Security Business

FEB 2019

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link:

Contents of this Issue


Page 43 of 59

44 Security Business / / February 2019 management soware with real-time patient feeds, pre-registration informa- tion and the hospital's access control system, and then use PIAM soware to standardize identity management while tying in external services. PIAM soware also enables PACS to connect to cloud-based card issu- ance systems and wireless locks, and to location-based services that enable healthcare institutions to know where people and assets are in the building. is improves efficiency and secu- rity while facilitating new IoT use cases that connect the world of people with the world of things. Protecting the Connected Hospital Today's real-time and proximity-based location technologies create a trusted environment for connecting, monitor- ing and managing patients, mobile cli- nicians and staff. ey include a cloud service, portals and Bluetooth bea- cons in the form of smart cards, while providing a one-card solution for both indoor positioning services and physi- cal access control. e cloud-based model and min- imal hardware requirements reduce total cost of ownership while creat- ing RMR for the integrator – instal- lation simply entails plugging in the AC-powered BLE or Wi-Fi gateways and then providing personnel with the smart card beacon. A big benefit of location-based ser- vices is the deeper analytics they pro- vide for optimizing usage of facilities, common areas, individual exam and other rooms, as well as workflows in emergency departments and clinical operations. Proximity-based services verify when personnel are nearby a given area for use cases such as mon- itoring staff check in and check out, and help organizations meet health and safety regulations by monitoring room occupancy. Location-based services also can include visitor awareness capabili- ties to achieve a complete solution for checking in visitors, running back- ground checks, managing identities and issuing credentials. ey also pro- vide wayfinding support and historical information about where visitors and other people have been should there be an emergency, security breach or the. Additionally, they can help staff to more efficiently manage physical assets, including quickly locating crit- ical medical equipment, beds, crash carts and other medical devices. Another emerging IoT trend is the use of digital certificates to secure hos- pital assets – such as IP-based video surveillance cameras that, until now, were vulnerable to hackers. Embed- ding digital certificates into these items provides a way to authenticate them and to encrypt the data traffic flowing between them. For home healthcare, the combina- tion of NFC tags, mobile apps, cloud authentication services and web appli- cations simplifies "proof of presence" by making it easier to document the time, location and accurate delivery of prescribed care. Reducing Risk While Spurring Innovation One of the most promising weapons in the fight against healthcare fraud, malware and data breaches is real-time risk profiling technology that protects against both established and recent threats that target users both online and on mobile devices. is technology offers a highly promising way for hospitals to detect phishing, malware and fraudulent medical or financial transactions, and prevent medical account takeovers and session stealing. Another big trend is the emerg- ing ability to connect, on a very broad scale, the existing PACS infra- structure to the cloud and IoT while also enabling it to be leveraged as a common, open hardware platform upon which many innovative trusted healthcare solutions can be built, deliv- ered and managed. Demand is rising to use trusted identity solutions in the cloud and benefit from its many advantages – including ease of solution deployment, flexibility, connectivity options and productivity advantages. Cloud-based platforms will pro- vide the backbone for adding new and emerging technologies while improv- ing how identity solutions are deliv- ered. Another benefit of the cloud is that it creates the opportunity for inte- grators to offer new managed services. Healthcare organizations are rac- ing to plug gaps in their cybersecurity defense while shoring up compliance processes and procedures. ey will increasingly rely on inte- grators who can help them develop and deploy a seamless trusted identity management experience that defends against threats while streamlining compliance and ushering in exciting new connected health capabilities, from the hospital to the home. ■ » Sheila Loy is Director of Healthcare and Insurance - Identity & Access Management for HID Global. Request more info about the company at The cloud-based model and minimal hardware requirements reduce total cost of ownership while creating RMR for the integrator. Healthcare Security

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - FEB 2019