Achieving Stronger Security in Healthcare IT

 

Achieving Stronger Security in Healthcare IT

Ask someone to name the top priority of a healthcare organisation and they’ll probably say “providing excellent patient care.” But if you ask someone to name a second top priority, they might add, “IT security.” Recent breaches like WannaCry ransomware and past examples such as Anthem have turned cyber security into an urgent concern for every healthcare organisation.

Evidence.com Integration Guide

This guide provides a brief overview of how to integrate SecureAuth IdP with the Evidence.com database management platform. Many law enforcement organizations use Evidence.com to manage and maintain their evidence. In order to make this evidence database as secure as possible, SecureAuth IdP has developed a software bridge that enables secure authentication between the department’s computers and Evidence.com’s resources.

Gartner Magic Quadrant for Access Management


CLICK TO READ FULL REPORT


 

Gartner's 2017 Magic Quadrant for Access Management

Access management (AM) applies to technologies that use access control engines to provide centralized authentication, single sign-on (SSO), session management and authorization enforcement for target applications in multiple use cases.

Seattle Cancer Care

 

Seattle Cancer Care Alliance enhances both patient care and security with Adaptive Authentication from SecureAuth. Seattle Cancer Care Alliance (SCCA) is a world-class cancer treatment and research center that combines the power of science with the power of collaboration. Like many organizations today, SCCA needed to enable secure remote access to its systems and data — without unnecessarily burdening on-premises users with additional authentication steps

Adaptive authentication can help healthcare fight cybercrime

Adaptive authentication can help prevent cyberattacks and protect user identity

Adaptive authentication can help healthcare fight cybercrime

Just demanding two-factor authentication doesn’t go far enough, expert says.

May 16, 2017 - On the heels of the WannaCry ransomware assault, security experts around the globe are touting their cybersecurity best practices to help healthcare fight off cybercriminals.

2017 DBIR: Misuse of Stolen Credentials Unchecked, Out of Control

Verizon’s Data Breach Investigations Report outlines  the percentage of hacking related breaches has increased
Author: 
Stephen Cox, Chief Security Architect

 

Verizon’s Data Breach Investigations Report (DBIR) has once again hit the streets with much fanfare. The 2017 report is Verizon’s tenth DBIR and details findings from over 42,000 security incidents analyzed by the company in 2016. As expected, the report is packed with information absolutely critical to the success of information security industry. 

Want to Improve ADFS Authentication? Just Add SecureAuth

Adaptive Multi-factor authentication protection layers
Author: 
James Romer

 

Many organizations have already deployed and invested in an Active Directory Federation Services (ADFS) installation, providing basic authentication and access into cloud applications.

ADFS now supports limited MFA support via voice OTP, SMS OTP and Push to Accept technologies. This approach does provide a minimal approach to authentication, is it enough? The challenge is really bringing ADFS authentication up to world class levels, improving the ADFS authentication story, yet not having to replace ADFS.

Pages