Encryption technology for the Healthcare enterprisePrivacy and Security of PHIProtecting Data at Rest
Health Information SecurityAdoption and implementation of emerging  health IT solutions must involve reassessment of security practices and policiesHealthcare providers are expected to prevent the unauthorized access, use and disclosure of a patient’s protected electronic health information Developing a comprehensive strategy for  ensuring the confidentiality, integrity and availability of  electronic patient data will be required
Health Information SecurityAssessing the health IT environment requires an understanding of all technologies being used throughout the enterprise for clinical, and administrative purposesEvaluate any possible situation for unauthorized access and use.  Today, many individuals and groups have access to, and can share electronic medical records and confidential patient information, including:Government and public health agenciesInsurance companiesHospital and Physician office personnelIT vendors and their business associatesPart of the healthcare providers comprehensive security strategy will include a professional grade encryption solution
EncryptionIs a process that transforms plaintext data (using a certified algorithm like AES – Advanced Encryption Standard) into a format that makes it unreadable without an authorization key The authorization key is a type of password and is required to encrypt and also decrypt the dataKey Management is the process of monitoring the algorithms and the employees keys, and is managed by a key custodianChanging keys regularly is referred to as Key Rotation, and is necessary in order to maintain optimum security levels
Encryption	The key management and key rotation processes are the most critical aspects of data encryption Most conventional solutions are time consuming and can be difficult, especially with limited IT staffing and supportA simple yet sophisticated technology is necessary in order to manage a continuous cycle of key creation, splitting, initialization, rotation and deletion
EncryptionEncryption is part of a comprehensive prevention strategy when used in conjunction with other technologies, and can be a first and last line of defense against:Accidental loss or disclosure of confidential data by employees, business associates and consultantsInternal access by employees (malicious)Lost or misplaced laptopsTheftOffice break-inExternal breach / Hacker (malicious)
Types of Encryption SolutionsSoftware SolutionsLimited security capability with inside employeesSold as individual licenses – can be very expensive Will decrease database performanceDifficult and complex key management and rotationTypically requires a dedicated IT staff to manage and supportMay not support certain operating systems (Linux, Mac OS X)
Types of encryption solutionsHardware or Appliance-basedLower Total Cost of Ownership – No licensing fees Can be installed at web, application or database serverDoes not effect system speed or performanceMinimal integration and IT expertise neededNon-proprietary, can be used with any operating systemScalable to large organizations without additional licensing costsOffloads encryption processing from servers
Appliance-based EncryptionResides on the network and use a hardware device to encrypt and decrypt at high speedsOffloads cryptographic processing from database  for improving system performanceScalable to handle any quantity of dataNot operating system (OS) dependent.  Typically compatible to most IT environments and networksIntegrates easily with EMR, Practice Management, Imaging and Clinical information systemsIdeal for hosted solutions
JANA Series TechnologyAward-winning encryption technologyComplies with state and federal security and privacy rulesPowerful, yet simple key management and key rotation featuresWorks in any operating environmentCan be used simultaneously by multiple (different) business applicationsScalable to any size healthcare provider, from a physician office to the large, geographically dispersed Integrated Delivery Network (IDN)Manufactured in USA by Dark Matter Labs
JANA Series TechnologyAppliance-based solution offering superior performance and securityEasy upgrading and updating when requiredState-of-the-art software delivered on a revolutionary hardware platformOffers strict control over encryption keysIncreases network performanceCan be interfaced with web servers,  application servers (recommended), database servers, or customized servers
	JANA Series TechnologyJANA appliances are award winning encryption solutions that completely offload intense cryptographic processing from overworked servers3 Devices designed for small to enterprise-wide applicationsEmploys government certified algorithmsCompletely independent of database, operating system, and applicationUnits differentiate based on processing power, speed, number of Ethernet ports and high availability capability
Installation Diagram
Jana & Dark matter labsOffers an advanced level of security through an appliance-based solutionHighest level customer support with an industry-first perpetual hardware replacement warrantyOffers comprehensive technical support and encryption trainingNo hidden costs, licenses or vendor lock-in when purchasing appliance-based technologySimple to install and use
Who should encrypt?All healthcare providers who access and store protected health information. Hospitals, physician offices, pharmacies, clinics, labs, psychiatry offices, imaging centers and dentistsHealthcare management organizations, i.e. HMO’sHealth Insurance companies Commercial vendors i.e. EMR software, Hospital Information Systems, Billing and Transcription, Hosting services, Imaging Equipment
Why encrypt?Protect data even in the event of a security breachSafeguard patient informationHIPAA compliance, and TO AVOIDFinancial loss (large fines, lost patients & revenue)Legal ramifications (regulatory or civil prosecution)Damage to professional image (negative publicity & media fallout)
Jana series encryption www.darkmatterlabs.net

Encryption Solutions for Healthcare

  • 1.
    Encryption technology forthe Healthcare enterprisePrivacy and Security of PHIProtecting Data at Rest
  • 2.
    Health Information SecurityAdoptionand implementation of emerging health IT solutions must involve reassessment of security practices and policiesHealthcare providers are expected to prevent the unauthorized access, use and disclosure of a patient’s protected electronic health information Developing a comprehensive strategy for ensuring the confidentiality, integrity and availability of electronic patient data will be required
  • 3.
    Health Information SecurityAssessingthe health IT environment requires an understanding of all technologies being used throughout the enterprise for clinical, and administrative purposesEvaluate any possible situation for unauthorized access and use. Today, many individuals and groups have access to, and can share electronic medical records and confidential patient information, including:Government and public health agenciesInsurance companiesHospital and Physician office personnelIT vendors and their business associatesPart of the healthcare providers comprehensive security strategy will include a professional grade encryption solution
  • 4.
    EncryptionIs a processthat transforms plaintext data (using a certified algorithm like AES – Advanced Encryption Standard) into a format that makes it unreadable without an authorization key The authorization key is a type of password and is required to encrypt and also decrypt the dataKey Management is the process of monitoring the algorithms and the employees keys, and is managed by a key custodianChanging keys regularly is referred to as Key Rotation, and is necessary in order to maintain optimum security levels
  • 5.
    Encryption The key managementand key rotation processes are the most critical aspects of data encryption Most conventional solutions are time consuming and can be difficult, especially with limited IT staffing and supportA simple yet sophisticated technology is necessary in order to manage a continuous cycle of key creation, splitting, initialization, rotation and deletion
  • 6.
    EncryptionEncryption is partof a comprehensive prevention strategy when used in conjunction with other technologies, and can be a first and last line of defense against:Accidental loss or disclosure of confidential data by employees, business associates and consultantsInternal access by employees (malicious)Lost or misplaced laptopsTheftOffice break-inExternal breach / Hacker (malicious)
  • 7.
    Types of EncryptionSolutionsSoftware SolutionsLimited security capability with inside employeesSold as individual licenses – can be very expensive Will decrease database performanceDifficult and complex key management and rotationTypically requires a dedicated IT staff to manage and supportMay not support certain operating systems (Linux, Mac OS X)
  • 8.
    Types of encryptionsolutionsHardware or Appliance-basedLower Total Cost of Ownership – No licensing fees Can be installed at web, application or database serverDoes not effect system speed or performanceMinimal integration and IT expertise neededNon-proprietary, can be used with any operating systemScalable to large organizations without additional licensing costsOffloads encryption processing from servers
  • 9.
    Appliance-based EncryptionResides onthe network and use a hardware device to encrypt and decrypt at high speedsOffloads cryptographic processing from database for improving system performanceScalable to handle any quantity of dataNot operating system (OS) dependent. Typically compatible to most IT environments and networksIntegrates easily with EMR, Practice Management, Imaging and Clinical information systemsIdeal for hosted solutions
  • 10.
    JANA Series TechnologyAward-winningencryption technologyComplies with state and federal security and privacy rulesPowerful, yet simple key management and key rotation featuresWorks in any operating environmentCan be used simultaneously by multiple (different) business applicationsScalable to any size healthcare provider, from a physician office to the large, geographically dispersed Integrated Delivery Network (IDN)Manufactured in USA by Dark Matter Labs
  • 11.
    JANA Series TechnologyAppliance-basedsolution offering superior performance and securityEasy upgrading and updating when requiredState-of-the-art software delivered on a revolutionary hardware platformOffers strict control over encryption keysIncreases network performanceCan be interfaced with web servers, application servers (recommended), database servers, or customized servers
  • 12.
    JANA Series TechnologyJANAappliances are award winning encryption solutions that completely offload intense cryptographic processing from overworked servers3 Devices designed for small to enterprise-wide applicationsEmploys government certified algorithmsCompletely independent of database, operating system, and applicationUnits differentiate based on processing power, speed, number of Ethernet ports and high availability capability
  • 13.
  • 14.
    Jana & Darkmatter labsOffers an advanced level of security through an appliance-based solutionHighest level customer support with an industry-first perpetual hardware replacement warrantyOffers comprehensive technical support and encryption trainingNo hidden costs, licenses or vendor lock-in when purchasing appliance-based technologySimple to install and use
  • 15.
    Who should encrypt?Allhealthcare providers who access and store protected health information. Hospitals, physician offices, pharmacies, clinics, labs, psychiatry offices, imaging centers and dentistsHealthcare management organizations, i.e. HMO’sHealth Insurance companies Commercial vendors i.e. EMR software, Hospital Information Systems, Billing and Transcription, Hosting services, Imaging Equipment
  • 16.
    Why encrypt?Protect dataeven in the event of a security breachSafeguard patient informationHIPAA compliance, and TO AVOIDFinancial loss (large fines, lost patients & revenue)Legal ramifications (regulatory or civil prosecution)Damage to professional image (negative publicity & media fallout)
  • 17.
    Jana series encryptionwww.darkmatterlabs.net