Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //


09:53 AM
Dark Reading
Dark Reading
Products and Releases

ID Experts and Iatric Systems Offer Hospitals A Proactive Solution for Identifying and Managing Security Incidents

Integrating Iatric Systems Security Audit Manager(TM) and ID Experts' RADAR(R) Identifies, Automates, and Simplifies the Complexities of Data Incident Response Management

PORTLAND, Ore. and BOXFORD, Mass., Feb. 18, 2015 /PRNewswire/ -- Patient data moves through a hospital much the same way blood flows throughout the human body. However, patient data is measured in terabytes; is highly regulated; harder to protect because it resides in different applications and databases; and requires access by many caregivers and administrators. With terabytes of sensitive patient data in so many places, data security incidents happen in a heartbeat and can be hard to discover. Iatric Systems Inc., a comprehensive healthcare IT integration company, is integrating its Security Audit Manager (TM), a patient privacy monitoring and incident reporting solution, with ID Experts' RADAR®, incident response management software, to offer hospitals a complete, best-in-class solution for identifying, assessing, and managing security incidents, and complying with federal and state data breach notification laws.

Together: A Diagnostic Engine for Incident Monitoring and Response Management More than 900 healthcare organizations nationwide use Iatric Systems Security Audit Manager to monitor EHRs, audit patient records, and proactively detect security incidents. RADAR further expands the incidents from Security Audit Manager, performs a multi-factor incident risk assessment--electronic, paper or visual--and provides guidance on whether the incident is a data breach requiring compliance action for federal and state breach notification laws. RADAR enables security and privacy professionals to collaborate and analyze the outcome of their incidents to gain insights, identify trends, and determine what actions are required through an incident management dashboard, notification alerts, and incident assessment and remediation summaries and reports. Pairing Security Audit Manager with RADAR helps healthcare organizations establish an efficient and compliant incident monitoring and management program.

"We wanted to provide an advanced risk assessment experience for customers who desire this level of functionality, and we partnered with ID Experts because RADAR delves deeper into possible breaches to uncover additional details," said Frank Fortner, president of Iatric Systems. "In addition, the robust RADAR knowledge base accounts for the intricacies of federal, state, and local jurisdictions that may affect reporting requirements."

"Organizations are looking at the scalability and consistency of their response processes, evaluating their organizational structure and staffing, and adopting automation tools to aid collaboration and streamline the complex processes of incident risk assessment, breach determination and documentation," said Mahmood Sher-Jan, executive vice president and general manager, RADAR product unit at ID Experts. "With integrated best-of-breed software solutions that can bridge the gap between security incident detection and response, organizations can effectively manage and reduce risks from PHI incidents, while helping to ensure compliance with the changing breach laws."


About ID Experts

ID Experts provides software and services to simplify the complexities of managing privacy and security incident response. Its award-winning RADAR® software is relied on by some of the largest healthcare, insurance, and financial services organizations to reduce risks and ensure compliance. For more than a decade, ID Experts has provided data breach services and managed thousands of incidents. ID Experts is an advocate for privacy and participates with the Consumer Federation of America, the PHI Protection Network and Patient Privacy Rights. Visit www.idexpertscorp.com.


About Iatric Systems

Healthcare is a complex and highly regulated industry with data spread across multiple systems and technologies, meaning decisions are made every day without complete information readily available. Iatric Systems is a healthcare technology company dedicated to leveraging our integration expertise to provide healthcare organizations with products and services that bring the right data to the right people at the right time. In our 25-year history, we have delivered more than 25,000 interfaces and integration solutions to more than 1,300 healthcare organizations. This integration experience helps healthcare organizations make more informed decisions critical to improving patients' health and organizations' fiscal stability. For more information, contact [email protected] or visit www.iatric.com.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.