, disable
camera and send messages to end users.
© 2012 Absolute Software Corporation. All rights reserved. Computrace and Absolute are registered trademarks of Absolute Software
Corporation. All other trademarks are property of their respective owners. ABT-HC-B-E-042612
Absolute®
Software helps healthcare organizations around the world remotely secure
and manage their endpoints. From institutes and universities to large hospitals and
community healthcare centers, Absolute Software provides remote and persistent
solutions so that our customers can track, locate, secure, and manage their IT
deployments. Anytime, anywhere.
For more information visit: www.absolute.com/healthcare

More Related Content

What's hot

INX_Overview_Africa_2014
INX_Overview_Africa_2014INX_Overview_Africa_2014
INX_Overview_Africa_2014Sheldon Barnett
 
Healthcare presentation
Healthcare presentationHealthcare presentation
Healthcare presentationNicholas Pace
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveGaurav Awasthi
 
IoT applications and use cases part-2
IoT applications and use cases part-2IoT applications and use cases part-2
IoT applications and use cases part-2Divya Tiwari
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavSandep Jadhav
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya
 
Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareMike Rossi
 
Acuity Sos Overview
Acuity Sos OverviewAcuity Sos Overview
Acuity Sos Overviewdavidwells
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilienceRishi Kant
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Centers
 
Autonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - PresentationAutonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - PresentationIvo Neskovic
 

What's hot (19)

Managing and securing mobile devices
Managing and securing mobile devicesManaging and securing mobile devices
Managing and securing mobile devices
 
INX_Overview_Africa_2014
INX_Overview_Africa_2014INX_Overview_Africa_2014
INX_Overview_Africa_2014
 
ThermaSense_Brochure
ThermaSense_BrochureThermaSense_Brochure
ThermaSense_Brochure
 
Healthcare presentation
Healthcare presentationHealthcare presentation
Healthcare presentation
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
IoT applications and use cases part-2
IoT applications and use cases part-2IoT applications and use cases part-2
IoT applications and use cases part-2
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep Jadhav
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
 
08 july 2016
08 july 201608 july 2016
08 july 2016
 
Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS Healthcare
 
Acuity Sos Overview
Acuity Sos OverviewAcuity Sos Overview
Acuity Sos Overview
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Web Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance CertificationWeb Werks Data Center Achieves HIPAA Compliance Certification
Web Werks Data Center Achieves HIPAA Compliance Certification
 
Autonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - PresentationAutonomic Computing: Vision or Reality - Presentation
Autonomic Computing: Vision or Reality - Presentation
 
IT ASSET MANAGEMENT
IT ASSET MANAGEMENTIT ASSET MANAGEMENT
IT ASSET MANAGEMENT
 
Omzig
OmzigOmzig
Omzig
 

Viewers also liked

What do you feel you have learnt in the progression of your magazine.
What do you feel you have learnt in the progression of your magazine.What do you feel you have learnt in the progression of your magazine.
What do you feel you have learnt in the progression of your magazine.liamjamesvernon16
 
石川県ソフトウェア技術研究会主催セミナー講演レジュメ公開in石川県工業試験場
石川県ソフトウェア技術研究会主催セミナー講演レジュメ公開in石川県工業試験場石川県ソフトウェア技術研究会主催セミナー講演レジュメ公開in石川県工業試験場
石川県ソフトウェア技術研究会主催セミナー講演レジュメ公開in石川県工業試験場新潟コンサルタント横田秀珠
 
12-11-2013 El Gobernador Guillermo Padrés sostuvo una reunión con el coordina...
12-11-2013 El Gobernador Guillermo Padrés sostuvo una reunión con el coordina...12-11-2013 El Gobernador Guillermo Padrés sostuvo una reunión con el coordina...
12-11-2013 El Gobernador Guillermo Padrés sostuvo una reunión con el coordina...Guillermo Padrés Elías
 
Eu upitnik i ženski odgovor
Eu upitnik i ženski odgovorEu upitnik i ženski odgovor
Eu upitnik i ženski odgovorgordana comic
 
Programa V Jornada
Programa V JornadaPrograma V Jornada
Programa V JornadaMcolet
 
UD. Máster RRHH. Mat5. Mod2. Motivacion
UD. Máster RRHH. Mat5. Mod2. MotivacionUD. Máster RRHH. Mat5. Mod2. Motivacion
UD. Máster RRHH. Mat5. Mod2. MotivacionAlex Rayón Jerez
 
Creazione automatica dei disegni
Creazione automatica dei disegniCreazione automatica dei disegni
Creazione automatica dei disegnicvdesign
 
Actividad 1. diagnostico
Actividad 1. diagnosticoActividad 1. diagnostico
Actividad 1. diagnosticoJACKYREYRO
 
Soccer Ashton and Jazzy
Soccer Ashton and JazzySoccer Ashton and Jazzy
Soccer Ashton and Jazzyktuttle34
 
Presentacion Bibliotecas.Secundaria
Presentacion Bibliotecas.SecundariaPresentacion Bibliotecas.Secundaria
Presentacion Bibliotecas.SecundariaPilar Torres
 
Water Words That Work National Lakes Conference
Water Words That Work National Lakes ConferenceWater Words That Work National Lakes Conference
Water Words That Work National Lakes Conferencewaterwordsthatwork
 
ACSA 2014 / Primer on Restraints and Seclusion
ACSA 2014 / Primer on Restraints and SeclusionACSA 2014 / Primer on Restraints and Seclusion
ACSA 2014 / Primer on Restraints and SeclusionErnest Bell
 
SUSE Open Forum講演 - OpenStack Summit 2014 Paris 報告
SUSE Open Forum講演 - OpenStack Summit 2014 Paris 報告SUSE Open Forum講演 - OpenStack Summit 2014 Paris 報告
SUSE Open Forum講演 - OpenStack Summit 2014 Paris 報告VirtualTech Japan Inc.
 
Las competencias digitales en mi empresa: ¿en qué me pueden ayudar?
Las competencias digitales en mi empresa: ¿en qué me pueden ayudar?Las competencias digitales en mi empresa: ¿en qué me pueden ayudar?
Las competencias digitales en mi empresa: ¿en qué me pueden ayudar?Alex Rayón Jerez
 
Marketing digital para la captación de más clientes
Marketing digital para la captación de más clientesMarketing digital para la captación de más clientes
Marketing digital para la captación de más clientesAlex Rayón Jerez
 
La transformación digital del sector financiero
La transformación digital del sector financieroLa transformación digital del sector financiero
La transformación digital del sector financieroAlex Rayón Jerez
 

Viewers also liked (17)

What do you feel you have learnt in the progression of your magazine.
What do you feel you have learnt in the progression of your magazine.What do you feel you have learnt in the progression of your magazine.
What do you feel you have learnt in the progression of your magazine.
 
石川県ソフトウェア技術研究会主催セミナー講演レジュメ公開in石川県工業試験場
石川県ソフトウェア技術研究会主催セミナー講演レジュメ公開in石川県工業試験場石川県ソフトウェア技術研究会主催セミナー講演レジュメ公開in石川県工業試験場
石川県ソフトウェア技術研究会主催セミナー講演レジュメ公開in石川県工業試験場
 
12-11-2013 El Gobernador Guillermo Padrés sostuvo una reunión con el coordina...
12-11-2013 El Gobernador Guillermo Padrés sostuvo una reunión con el coordina...12-11-2013 El Gobernador Guillermo Padrés sostuvo una reunión con el coordina...
12-11-2013 El Gobernador Guillermo Padrés sostuvo una reunión con el coordina...
 
Eu upitnik i ženski odgovor
Eu upitnik i ženski odgovorEu upitnik i ženski odgovor
Eu upitnik i ženski odgovor
 
Programa V Jornada
Programa V JornadaPrograma V Jornada
Programa V Jornada
 
UD. Máster RRHH. Mat5. Mod2. Motivacion
UD. Máster RRHH. Mat5. Mod2. MotivacionUD. Máster RRHH. Mat5. Mod2. Motivacion
UD. Máster RRHH. Mat5. Mod2. Motivacion
 
Creazione automatica dei disegni
Creazione automatica dei disegniCreazione automatica dei disegni
Creazione automatica dei disegni
 
Actividad 1. diagnostico
Actividad 1. diagnosticoActividad 1. diagnostico
Actividad 1. diagnostico
 
Soccer Ashton and Jazzy
Soccer Ashton and JazzySoccer Ashton and Jazzy
Soccer Ashton and Jazzy
 
Presentacion Bibliotecas.Secundaria
Presentacion Bibliotecas.SecundariaPresentacion Bibliotecas.Secundaria
Presentacion Bibliotecas.Secundaria
 
Water Words That Work National Lakes Conference
Water Words That Work National Lakes ConferenceWater Words That Work National Lakes Conference
Water Words That Work National Lakes Conference
 
My Brothers Keeper 2
My Brothers Keeper 2My Brothers Keeper 2
My Brothers Keeper 2
 
ACSA 2014 / Primer on Restraints and Seclusion
ACSA 2014 / Primer on Restraints and SeclusionACSA 2014 / Primer on Restraints and Seclusion
ACSA 2014 / Primer on Restraints and Seclusion
 
SUSE Open Forum講演 - OpenStack Summit 2014 Paris 報告
SUSE Open Forum講演 - OpenStack Summit 2014 Paris 報告SUSE Open Forum講演 - OpenStack Summit 2014 Paris 報告
SUSE Open Forum講演 - OpenStack Summit 2014 Paris 報告
 
Las competencias digitales en mi empresa: ¿en qué me pueden ayudar?
Las competencias digitales en mi empresa: ¿en qué me pueden ayudar?Las competencias digitales en mi empresa: ¿en qué me pueden ayudar?
Las competencias digitales en mi empresa: ¿en qué me pueden ayudar?
 
Marketing digital para la captación de más clientes
Marketing digital para la captación de más clientesMarketing digital para la captación de más clientes
Marketing digital para la captación de más clientes
 
La transformación digital del sector financiero
La transformación digital del sector financieroLa transformación digital del sector financiero
La transformación digital del sector financiero
 

Similar to Absolute software-for-healthcare

Healthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of futureHealthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of futureVARUN KESAVAN
 
Benefits of Cloud-Based EHR ppt.pdf
Benefits of Cloud-Based EHR ppt.pdfBenefits of Cloud-Based EHR ppt.pdf
Benefits of Cloud-Based EHR ppt.pdfEduHealth1
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
IHS Managed Service Offerings
IHS Managed Service OfferingsIHS Managed Service Offerings
IHS Managed Service OfferingsCarrie Price
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Encryptionsolutionsforhealthcare
EncryptionsolutionsforhealthcareEncryptionsolutionsforhealthcare
EncryptionsolutionsforhealthcareNitin Parbhakar
 
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptxESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptxhamzaalkhairi802
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management SolutionGeorge Wainblat
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
2016 Guardian TOS Sales Deck RAPT V2
2016 Guardian TOS Sales Deck RAPT V22016 Guardian TOS Sales Deck RAPT V2
2016 Guardian TOS Sales Deck RAPT V2Michael Filewicz
 

Similar to Absolute software-for-healthcare (20)

Healthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of futureHealthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of future
 
Benefits of Cloud-Based EHR ppt.pdf
Benefits of Cloud-Based EHR ppt.pdfBenefits of Cloud-Based EHR ppt.pdf
Benefits of Cloud-Based EHR ppt.pdf
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
IHS Managed Service Offerings
IHS Managed Service OfferingsIHS Managed Service Offerings
IHS Managed Service Offerings
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Encryptionsolutionsforhealthcare
EncryptionsolutionsforhealthcareEncryptionsolutionsforhealthcare
Encryptionsolutionsforhealthcare
 
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptxESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Scg Service Description
Scg Service DescriptionScg Service Description
Scg Service Description
 
Scg service description
Scg service descriptionScg service description
Scg service description
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management Solution
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
2016 Guardian TOS Sales Deck RAPT V2
2016 Guardian TOS Sales Deck RAPT V22016 Guardian TOS Sales Deck RAPT V2
2016 Guardian TOS Sales Deck RAPT V2
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 

Absolute software-for-healthcare

  • 1. Healthcare organizations are held to the highest standard when it comes to managing and protecting patient healthcare information (PHI). Rules and requirements are provided by a variety of regulatory and industry bodies including HIPAA, HITECH, and HIMSS. Federal stimulus packages also exist, such as Meaningful Use to ensure hospitals and care facilities leverage technology to properly manage electronic health records (EHR). And while it’s your responsibility to navigate through this landscape and deliver on these mandates, you must also keep pace with a healthcare environment that never stands still. A few years ago it was the adoption of laptops for mainstream use in healthcare. Today it’s iPads, tablets, and other ultra portable devices. This expansion of endpoint type is simply a reflection of the reality within healthcare which has spent the past decade morphing into a model of mobility. With government pushing healthcare out of the hospital and into the home to reduce the cost of care, an IT strategy that supports mobility has become an absolute requirement. HEALTHCARE Devices containing PHI data can be anywhere and must be secured and managed remotely. Ideally, solutions should be SaaS-based or installable using existing servers and hardware components: Endpoint Security • Differing levels of risk (misplaced, lost, stolen) require different levels of security • Pre-emptive security measures should be in place to prevent a reportable breach before it happens • No reliance on end user behavior • Lost or stolen devices should be recoverable so hardware budgets can be spent meaningfully • Provable method of data removal • Understand the cause of a reportable security breach so it doesn’t happen again Endpoint Management • Block viruses and bad downloads so the device does not become a point of risk • Measure and manage vulnerability using standard Security Content Automation Protocol reports • Protect the network from faulty updates using automated patch management • Reduce footprint and increase efficiencies through effective power management policies • Collect data from each device for proactive maintenance before the device is compromised • Remote management console that can be used by all IT administrators to manage all devices If your healthcare organization is entrusted to manage PHI, then you need to have the right tools to secure and manage your endpoints.
  • 2. Endpoint Security Endpoint Management HEALTHCARE “Computrace immediately gave us visibility into our laptop population. We can see where the laptop is, who is logging in and what software is installed. It also allows us to verify that the laptop’s encryption is up to our standard – which is key for regulatory compliance. It has taken us from 30% IT asset auditing capability to well over 95% on computers that are outside our facilities.” Brad Myrvold | Systems Manager of Desktop Technology | Allina Hospitals & Clinics “Absolute Manage provides new ways to automate the setup and configuration of our machines, so it’s safe to say the software isn’t just helping us streamline and manage our current process.. It’s also enabling us to think ahead and prepare for the future in ways that we haven’t had the time or capacity for in the past.” Michael Scarpelli | Technical Support Manager | La Jolla Institute for Allergy & Immunology “As we began increasing the number of laptops across our organization, we saw a corresponding rise in laptop theft. I was attending a Microsoft training course where a colleague suggested that we investigate Computrace. The more we learned about the product, it became obvious that Computrace could significantly benefit our computer security strategy.” Alison Wells | Manager of Client Services | Community Medical Centers www.absolute.com Hospitals & Clinics Computrace ® Products Centrally track and secure IT assets within a single cloud-based console. Easily identify computers that have gone missing, enforce software policies, remotely invoke pre-emptive and reactive security measures to safeguard each device and the data it contains. Absolute Secure Drive Self-encrypting drives (SEDs) are the latest evolution of encryption, built directly into the hardware of each device at the factory. Absolute Secure Drive provides the console through which you can configure and set up each SED, administer users, authentication methods, policies, and system maintenance through to end of life. Absolute Manage Manage PC, Mac, iOS, Android, and Windows® Phone devices from within a single console using a Mac or a PC. Remotely perform standard maintenance routines and take strategic and responsive measures based upon the requirements of each device. Mobile Device Management Remotely manage iOS, Android, and Windows® Phone devices wirelessly (over 3G or Wi-Fi). Configure, query, and even wipe or lock each device. Manage and deploy profiles to configure email, restrict applications, set up VPN, disable camera and send messages to end users. © 2012 Absolute Software Corporation. All rights reserved. Computrace and Absolute are registered trademarks of Absolute Software Corporation. All other trademarks are property of their respective owners. ABT-HC-B-E-042612 Absolute® Software helps healthcare organizations around the world remotely secure and manage their endpoints. From institutes and universities to large hospitals and community healthcare centers, Absolute Software provides remote and persistent solutions so that our customers can track, locate, secure, and manage their IT deployments. Anytime, anywhere. For more information visit: www.absolute.com/healthcare