Solution for Healthcare
Overview:
Data Security for Healthcare
Data security is more important than ever to the healthcare industry. The number of data breaches compromising confidential healthcare data is on the rise. In the United States alone, more than 100 organizations reported data breaches affecting 500 or more patient records at a potential cost of $5.6 billion dollars. In the United Kingdom, healthcare sector breaches have doubled since 2013. And, it's estimated that the value of stolen healthcare data is 10 times that of other confidential consumer data putting patient information at even greater risk of being stolen. Add to this a growing mobile workforce and you can quickly understand why data security is a top priority for hospitals, healthcare providers, insurers and pharmaceutical companies.
With the global healthcare market undergoing upheaval and transformation, you can't afford a costly healthcare data breach to further shake the confidence of patients, partners or regulators. Failure to anticipate data security risks could compromise your organization's ability to meet the strict mandates that govern healthcare data access and handling, including:
- Health Insurance Portability and Accountability Act (HIPAA)
- Health Information Technology for Economic and Clinical Health Act (HITECH)
- Centers for Medicare & Medicaid Services (CMS) security requirements for Electronic Health Records (EHRs)
- Evolving ASTM Standards for Medical Device Interoperability
- European Union Data Protection Directive (EUDPD)
- UK Data Protection Act
- The Australian Privacy Act
- Japan's Personal Information Protection Act
But safeguarding confidential healthcare data is more than strictly meeting regulatory requirements. It demands a comprehensive data security solution built around strong encryption, robust identity management, and policy-based data management. Download the whitepaper and learn how healthcare organizations can leverage new technologies to take the risk out of mobility.
Simplify Compliance, Improve Productivity, and More
Kingston helps you achieve all these goals with military-grade encrypted devices, and we don't stop there. Our mobile security solutions protect digital identities and applications no matter where your employees take them. Because our centralized management platforms put you in control of data access and use, you don't have to rely on the diligence of the hundreds or thousands of mobile workers who carry sensitive corporate or patient data with them every day.
Kingston delivers some of the world's most secure, scalable and reliable mobile storage, secure workspace and device management solutions, including:
- encrypted flash drives
- encrypted external hard drives
- secure portable PC on a Stick™ workspaces
- cloud and on-premises centralized device management solutions
All of these were designed from the start to work seamlessly together and create a cost-effective, end-to-end solution that you can use to reduce your potential exposure to non-compliance.
Features:
Deploy the highest standards of mobile storage protection
Kingston’s IronKey™ family of flash drives and external hard drives, along with IronKey™ line of hardened, tamper-evident flash drives, lock down sensitive data with an on-board, hardware encryption engine that puts a military-grade, AES-256 wall between unauthorized users and the drive’s contents.
Maintain control over data access and use, conveniently and centrally
The security protections built into Kingston’s encrypted USB drives are formidable. And by choosing from an array of scalable, intuitive platforms for establishing and policing your employees’ use of IronKey™ drives, you can ensure that mobile employees are using strong passwords and taking other measures to take full advantage of those capabilities. From a central console, set policies for passwords, application use, recovery, and more – across a handful of drives or thousands of them. Depending on the Kingston solution you deploy, you can also manage and update device drivers and applications, administer identity protection features, and create whitelists of approved IP addresses to control where devices and applications can be used. And if a drive is lost or stolen, you can even remotely erase it or destroy it.
Protect digital identities away from the office
When a mobile employee’s digital identity is compromised, your network, your applications, and your data all become vulnerable. That’s why Kingston offers strong, multifactor authentication (password, biometric and CAC/PIV) on Kingston IronKey drives. And for users of IronKey™ drives, Kingston offers enterprise-class identity management capabilities – combining PKI crypto services, two-factor authentication and strong password management – to shield identities out in the wild. Only Kingston integrates these sophisticated protections with encrypted storage in a single mobile device.
Simplify reporting, auditing and other burdens of compliance
Complying with data security mandates doesn’t have to be a headache. Use Kingston’s advanced reporting and auditing capabilities to document how, where and when users have accessed, saved or modified confidential data. And for maximum flexibility, Kingston offers you both premise-based management solutions (when device management must reside behind your firewall) and cloud-based management solutions (eliminates the need for capital investments in servers and other hardware).
Shield data and applications from malware
In addition to the combined safeguards of encryption, multi-factor authentication and hardened enclosures, Kingston’s enterprise-class mobile storage solutions come with anti-virus and anti-malware protections, either as a standard feature or as an option.
Don’t let security get in the way of productivity
Mobile data security involves more than just locking down data. Workers need the flexibility of working from any PC, and they get it with Kingston’s portable workspace solutions. These solutions, available on Kingston’s encrypted USB flash drives, add another dimension to mobile security by enabling employees and contractors to safely work from any computer – at the office, at home, or on the road – with a fully functioning Microsoft Windows 8.1 desktop environment that goes everywhere they do and features all the applications workers need. Hardware encryption and strong authentication keep confidential data where it belongs, and the portable workspace is fully isolated from malware or other threats that may be present on the host computer, keeping them out of your datacenters and your networks.
Empower mobile workers with simple, user-friendly solutions
There’s no need for employees to install drivers or other software to securely access their stored data, workspace or applications. Kingston drives come pre-loaded with everything users need, and they leave no trace on the host PC.
Recover from disasters without missing a beat
Power outages, severe storms, earthquakes, fires – any of these might usually impact your ongoing operations. But Kingston’s secure mobile storage and portable workspace solutions help keep workers productive even when they can’t make it into the office.
Take the Worry out of Securing and Managing Mobile Data
Few firms can afford the millions of dollars that data breaches can cost – penalties, settlements, mitigation measures can add up quickly. That’s why healthcare organizations around the world rely on Kingston for mobile security solutions that meet the highest standards of protection. Kingston helps reduce the cost of securing data, simplify compliance, and keep employees and contractors productive in the office, at home or on the road.
Benefits:
Don't Be Tomorrow's Headline
With the global healthcare market undergoing upheaval and transformation, you can’t afford a costly data breach to further shake the confidence of patients, partners or regulators. Yet when you equip a growing mobile workforce with devices that store personally identifiable patient data or R&D information, you may be putting that data at serious risk.
Failing to anticipate those risks could compromise your ability to meet the strict data security mandates that govern healthcare data access and handling, including the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health (HITECH) Act, Centers for Medicare & Medicaid Services (CMS) security requirements for Electronic Health Records (EHRs), and a growing list of international standards.
Clearly, it’s never been more crucial for hospitals, healthcare providers, insurers and pharmaceutical companies to take the risk out of mobility.
Deploy the Highest Standards of Protection
With IronKey, you can achieve all these goals. Our military-grade encrypted USB storage devices put a wall between unauthorized users and your important data you need to protect. Choose from an array of IronKey solutions:
- encrypted USB flash drives
- encrypted USB external hard drives
- USB drive management solutions
IronKey devices offer multiple layers of protection, including: strong, multifactor authentication; AES 256-bit hardware encryption; and tamper- and waterproof** enclosures.
Get the IronKey Advantage
Mobilize doctors, trial managers, adjusters and others by enabling them to safely access sensitive data from virtually any PC or tablet.
Shield healthcare data with a virtually indestructible drive that exceeded military waterproof testing requirements.
Lock down patient and R&D data by putting military-grade encryption and a ruggedized enclosure between unauthorized users and your IronKey drive’s contents.
Meet security mandates by relying on FIPS 140-2 Level 3* validated devices and advanced auditing and reporting.
Simplify HIPAA audits with advanced auditing and reporting capabilities.
Centrally manage data access and use, no matter where employees go.
With IronKey Secure Storage Drives...
- Doctors can securely and easily access patient data no matter where they are.
- Temporary medical and pharmaceutical personnel can gain trusted access to applications and records when on assignment or working from home.
- Clinical trial contributors, managers and auditors can securely enter or review trial data at any location with a PC or tablet.
- Insurance claims adjusters, examiners and investigators can always have access to records.
- Organizations can provide key personnel with critical data to maintain operations if severe weather or other disasters strike.
- IT can enforce access and use policies from a central console.
Build your secure mobile strategy with IronKey:
Encrypted USB Flash Drives | 2GB-64GB | |
---|---|
Highest Security (FIPS 140-2 Level 3)* + Centralized Management | The right choice for... |
IronKey Enterprise S250 + D250 Cloud or on-premise centralized management, optional Antivirus, security software, ID MGMT. and VeriSign® Identity Protection (VIP) |
|
IronKey F200 Biometric Authentication, Optional Centralized Management and antivirus |
|
IronKey F150 Rugged Metal Enclosure, Optional Centralized Management and antivirus |
|
IronKey F100 Durable polymer housing, optional centralized management and antivirus |
|
Highest Security (FIPS 140-2 Level 3)* | The right choice for... |
IronKey Personal S250 + D250 ID MGMT, Optional Encrypted Password Backup, secure Web Browser and VeriSign® Identity Protection (VIP) |
|
IronKey Basic S250 + D250 Self-service password reset |
|
High security | The right choice for... |
IronKey D80 Built-in AES-256 hardware encryption, password protected |
|
Encrypted USB Hard Drives | 320GB-1TB | |
Highest Security (FIPS 140-2 Level 3)* + Centralized Management | The right choice for... |
IronKey H200 Biometric, strong password, optional centralized management and antivirus |
|
IronKey H100 Strong password authentication, multi-user collaboration through safeshare, authentication, optional centralized management and antivirus |
|
High security + Centralized Management | The right choice for... |
IronKey Enterprise H300 External Hard Drive USB 3.0 Performance, AES 256-Bit Hardware Encryption |
|
High security | The right choice for... |
IronKey Basic H300 External Hard Drive USB 3.0 performance, AES 256-Bit hardware encryption |
|
Ease the burdens of compliance
Passing your HIPAA audit doesn’t have to be a headache. Use IronKey’s advanced reporting and auditing capabilities to document how, where and when users have accessed, saved or modified confidential data. And for maximum flexibility, we offer both premise-based management solutions (when device management must reside behind your firewall) and cloud-based management solutions (which eliminate the need for capital investments in servers and other hardware).
Deploy tough, proven IronKey drives
IronKey USB flash drives undergo thousands of hours of rigorous read/write tests, and we encase each one in a sturdy, tamper-proof chassis that’s water, dust and shock-proof. And our IronKey USB hard drives are protected by high-strength, tamper-proof aluminum enclosures that resist break-ins.
Rely on an end-to-end IronKey solution
IronKey solutions are designed to work seamlessly together and create a cost-effective, end-to-end solution that you can use to reduce your potential exposure to non-compliance, drive down operating costs, improve productivity, and maintain operations no matter what happens. Deploy our encrypted USB storage devices in conjunction with secure portable workspace products to fully and confidently mobilize any workforce.
*What is FIPS 140-2 Level 3? A U.S. government computer standard that defines a high level of cryptographic and physical protection designed to keep sensitive data safe from theft or hacking.
**What is the waterproof standard? MIL-STD-810F, also referred to as US Department of Defense Test Method Standard for Environmental Engineering Considerations and Laboratory Tests, establishes testing standards to evaluate the durability of products, especially in extreme circumstances. IronKey devices are waterproof and dustproof according to MIL-STD-810F standards.
Documentation:
Download the IronKey Encrypted USB Storage Solutions for Healthcare (PDF).
Download the IronKey Workspace is a Certified Windows Portable Desktop for Healthcare (PDF).