Risk
10/31/2007
04:44 AM
Connect Directly
RSS
E-Mail
50%
50%

Hospital Deploys ID & Access Management

Award-winning hospital strengthens identity and access security with the Encentuate IAM Suite

REDWOOD CITY, Calif. -- Encentuate, Inc. today announced that Englewood Hospital and Medical Center in Englewood, New Jersey has deployed the Encentuate IAM Suite to strengthen access security across the organization. With Encentuate, Englewood automates access to web, desktop and legacy applications, using a combination of single sign-on and employee RFID badges for strong authentication. Encentuate goes beyond traditional identity and access management to provide Englewood with session management and fast user switching, as well as secure remote access. Opened in 1890, Englewood is in its second century of service, with 520 beds and more than 2,500 employees.

Englewood selected Encentuate for its wide range of capabilities, including the ability to provide secure access for remote users through the hospital's Aventail SSL-VPN appliances and Encentuate Web Workplace. The hospital is also leveraging Encentuate's seamless integration with multiple strong authentication factors by providing the ability for staff to access applications and network resources using dedicated workstations with biometric readers in each section of the hospital, in case they forget their ID badges. With Encentuate's automatic password reset, users can change forgotten passwords on the fly, which alleviates frequent IT helpdesk requests.

"Encentuate makes it easy to manage identities and access rights for all of our medical professionals regardless of where they login to our network," said Gary Wilhelm, Business and Financial Systems Manager at Englewood Hospital. "By automating access within the facility and remotely, we ensure that our caregivers always have convenient and consistent access and that patient information is completely secure."

Encentuate Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.