Blog Listing

EMR Survey Finds Best Value Resides in Secondary Uses, but what about Data Security?
EMR Survey Finds Best Value Resides in Secondary Uses, but what about Data Security?
I read a good article on FierceEMR recently surrounding a PricewaterhouseCoopers survey on electronic medical records (EMRs) that indicated that the secondary use of this information may be an organization’s greatest asset over the next five years. An overwhelming 76 percent of respondents agreed, and pointed to the abilities for mined data to decrease healthcare costs, predict public health trends and improve patient care. EMRs, with vendors such as Allscripts, NextGen and QuadraMed blazing the trail, have been a huge focal point of healthcare payers and providers, pharmaceutical companies and the general public with healthcare reform a primary platform of the Administration.
Strong Authentication Best Practices for Success Webinar with Forrester Research
Strong Authentication Best Practices for Success Webinar with Forrester Research
Join us for an informative session on the “Do’s and Don’ts” of employee access management next Wednesday, June 24. Forrester Research’s Bill Nagel will lead the discussion on what organizations should do to improve security with strong authentication. In addition, the session will discuss the pros and cons of various strong authenticationmethods, explain why a single point of authentication to the network is key to employee access and provide examples of a wide range of implementations via real-world case studies.
InSights from the Lone Star state
InSights from the Lone Star state
Hundreds of McKesson customers converged in Grapevine, Texas this past week to learn what their peers are doing and to get the latest product updates from McKesson. Infrastructure upgrades was a common theme this year for many of the attendees I spoke to, with virtualization in particular continuing to rise in priority. Many hospitals had partially or completely virtualized their data center, and some had even virtualized all their desktops.
Congrats to OhioHealth’s Jim Lowder on making the InfoWorld CTO 25
Congrats to OhioHealth’s Jim Lowder on making the InfoWorld CTO 25
Just a quick post to congratulate OhioHealth's CTO Jim Lowder on being named to
Drive EMR Adoption and Increase IT Security - Webinar
Drive EMR Adoption and Increase IT Security - Webinar
On Wednesday, November 10th at 1:00 PM EST, I am fortunate to host Kristi Roose, IT director at Mahaska Health Partnership on a webinar where Kristi will share her insights on how to successfully deploy an EMR and help satisfy the requirements of meaningful use and the privacy and security standards embedded in the HITECH Act.
Seven Habits of Highly-Effective Healthcare Security (without Sacrificing Clinician Workflow)
Seven Habits of Highly-Effective Healthcare Security (without Sacrificing Clinician Workflow)
Coming out of HIMSS 2010, it was clear that patient data security was a chief concern, but so was the need for improved clinician workflows. For all the requirements driven by new laws and the stimulus bill, what was overlooked was the impact of security in the real-world hospital environment from a user perspective. Forcing someone to change habits and daily routines is difficult, if not impossible, to do. Therefore, it is integral to the successful adoption of these security endeavors that they be paired with improving workflow. If change makes people’s lives easier, it’s easier for them to embrace. It doesn’t need to be an either/or argument.
Observations from the 2009 Cerner Health Conference
Observations from the 2009 Cerner Health Conference
I just left the annual Cerner Health Conference in Kansas City, where clinical and technical users of Cerner software gather to share ideas, best practices and technology solutions that are molding the future of healthcare.
Five Things to do in Identity Management this Summer
Five Things to do in Identity Management this Summer
Theoretically, as employees go on vacation during the summer months, there will be fewer demands on your IT team. Realistically, we know that’s not true and it seems like there is actually more to do. However, summer can provide the opportunity to step back and evaluate the state of your identity and authentication management infrastructure and policies. Here are five things that are easy to overlook throughout the year that you should consider doing this summer:
ASIS 2008 in Atlanta: Where Physical/Logical Convergence Happens
ASIS 2008 in Atlanta: Where Physical/Logical Convergence Happens
I just came back from the ASIS 2008 Show in Atlanta and boy, do my feet hurt. Over 15,000 attendees, participation in 6 booths including our own, 3 days of constant conversation will do that to a person. This security show is the top venue for those wanting to be educated on the latest in security...from state of the art manhole covers to new IP video and access control systems.
MUSE Musings
MUSE Musings
Having spent last week at the 2008 International MUSE (Medical Users Software Exchange) Conference in Grapevine Texas - the 25th annual gathering of clinical and technical users of Meditech software - I was delighted to see SSO is such a hot topic among this group. There were five customer presentations related to SSO and Strong Authentication, and all of them were filled to capacity.
Imprivata Professional Services Announces New Services Offerings Portfolio
Imprivata Professional Services Announces New Services Offerings Portfolio
Professional Services are not something that should only be considered during the initial implementation of Imprivata OneSign. As our customer base has grown through the years, we’ve seen their personnel come and go, departments change, infrastructure develop and new technology appear. What doesn’t change is the need to provide simple secure access even though regulations get more rigorous and security threats become greater.
Imprivata Zeroes in on VMworld 2011
Imprivata Zeroes in on VMworld 2011
Head over to the Imprivata booth #1070 to take a look at the tech preview of the joint development between Teradici and Imprivata. And just in case it’s too busy to get close, you can also see it at the VMware, Teradici, Dell and VCE stands. Yes, it’s that cool. While you’re there, ask Michelle for some sonic rocks – I hear they’re kind of fun...
From  Imprivata Booth 118 at Siemens Innovations – Las Vegas
From Imprivata Booth 118 at Siemens Innovations – Las Vegas
The Siemens show has been fantastic. What a great group of people, from Siemens and their customers, as well as all the other great Siemens partners that are participating. What are we hearing? Signing on to desktops and applications is extremely painful! Remembering all the different passwords, trying to type them in while a patient is waiting for you, the time it takes for the applications to load… We need to simplify access to EMR and hospital IT systems for our clinicians! For those that know Imprivata, and for those that have been introduced to us this week, the response has been consistent; We can simplify access saving clinicians 15 minutes per day and help drive EMR adoption.
Wanted:  A cure for medical data breaches.
Wanted: A cure for medical data breaches.
Data breaches in healthcare are certainly not new. Most data breaches today occur when electronic patient information (known as "protected health information" or PHI in the HIPAA regulation) is stored unencrypted on a device that is lost or stolen. All of the data breach laws in effect today state that as long as the data or device are encrypted, there is no data breach and therefore no liability or legal remedy. So if it's that easy, why do the number of breaches in healthcare continue to grow at alarming rates?
2,246 Eligible Professionals and 100 Hospitals Successfully Attest to Meaningful Use
2,246 Eligible Professionals and 100 Hospitals Successfully Attest to Meaningful Use
The Meaningful Use Analysis presented at the recent HIT Policy Committee Meeting indicates that 2,246 Eligible Professionals and 100 Hospitals have attested successfully. That’s a good start to EHR Adoption; with Stage 2 potentially delayed for these earlier adopters it will be interesting to see how many more attest to Meaningful Use in 2011.
Who is impacted by the move of Stage 2 Meaningful Use?
Who is impacted by the move of Stage 2 Meaningful Use?
On November 30, 2011 HHS announced that they approve of the proposed push of Stage 2 Meaningful Use from 2013 to 2014 that has been talked about since July of this year. But who does this decision really impact?
Radiologists adopt single sign-on for fast access to applications
Radiologists adopt single sign-on for fast access to applications
As leaders in technology adoption, Radiologists are starting to look to biometrics to help provide No Click Access to the various systems and places they nee
No Click Access from zero clients? It’s just another client right?
No Click Access from zero clients? It’s just another client right?
Today, Teradici have released Teradici PCoIP® Firmware release 3.5. Within this firmware update is code specifically designed to integrate with a new API from Imprivata that enables full No Click Access™ from a Teradici-enabled PCoIP zero client. This integration supports strong authentication with just the tap of an access card or ID badge to automate the process of bringing the user directly to their virtual desktop.
Ponemon Institute Study Quantifies How Single Sign-On Can Save Hospitals Time and Money
Ponemon Institute Study Quantifies How Single Sign-On Can Save Hospitals Time and Money
Study spotlights the value of single sign-on solutions for hospitals seeking meaningful use credits. An eye-opening new study that was just released from the Ponemon Institute revealed roughly 60 percent of the more than 400 healthcare IT respondents believe that single sign-on (SSO) solutions support their organizations’ efforts to demonstrate the “meaningful use” of EMR adoption.
Saving clicks for clinicians – Imprivata OneSign verified as Citrix Ready
Saving clicks for clinicians – Imprivata OneSign verified as Citrix Ready
By combining the benefits of roaming desktops with the simplicity of No Click Access delivered by Imprivata OneSign, clinicians can now access Citrix XenDesktop or XenApp with the tap of a badge or swipe of a fingerprint - enabling clinicians to dedicate more of their time with their patients and less time with the computer.