SlideShare a Scribd company logo
1 of 2
Download to read offline
HIPAA                               Hitachi ID Solutions Supporting HIPAA Compliance

The Hitachi ID                          The HIPAA Challenge
Management Suite                        Regulatory compliance with the Health Insurance Portability and Account-
                                        ability Act (HIPAA) has created significant challenges for healthcare providers
The Hitachi ID Management Suite is      and payers. While insurance portability is a uniquely American issue, HIPAA
an integrated solution for managing     includes requirements for patient privacy protection. Privacy protection is also
user onboarding, security manage-       a requirement in most other, non US jurisdictions. To view the full text of the
ment and deactivation processes.        HIPAA act go to http://aspe.hhs.gov/admnsimp/pl104191.htm
It uses automation, self-service,
consolidated and delegated ad-
                                        Privacy protection depends on effective internal controls, including:
ministration to reduce IT support
cost, improve user productivity and
strengthen security.                    • Who can access sensitive patient data?
                                        • How are these users authenticated?
Sample Healthcare organizations         • What can they see and modify?
that use the Hitachi ID Management      • Are users held accountable for their actions?
Suite:
                                        These requirements are met by classic AAA infrastructure: Authentication,
• Blue Shield of California             Authorization and Audit. AAA infrastructure has been standard in enterprise ap-
• Cancer Care Ontario                   plications for years. Unfortunately, a large and growing number of applications,
• Hospital Corporation of America       combined with high staff mobility have made it much harder to manage user
• Humana Inc.
                                        data. As a result, users get access rights inappropriate to their jobs and users
• Independence Blue Cross
                                        may be inadequately authenticated. Problems with user security include:
• Indian River Memorial Hospital
• Mount Carmel Health
• Siemens Health Services               • Orphan accounts
• St John’s Regional Medical Center     • Dormant accounts
• University of Wisconsin Hospital      • Stale or excess privileges
  and Clinics Authority                 • Weak passwords
                                        • Vulnerable caller authentication at the help desk

                                        These weaknesses are not in the AAA technology -- they are in the business
                                        processes for managing user data.



                                        The Solution
                                        Organizations must implement sound processes to manage identities and en-
                                        titlements, so that only the right users get access to the right data, at the right
                                        time. This is accomplished by:
                                        • Correlating different user IDs to people.
                                        • Controlling how users acquire and when they lose security rights.
                                        • Logging current and historic access rights, to support audits.
                                        • Periodic audits of user privileges, carried out by managers and data owners.
                                        • Controlling access to administrative accounts.
                                        • Requiring strong passwords or two-factor authentication.
                                        • Using reliable processes to authenticate callers to the help desk.
Hitachi-ID.com

Rapid Deployment                                                                                                                              Technical Specifications
Identity management systems can be challenging to implement. Common                                                                           TARGET SYSTEM Integration
problems include poor user data quality, costly role engineering and hard to                                                                  Directory: Windows domains, Active Directory,
manage workflow systems. To overcome these problems, the Hitachi ID Man-                                                                      eDirectory, Novell NDS, any LDAP
                                                                                                                                              File/Print: Windows NT, 2000, 2003; Novell Net-
agement Suite:                                                                                                                                Ware, Samba, PathWorks, OS2
                                                                                                                                              Databases: Oracle, Sybase, SQL Server, DB2/
• Leverages auto-discovery and self-service to find and map login IDs.                                                                        UDB, Informix
                                                                                                                                              Unix: Linux, Sun, HP, IBM, Compaq, SGI, Unisys,
• Avoids costly role engineering entirely.                                                                                                    SCO, DG; passwd, shadow, TCB, Kerberos, NIS,
• Simplifies workflow management: one process to authorize all requests.                                                                      NIS+
                                                                                                                                              Mainframes: MVS/OS390/zOS, VM/ESA, Unisys,
                                                                                                                                              Siemens
The Hitachi ID Management Suite                                                                                                               Minis: OS400, OpenVMS, Tandem
The Hitachi ID Management Suite is an integrated solution for managing user                                                                   Applications: Oracle, PeopleSoft, SAP; open
                                                                                                                                              plug-ins for SQL, ASPs, web services and more
lifecycles. It automates setup, maintenance and termination of user profiles,
                                                                                                                                              Groupware: MS Exchange, Lotus Notes, Novell
passwords and access rights. It supports stronger security, and therefore                                                                     GroupWise
HIPAA compliance, with the following components:                                                                                              Networking: RAS, routers, firewalls
                                                                                                                                              Flexible Agents: Target API, Telnet, TN3270,
                                                                                                                                              TN5250, HTTP(S), Web Services, command-line,
Hitachi ID Automated Discovery                                                                                                                SQL code, LDAP attributes
Map user IDs to owners and identify orphan and dormant accounts.
                                                                                                                                              Support Integration
                                                                                                                                              Automatically create, update and close tickets
Hitachi ID Password Manager                                                                                                                   on:
Enforce a global password policy and ensure that when users forget their pass-                                                                • Axios Assyst 	           • HP Service Manager
                                                                                                                                              • SupportSoft SmartIssue 	 • Tivoli Service Desk
word, they are still reliably authenticated.                                                                                                  • Magic Service Desk 	     • Peregrine Service
                                                                                                                                              • Clarify eFrontOffice 	   • FrontRange HEAT
                                                                                                                                              • BMC Remedy AR System
Hitachi ID Identity Manager
Automatically deactivate access for terminated employees. Report on current
                                                                                                                                              Additional integrations through e-mail, ODBC,
and past security rights.                                                                                                                     web services and web forms integration.


Hitachi ID Access Certifier
Prompt managers, application owners and group owners to periodically review
security rights within their scope of authority. Deactivate inappropriate rights.

Hitachi ID Privileged Password Manager
Periodically randomize administrator passwords and control access to those
accounts by authenticating, authorizing and logging access.




                                                                                                                                            500, 1401 - 1 Street SE
© 2012 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID, P-Synch, ID-Synch, ID-Access, ID-Discover, ID-Telephony, AdMax and         Calgary AB Canada T2G 2J3
ID-Certify are registered trademarks of Hitachi ID Systems, Inc. in the United States and Canada. All other marks, symbols and trademarks   Tel: 1.403.233.0740 Fax: 1.403.233.0725
are the property of their respective owners.                                                                                                E-Mail: info@Hitachi-ID.com

More Related Content

What's hot

Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Systems, Inc.
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration StrategiesJoe Honan
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationNovell
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
Ensuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsEnsuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsYuan Zhou
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMOKsystem
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15 Suraj Kumar.A.S
 
Jive World 12 - Apps 202
Jive World 12 - Apps 202Jive World 12 - Apps 202
Jive World 12 - Apps 202weitzelm
 

What's hot (19)

Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration Strategies
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor Authentication
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Ensuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applicationsEnsuring quality in cloud and mobile applications
Ensuring quality in cloud and mobile applications
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCM
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Omni - The Integration Company
Omni - The Integration CompanyOmni - The Integration Company
Omni - The Integration Company
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Oracle a TBIZ2011
Oracle a TBIZ2011Oracle a TBIZ2011
Oracle a TBIZ2011
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15  Suraj Kumar A.S._22.12.15
Suraj Kumar A.S._22.12.15
 
Jive World 12 - Apps 202
Jive World 12 - Apps 202Jive World 12 - Apps 202
Jive World 12 - Apps 202
 

Similar to Hitachi ID Solutions Supporting HIPAA Compliance

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access ManagementKalyana Sundaram
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementBeyondTrust
 

Similar to Hitachi ID Solutions Supporting HIPAA Compliance (20)

Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 

More from Hitachi ID Systems, Inc.

Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication ManagementHitachi ID Systems, Inc.
 

More from Hitachi ID Systems, Inc. (18)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Hitachi ID Solutions Supporting HIPAA Compliance

  • 1. HIPAA Hitachi ID Solutions Supporting HIPAA Compliance The Hitachi ID The HIPAA Challenge Management Suite Regulatory compliance with the Health Insurance Portability and Account- ability Act (HIPAA) has created significant challenges for healthcare providers The Hitachi ID Management Suite is and payers. While insurance portability is a uniquely American issue, HIPAA an integrated solution for managing includes requirements for patient privacy protection. Privacy protection is also user onboarding, security manage- a requirement in most other, non US jurisdictions. To view the full text of the ment and deactivation processes. HIPAA act go to http://aspe.hhs.gov/admnsimp/pl104191.htm It uses automation, self-service, consolidated and delegated ad- Privacy protection depends on effective internal controls, including: ministration to reduce IT support cost, improve user productivity and strengthen security. • Who can access sensitive patient data? • How are these users authenticated? Sample Healthcare organizations • What can they see and modify? that use the Hitachi ID Management • Are users held accountable for their actions? Suite: These requirements are met by classic AAA infrastructure: Authentication, • Blue Shield of California Authorization and Audit. AAA infrastructure has been standard in enterprise ap- • Cancer Care Ontario plications for years. Unfortunately, a large and growing number of applications, • Hospital Corporation of America combined with high staff mobility have made it much harder to manage user • Humana Inc. data. As a result, users get access rights inappropriate to their jobs and users • Independence Blue Cross may be inadequately authenticated. Problems with user security include: • Indian River Memorial Hospital • Mount Carmel Health • Siemens Health Services • Orphan accounts • St John’s Regional Medical Center • Dormant accounts • University of Wisconsin Hospital • Stale or excess privileges and Clinics Authority • Weak passwords • Vulnerable caller authentication at the help desk These weaknesses are not in the AAA technology -- they are in the business processes for managing user data. The Solution Organizations must implement sound processes to manage identities and en- titlements, so that only the right users get access to the right data, at the right time. This is accomplished by: • Correlating different user IDs to people. • Controlling how users acquire and when they lose security rights. • Logging current and historic access rights, to support audits. • Periodic audits of user privileges, carried out by managers and data owners. • Controlling access to administrative accounts. • Requiring strong passwords or two-factor authentication. • Using reliable processes to authenticate callers to the help desk.
  • 2. Hitachi-ID.com Rapid Deployment Technical Specifications Identity management systems can be challenging to implement. Common TARGET SYSTEM Integration problems include poor user data quality, costly role engineering and hard to Directory: Windows domains, Active Directory, manage workflow systems. To overcome these problems, the Hitachi ID Man- eDirectory, Novell NDS, any LDAP File/Print: Windows NT, 2000, 2003; Novell Net- agement Suite: Ware, Samba, PathWorks, OS2 Databases: Oracle, Sybase, SQL Server, DB2/ • Leverages auto-discovery and self-service to find and map login IDs. UDB, Informix Unix: Linux, Sun, HP, IBM, Compaq, SGI, Unisys, • Avoids costly role engineering entirely. SCO, DG; passwd, shadow, TCB, Kerberos, NIS, • Simplifies workflow management: one process to authorize all requests. NIS+ Mainframes: MVS/OS390/zOS, VM/ESA, Unisys, Siemens The Hitachi ID Management Suite Minis: OS400, OpenVMS, Tandem The Hitachi ID Management Suite is an integrated solution for managing user Applications: Oracle, PeopleSoft, SAP; open plug-ins for SQL, ASPs, web services and more lifecycles. It automates setup, maintenance and termination of user profiles, Groupware: MS Exchange, Lotus Notes, Novell passwords and access rights. It supports stronger security, and therefore GroupWise HIPAA compliance, with the following components: Networking: RAS, routers, firewalls Flexible Agents: Target API, Telnet, TN3270, TN5250, HTTP(S), Web Services, command-line, Hitachi ID Automated Discovery SQL code, LDAP attributes Map user IDs to owners and identify orphan and dormant accounts. Support Integration Automatically create, update and close tickets Hitachi ID Password Manager on: Enforce a global password policy and ensure that when users forget their pass- • Axios Assyst • HP Service Manager • SupportSoft SmartIssue • Tivoli Service Desk word, they are still reliably authenticated. • Magic Service Desk • Peregrine Service • Clarify eFrontOffice • FrontRange HEAT • BMC Remedy AR System Hitachi ID Identity Manager Automatically deactivate access for terminated employees. Report on current Additional integrations through e-mail, ODBC, and past security rights. web services and web forms integration. Hitachi ID Access Certifier Prompt managers, application owners and group owners to periodically review security rights within their scope of authority. Deactivate inappropriate rights. Hitachi ID Privileged Password Manager Periodically randomize administrator passwords and control access to those accounts by authenticating, authorizing and logging access. 500, 1401 - 1 Street SE © 2012 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID, P-Synch, ID-Synch, ID-Access, ID-Discover, ID-Telephony, AdMax and Calgary AB Canada T2G 2J3 ID-Certify are registered trademarks of Hitachi ID Systems, Inc. in the United States and Canada. All other marks, symbols and trademarks Tel: 1.403.233.0740 Fax: 1.403.233.0725 are the property of their respective owners. E-Mail: info@Hitachi-ID.com