Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Audits

FairWarning Offers High Availability Privacy Breach Detection on HP Hardware

Privacy Breach Solution Targets Large and Complex Health Care Providers

FairWarning, Inc., a company that provides solutions to monitor and protect Electronic Health Records, this week announced the availability of HP based high availability privacy breach solutions designed for very large and sophisticated care providers.

Due to the escalating visibility and damages resulting from patient privacy breaches, breach detection is transitioning into a necessity for every care provider.

Privacy Breach Solution Targets Large and Complex Health Care Providers

FairWarning, Inc., a company that provides solutions to monitor and protect Electronic Health Records, this week announced the availability of HP based high availability privacy breach solutions designed for very large and sophisticated care providers.

Due to the escalating visibility and damages resulting from patient privacy breaches, breach detection is transitioning into a necessity for every care provider.

FairWarning Logo

In 2011, the U.S. federal government will start offering health care providers financial incentives to encourage the widespread adoption of electronic health records, all of which need to be secured. According to a report by Javelin Strategy & Research, fraud resulting from exposure of health data versus other kinds of sensitive information increased from 3% in 2008 to 7% in 2009.

“As the move to digital health records becomes the inevitable future for the healthcare industry there is an on-going responsibility to healthcare providers to ensure information security and patient privacy,” said Harry Kim, Senior Director, Worldwide Health & Life Sciences, HP.

A total of $27 billion will be invested over the next decade, as part of the American Recovery and Reinvestment Act of 2009, representing the first substantial commitment of federal funding to boost adoption of electronic health records.

The FairWarning / HP solution announced today includes:

• Certified and production tested high availability FairWarning configurations which offer massive scalability and flexible options based on HP hardware servers

• Certified storage and production tested storage configurations which are capable of exceeding ARRA HITECH and HIPAA auditing requirements, even for very large care providers

• Built-in FairWarning capabilities for authentication and authorization processes which leverage Active Directory and other LDAP based identity repositories

• At no additional charge to customers, FairWarning also makes available real-time health check monitoring which provides visibility and corrective action on the storage, performance, and backup activities associated with a FairWarning privacy detection deployment

FairWarning recently released a Privacy Breach Findings and Best Practice Report which demonstrates patient privacy breaches through misuse of access to EHRs are global phenomena that are prevalent and systemic. The report illustrates four case studies which showed privacy breach detection used in conjunction with effective training, sanctioning risk assessment programs can reduce breach occurrences by 95 to 99 percent.

Subscribe to SecurityWeek

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...