Healthcare endpoint security is a critical need in the management of security of Electronic Health Records. The current breach rate in the Healthcare industry that results from internal and external sources has grown dramatically. Each day, thousands of access points are left unguarded by users that have not logged out of the process they were engaging in effectively leaving the endpoint open for access to critically sensitive and private information.
Unlike a static identity which can be easily stolen, Dynamic Identity changes with every use. Dynamic Identity renders identities that are constantly changing. Continuous Mutual Authentication technology re-authenticates users periodically during sessions, defeating identity based attacks and mitigating insider and network based threats. User Centric security delivers data confidentiality by encrypting user data with a secured user specific security key. This process ensures secured application-
JANUS is an innovative information security framework that provides strong authentication (ID sentry), client side UI protection and transaction integrity verification (Data Sentry). The core technology is “Message Dissemination”
The complementary “Human Factor Authentication”
3AKey is a personal, unique and smart hardware security device that facilitates security related activity including server server authentication, task authorization as well as transaction signing, in effect locking out all others except for parties those authorized and directly engaged in the transaction.
Data Sentry, provides support for end-to-end transaction security. Data Sentry consists of a communication agent that is randomly selected in every transaction and is dynamically configured to carry out client side and/or server side functions to verify the data integrity of transaction being performed by the user.
# # #
FrontOne has introduced a zero-knowledge security platform that provides a unified authentication service to meet the security and privacy needs of cloud infrastructures and other applications that have high security needs.