Securing Access of Health Information Using Identity Management

Size: px
Start display at page:

Download "Securing Access of Health Information Using Identity Management"

Transcription

1 Securing Access of Health Information Using Identity Management Steve Whicker Manager Security Compliance HIPAA Security Officer AHIS Central Region St Vincent Health Chris Bidleman Director of Healthcare Novell, Inc

2 Healthcare Industry Themes for 2010 Reduce healthcare costs: Surveys indicate HIT budgets will stay the same or slightly increase but CIO's will still look for ways to save money. IT Departments still resource constrained. Deal with aftermath of healthcare reform: New regulations, incentives to adopt electronic health records, and changes in reporting, breach notification and audits plus higher violation fines. Achieve Meaningful Use criteria. Expanded use of Health IT: HITECH and Meaningful Use guidelines will drive HIT adoption with it will also bring focus on privacy and security of protected health information (PHI) by encrypting data, role-based access controls, and audit trails. More communication between patient and provider: Incentives for increase programs of preventative medicine will require more electronic communication with patient and families, secure exchange of health data (eg. patient, doctor, referrals, public health orgs), and better patient identification 2

3 Meaningful Use Criteria - Stage 1 Starting January 1, 2011 from CMS-0033-P Improve quality, safety, efficiency, and reduce health disparities Engage patients and families in their health care Improve care coordination Improve population and public health Ensure adequate privacy and security protections for personal health information (PHI) 3

4 Today, who typically cares about Identity and access management? Chief Information Officer (CIO) Director of Infrastructures Network/Server Manager IT Security Application Administrators 4

5 With ARRA and Meaningful Use Who SHOULD care about Identity and Access Management? Application owners Audit committee Lines of Business owners Director of Applications Chief Executive Officer (CEO) Chief Financial Officer (CFO) Chief Information Officer (CIO) Chief Technology Officer (CTO) Chief Operating Officer (COO) Chief Information Security Officer (CISO) Chief Nursing Officer (CNO) Corporate Controller Internal Audit Director Operations VP HIPAA/Compliance Security Director/Officer Many others Chief Medical Information Officer (CMIO) 5

6 Today's Speaker Steve Whicker Manager Security Compliance HIPAA Security Officer AHIS Central Region St Vincent Health 6

7 Identity Management Goals at St. Vincent Health Enable regulatory compliance (HIPAA) and internal controls in Information Systems (IS) security processes Reduce operating costs through user account provisioning (process automation) and sharing common infrastructure components Decrease corporate exposure by reducing the risk of unauthorized access to data & automating enforcement of security policy Improve associate satisfaction by automating online Human Resources (HR) benefits management Improve data integrity by decreasing duplicative identity data stores and manual data entry processes Improve the quality of services provided by IS 7

8 St. Vincent Health s Identity Management Drivers Regulatory Compliance Security Efficiency / Cost HIPAA Unique user identification requirements Access Control Requirements Auditing Requirements Minimum Necessary Requirements Enterprise Rolebased Access Control (RBAC) model Auditing / Reporting Automate Manual Security Policies Automate Identity Management (Create, Modify, Delete) Automate Roles Based Access Control Automate Workflow Approval, Denial Reduce Manual Admin via automated account provisioning Manage online HR Benefits Set up Foundation for Expanded Services Improve Data Accuracy Leverage Current Investments Provide Password Reset Self Service 8

9 Where We Started (July 2005) Four separate networks (Indianapolis, Frankfort, Anderson, Kokomo) Two separate and overlapping access request processes for identity and access management (ID Request & IS Request), made it difficult to centrally manage the access request and change logs Identity creation and management was a manual process No centralized process to document request completion No formal validation process to verify the authenticity of requesting manager Multiple touch points (Network Administrator and Application support personnel) for creation of Login ID for an individual user De-provisioning process was not consistently followed No user entitlement matrix existed 9

10 Our Identity Management Roadmap Directory Infrastructure Readiness Upgrade NT Domains to AD Implement Universal Password Upgrade Existing Drivers to IdM2 Enable Bi- Directional Creates Consolidate File Services Trees Enhanced Provisioning Design and Implementation Document Identity Management Requirements Process Analysis and Design Document Web based Provisioning Workflow Requirements Design Enhanced Identity Management Design Web based Provisioning Workflow Implement Password Self Service Implement PeopleSoft Connector Enhance Existing Connectors and Implement Implement Web Based Provisioning Workflow Role Based Provisioning Design and Implementation Role Definition and Mapping Document Role based provisioning requirements Design Role based provisioning Implement Role based access and provisioning Provision users to additional systems Auditing and Reporting Identify Audit Needs Design Auditing and Reporting Audit Logging ( enable real time logging with appropriate systems) Implement Audit Business and Ongoing Support Skill Assessment Skills Development and Training Ongoing Maintenance and Support Governance, Organizational Change Management and Communication 10

11 Identity and Request Management Portal Windows Windows Biztalk Data Warehouse Vistar STVLDAP Windows Identity Management Portal IDV IND1 Windows 11 National AD / Exchange Windows STVI STVNET

12 Hiring Process Non-System Processes Start 1 1. HR/manager is notified of new hire (associate/ non-associate) 20. User and Manager receives notification that application has been granted PeopleSoft HRMS 2. HR/manager enters hire data into PS (associate / nonassociate) 7. PeopleSoft is updated with Login ID & address Workflow Processes edirectory (IDV) edirectory (STVI & SVHLDAP) 3. All required attributed Are available and PeopleSoft effective date has transpired 15b. Application support checks queue Yes for non connected system No 4. Is this a new Identity? 14. WF approved by approver? Yes 5a. Identity Manager determine unique Login ID 13. Identity Manager generates workflow & notify for default applications per rules 6. Identity Manager creates and places the Identity 11. Identity Manager s manager of new hire 8b. Identity Manager creates Identity in SVHLDAP 5b. Go to Modify Users Process Box #4 Manager 12. Go to requests Modify Users additional Process Box Apps via WF #10b 8a. Identity Manager creates Identity in STVI 19. Workflow generates notifications Yes 18. Application support approves WF Active Active Directory Directory (IND1) (STVNET) Yes for connected system 9. Identity Manager creates Identity IND1 10. Identity Manager creates Identity STVNET Other Applications 16. Application support determines access rights 17. Application support creates Identity and access rights Process performed for each application requested 15a. Create new user account automatically 12

13 Termination Process Non-System Processes Start 1 1. Manager is notified of a termination event for associate or non associate Start 2 1b. HR Service Center is notified of termination event for associate or non associate Start 3 1c. Termination is initiated through VISTAR feed 5. Server team is notified that the user never showed up for work, research is done, accounts may be deleted manually, instead of just disable automatically 15. Manager receives notification PeopleSoft HRMS 2. Data is entered into PeopleSoft HRMS Workflow Processes edirectory (IDV) 3. IDM Updates User data in IDV. disables account & moves user to the inactive container 4a. Is this an a no show hire? 4b. Routes termination WF request to all app security admin(s) Yes 11. All application support admin(s) are notified via of a termination workflow task to be completed after they disable or delete the account 14. Workflow generates notifications 13. Application Support Approves WF edirectory (STVI & SVHLDAP) 6. IDM Updates User data in STVI. disables account & moves user to the inactive container 7. IDM disables Groupwise user and sets visibility to note 10. IDM deletes user account in SVHLDAP Active Directory (IND1) 8. IDM Updates User data in IND1. disables account & moves user to the inactive container Active Directory (STVNET) 9. IDM deletes user account in STVNET Other Applications 13. Application support admins disable/delete user manually in other application(s) 13

14 Other Processes Handled Renames (Name Changes) Business Unit Changes User Data Changes 14

15 Automated Escalation Process Insures Customer Request Are Not Lost Initiated by Manager to Grant application for End User Start Application Owner Escalate to Owner's Mgr 2 nd Escalation to Owner's Mgr Could take up to 6 days 1d 2d Denied 3d 4d 5d 6d Time Out Time Out Denied Denied Approved * Time Out Approved * Approved * * indicates completion of work IDM Entitlement is granted Log for all denied activities Finished 15

16 Self-Service Password Reset Provides user the ability to reset their own password anytime any place At work At home on portals Reduces Helpdesk calls Provides for positive validation of user identity through Challenge and Response Questions Easily integrates with current systems 16

17 Lessons Learned Know and thoroughly document your environment Assume nothing (verify things actually work as advertised) Understand the organizations business processes Talk to the users and understand yours and their business processes Cooperation and involvement of Human Resources is vital Have a viable test environment Be prepared for problems 17

18 What s Next? Install the Roles and Provisioning Module Upgraded version of the User Application (Self-service portal) Role Based Provisioning Design and Implementation 18

19 Novell Three Solution Areas Helping Healthcare Providers give users simple, secure access while safeguarding patient information Data Center End-User Computing Identity and Security Lower Costs SUSE Linux Enterprise Virtualization Intelligent Workload Management Business Service Management Secure Assets SUSE Linux Desktop Endpoint Management Manage and Secure servers and desktops Secure Social Collaboration Tools Protect Data Compliance Management Access Governance Identity Management Single Sign-on Security Management 19

20 Novell Solutions For Key HITECH Security Issues 20 Issue Impermissible uses and disclosures of protected health information (PHI) Lack of safeguards of protected health information such as logging and monitoring to detect suspicious system activities Enhance role-based access control based on the minimum necessary principle Breach notification procedure updates with monitoring and reporting Encryption of mobile devices and other data sources storing PHI plus reducing data leakage Novell Product Solution Novell Compliance Management Platform (CMP) provides identity management, audit reporting, and web access control to network resources Novell SecureLogin (NSL) provides enterprise single sign-on and fast user switching for shared workstations. Novell Sentinel can provide realtime auditing, monitoring and remediation of user access to PHI with powerful correlation engine Novell Access Governance Suite (AGS) can manage roles and security policies as well as access certification. Novell Identity Manager (IDM) can provision/deprovision resources based on roles and provide self-service and workflow. Novell Sentinel Log Manager can store and analyze who had access to what, when, where and how for all connected devices and apps Novell ZENworks Endpoint Management solutions can secure devices including USB ports, encrypt data, application virtualization, patch management and make upgrades easy (e.g. Windows 7)

21 Questions?

22 For More Information - HITECH and MU - Healthcare Solutions - SSO - Identity Management - Case Studies 22

23 Making IT work as One

24 Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.

Key Benefits of Novell ZENworks 10 Configuration Management. Enterprise Edition

Key Benefits of Novell ZENworks 10 Configuration Management. Enterprise Edition Key Benefits of Novell ZENworks 10 Configuration Management Enterprise Edition ZENworks 10 Configuration Management Enterprise Edition Manage your endpoint devices: ZENworks Configuration Management supercedes

More information

IDEAS for Identity and Access Governance. Capabilities summary and screenshot selection

IDEAS for Identity and Access Governance. Capabilities summary and screenshot selection IDEAS for Identity and Access Governance Capabilities summary and screenshot selection IDEAS Capabilities Agenda About CrossIdeas About the IDEAS Solution Main capabilities Screenshot selection 2 CrossIdeas

More information

Tools for the Times New Boulder Tools Overview Presenter Name

Tools for the Times New Boulder Tools Overview Presenter Name Tools for the Times New Boulder Tools Overview Presenter Name Presenter Title Presenter E-mail Today's Team Productivity Needs Make teams more productive Make tools easy and relevant Extend tools to external

More information

Just Enough Operating System to kick start creativity. Simona Arsene

Just Enough Operating System to kick start creativity. Simona Arsene Just Enough Operating System to kick start creativity Simona Arsene SUSE Linux Enterprise Server JeOS speeds up virtual image deployment Just enough Operating System No need to re-certify Same SUSE Linux

More information

Novell o e File Management age e Suite

Novell o e File Management age e Suite Novell o e File Management age e Suite Using Management Automation of Network File Systems with Policy and Content Analysis to Achieve ROI, Compliance, and Governance Goals David S. Condrey dcondrey@novell.com

More information

Effectively Managing Identities within the Enterprise and Cloud

Effectively Managing Identities within the Enterprise and Cloud Effectively Managing Identities within the Enterprise and Cloud Ben Goodman Strategist, Identity and Security bgoodman@novell.com November 18, 2010 Where Is Identity and Access Management Heading? Enterprise

More information

Compliance Management Solutions from Novell Insert Presenter's Name (16pt)

Compliance Management Solutions from Novell Insert Presenter's Name (16pt) Compliance Solutions from Novell Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Issues Driving the Compliance Need Dealing with Compliance Requirements It's All about Balance Flexibility

More information

Novell GroupWise. Product Overview. Corne Groesbeek

Novell GroupWise. Product Overview. Corne Groesbeek Novell GroupWise Product Overview Corne Groesbeek corne@open-horizons.net The Last Year July 2010 GroupWise 8 SP2 Data Synchronizer Sharepoint connector Data Synchronizer SugarCRM connector Data Synchronizer

More information

Automating the Creation and Management of Cloud Workloads

Automating the Creation and Management of Cloud Workloads Automating the Creation and Management of Cloud Workloads Rick Ashford Don Vosburg Cameron Seader Technical Specialist rashford@suse.com Technical Specialist dvosburg@suse.com Technical Specialist cseader@suse.com

More information

PSA Peugeot Citroën PME PORTO

PSA Peugeot Citroën PME PORTO PSA Peugeot Citroën PME PORTO Set, 24 th 2008 Joao Batista jbatista@novell.com Agenda The PSA Linux Desktop Deal What is Linux Desktop? What did really matter? Project Phases and figures 2 The PSA Linux

More information

SAP Product Road Map SAP Identity Management

SAP Product Road Map SAP Identity Management SAP Product Road Map SAP Identity Management Road Map Revision: 2016.09.15 Customer Template Revision: 20160104 v4.1 Legal disclaimer The information in this presentation is confidential and proprietary

More information

Improving Information Security by Automating Provisioning and Identity Management WHITE PAPER

Improving Information Security by Automating Provisioning and Identity Management WHITE PAPER Improving Information Security by Automating Provisioning and Identity Management WHITE PAPER INTRODUCTION Many healthcare security professionals understand the need to enhance their security and privacy

More information

White paper June IBM Tivoli Identity and Access Assurance for healthcare

White paper June IBM Tivoli Identity and Access Assurance for healthcare White paper June 2009 IBM Tivoli Identity and Access Assurance for healthcare Page 2 Contents 2 Introduction 2 The healthcare challenge 3 Requirements for a healthcare identity and access assurance solution

More information

Deltek Touch Time & Expense for GovCon 1.2. User Guide

Deltek Touch Time & Expense for GovCon 1.2. User Guide Deltek Touch Time & Expense for GovCon 1.2 User Guide May 19, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical errors

More information

Oracle Identity & Access Management

Oracle Identity & Access Management Oracle Identity & Access Management USTRANSCOM September 28, 2016 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,

More information

View the Recording. Webinar: Accounting of Disclosures: Practical Approaches & Enforcement Update. November 17 th, FairWarning, Inc.

View the Recording. Webinar: Accounting of Disclosures: Practical Approaches & Enforcement Update. November 17 th, FairWarning, Inc. Webinar: Accounting of Disclosures: Practical Approaches & Enforcement Update November 17 th, 2011 View the Recording Learning objectives Enforcement update and lessons learned from past HIPAA audits Accounting

More information

Believe in a higher level of IT Security SECUDE Business White Paper. How to Improve Business Results through Secure Single Sign-on to SAP

Believe in a higher level of IT Security SECUDE Business White Paper. How to Improve Business Results through Secure Single Sign-on to SAP Believe in a higher level of IT Security SECUDE Business White Paper How to Improve Business Results through Secure Single Sign-on to SAP Executive Summary CIOs and IT managers face tremendous demands

More information

Novell Compliance Management Platform

Novell Compliance Management Platform Extension for SAP * Environments Overview AUTHORIZED DOCUMENTATION Novell Compliance Management Platform 1.0.1 November 12, 2009 www.novell.com Novell Compliance Management Platform Extension for SAP Environments

More information

SafeNet Authentication Service (SAS) Service Provider Role and Scope Guide

SafeNet Authentication Service (SAS) Service Provider Role and Scope Guide SafeNet Authentication Service (SAS) Service Provider Role and Scope Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries

More information

Accelerate GDPR compliance with the Microsoft Cloud Henrik Mønsted

Accelerate GDPR compliance with the Microsoft Cloud Henrik Mønsted Accelerate GDPR compliance with the Microsoft Cloud Henrik Mønsted Cloud Solutions Architect Microsoft Denmark This presentation is intended to provide an overview of GDPR and is not a definitive statement

More information

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det. GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,

More information

Optimize Process Performance with Analyzer, Monitor & Business Intelligence

Optimize Process Performance with Analyzer, Monitor & Business Intelligence Optimize Process Performance with Analyzer, Monitor & Business Intelligence Paul Cheung, Consulting IT Specialist hccheung@hk1.ibm.com 1 2009 IBM Corporation Agenda Performance Optimization Requirements

More information

ADM920 SAP Identity Management

ADM920 SAP Identity Management ADM920 SAP Identity Management. COURSE OUTLINE Course Version: 17 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2016 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication

More information

SAP BusinessObjects Access Control 5.3 Support Pack 9. Functional Overview SAP BusinessObjects Access Control Solution Management September 30, 2009

SAP BusinessObjects Access Control 5.3 Support Pack 9. Functional Overview SAP BusinessObjects Access Control Solution Management September 30, 2009 SAP BusinessObjects Access Control 5.3 Support Pack 9 Functional Overview SAP BusinessObjects Access Control Solution Management September 30, 2009 Disclaimer The information in this presentation/document

More information

SAP SuccessFactors Onboarding

SAP SuccessFactors Onboarding SAP SuccessFactors Onboarding Technical and Functional Specifications CUSTOMER TABLE OF CONTENTS KEY FEATURES AND FUNCTIONALITIES... 3 FORMS MANAGEMENT... 3 TASK AND PROCESS MANAGEMENT... 4 NEW HIRE PORTAL...

More information

RSA Identity Management & Governance

RSA Identity Management & Governance RSA Identity Management & Governance 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity Intelligence

More information

Enhancing Service Quality with Next Generation Business Automation in Government Muti Ur Rahman, ECM Sales Lead IBM India/SA

Enhancing Service Quality with Next Generation Business Automation in Government Muti Ur Rahman, ECM Sales Lead IBM India/SA Enhancing Service Quality with Next Generation Business Automation in Government Muti Ur Rahman, ECM Sales Lead IBM India/SA Challenges Facing Governments Today Continuous budget pressure Demonstration

More information

Transforming Healthcare

Transforming Healthcare Transforming Healthcare 1 VMware Transforms the Cost, Quality and Delivery of Patient Care Healthcare organizations have to manage with tight budgets and strict regulations in an age of transformation.

More information

Securing Intel s External Online Presence

Securing Intel s External Online Presence IT@Intel White Paper Intel IT IT Best Practices Information Security May 2011 Securing Intel s External Online Presence Executive Overview Overall, the Intel Secure External Presence program has effectively

More information

Preparing for an OCR Audit: What is Expected of You

Preparing for an OCR Audit: What is Expected of You Preparing for an OCR Audit: What is Expected of You Speakers Chuck Burbank CISO and Director of Managed Privacy Services FairWarning Robert Mireles, CIPM Sr. Healthcare Privacy Specialist for Managed Privacy

More information

WHITE PAPER MARCH Improve ROI of PeopleSoft Enterprise With Business Automation

WHITE PAPER MARCH Improve ROI of PeopleSoft Enterprise With Business Automation WHITE PAPER MARCH 2018 Improve ROI of PeopleSoft Enterprise With Business Automation 2 WHITE PAPER IMPROVE ROI OF PEOPLESOFT ENTERPRISE WITH BUSINESS AUTOMATION ca.com Table of Contents Section 1 4 Introduction

More information

Vendor Cloud Platinum Package: Included Capabilities

Vendor Cloud Platinum Package: Included Capabilities Solution Overview Third-Party Risk Management Vendor Cloud Platinum Package: Included Capabilities The Vendor Cloud Platinum package provides the highest level of risk management capabilities, offering

More information

AN EMM CHECKLIST FOR CIOs. Factors to Consider When Choosing an EMM Solution. Whitepaper

AN EMM CHECKLIST FOR CIOs. Factors to Consider When Choosing an EMM Solution. Whitepaper 1 AN EMM CHECKLIST FOR CIOs Factors to Consider When Choosing an EMM Solution Whitepaper 2 An EMM Checklist for CIOs As you decide on an Enterprise Mobility Management (EMM) solution, there are dozens,

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

SafeNet Authentication Service. Service Provider Role and Scope Guide

SafeNet Authentication Service. Service Provider Role and Scope Guide SafeNet Authentication Service Service Provider Role and Scope Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall

More information

Howto Approach Identity Management?

Howto Approach Identity Management? Security Circle 22.03.2010 Howto Approach Identity Management? IT Architect Carsten.Horst@ch.ibm.com Agenda Identity Management? Howto approach an identity management project? Project experience A great

More information

Big Data, Security and Privacy: The EHR Vendor View

Big Data, Security and Privacy: The EHR Vendor View Taking a step towards Big Data, Security and Privacy: proactive health + care The EHR Vendor View Bob Harmon, MD Physician Executive, Cerner Corporation Presented to Preventive Medicine 2016 Washington,

More information

HIPAA and Electronic Information

HIPAA and Electronic Information HIPAA and Electronic Information Are you still acting like it s a paper world? Rebecca Wahler, MS, CHPC, CHC Compliance & Privacy Officer, NMHIC, LCF Research, Albuquerque, NM Overall Goal Develop basic

More information

Top 5 Must Do IT Audits

Top 5 Must Do IT Audits Top 5 Must Do IT Audits Mike Fabrizius, Sharp HealthCare, VP, Internal Audit DJ Wilkins, KPMG, Partner, IT Advisory 2011 AHIA Annual Conference www.ahia.org Background on Sharp HealthCare Sharp s Co-sourcing

More information

Neues von der Oracle Identity Governance Suite. Dr. Stephan Hausmann

Neues von der Oracle Identity Governance Suite. Dr. Stephan Hausmann Neues von der Oracle Identity Governance Suite Dr. Stephan Hausmann The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

Securing the Mobile, Cloud-connected Enterprise

Securing the Mobile, Cloud-connected Enterprise Securing the Mobile, Cloud-connected Enterprise What is a Mobile, Cloud-connected Enterprise? The rise of mobile users and apps, coupled with the continued growth in software as a service (SaaS), has transformed

More information

How to Finish the HIPAA Security Risk Analysis and Meaningful Use Risk Assessment

How to Finish the HIPAA Security Risk Analysis and Meaningful Use Risk Assessment How to Finish the HIPAA Security Risk Analysis and Meaningful Use Risk Assessment Caroline Hamilton caroline.r.hamilton@gmail.com Risk & Security LLC As channeled by Dr. HIPAA Meaningful Use was the Hottest

More information

SAP Road Map for Governance, Risk, and Compliance Solutions

SAP Road Map for Governance, Risk, and Compliance Solutions SAP Road Map for Governance, Risk, and Compliance Solutions Q4 2016 Customer Disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Compass 9.2 Changes by Module

Compass 9.2 Changes by Module Compass 9.2 Changes by Module Key Changes by Module The changes highlighted below are by no means all of the changes taking place with the Compass 9.2 Upgrade, rather a subset of major changes we thought

More information

Identity and Access Management

Identity and Access Management Chapter 2 Identity and Access Management There are many configurations of identity and access management (IAM) systems, and to some extent, each organization s IAM system will be unique, developed and

More information

An Introduction to Oracle Identity Management. An Oracle White Paper June 2008

An Introduction to Oracle Identity Management. An Oracle White Paper June 2008 An Introduction to Oracle Identity Management An Oracle White Paper June 2008 An Introduction to Oracle Identity Management INTRODUCTION Oracle Identity Management's best-in-class suite of identity management

More information

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements SAP Database and Data Management Portfolio/SAP GRC Solutions Ready for the GDPR, Ready for the Digital Economy Fast-Track Your Midsized Business for the Digital Economy While Addressing GDPR Requirements

More information

Identity Provider Policy. Identity and Authentication Services (IA Services)

Identity Provider Policy. Identity and Authentication Services (IA Services) Identity Provider Policy Identity and Authentication Services (IA Services) Table of Contents 1 Background... 1 1.1 ehealth Ontario Identity Federation... 1 1.2 Purpose... 1 1.3 Objectives... 1 1.4 Scope

More information

Pega Care Management for Healthcare

Pega Care Management for Healthcare Pega Care Management for Healthcare PRODUCT OVERVIEW 7.21 Copyright 2016 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights

More information

Security solutions White paper. Effectively manage access to systems and information to help optimize integrity and facilitate compliance.

Security solutions White paper. Effectively manage access to systems and information to help optimize integrity and facilitate compliance. Security solutions White paper Effectively manage access to systems and information to help optimize integrity and facilitate compliance. March 2007 Contents 2 Overview 3 Answer key questions related to

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Identity and Access Management Success Stories.

Identity and Access Management Success Stories. Identity and Access Management Success Stories business@happiestminds.com IAM Solution Deployment - ForgeRock Suite End-to-End IT & ecommerce Services Provider- USA Single Authentication model improves

More information

Oracle Service Cloud. New Feature Summary. Release 18C ORACLE

Oracle Service Cloud. New Feature Summary. Release 18C ORACLE Oracle Service Cloud Release 18C New Feature Summary ORACLE TABLE OF CONTENTS Revision History 3 Overview 3 Agent Browser Desktop Automation 3 Workflow Enable Save Option for Workflow Elements 3 Workflow

More information

Identity Management Solutions for Oracle E-Business Suite. An Oracle White Paper January 2008

Identity Management Solutions for Oracle E-Business Suite. An Oracle White Paper January 2008 Identity Management Solutions for Oracle E-Business Suite An Oracle White Paper January 2008 NOTE: The following is intended to outline our general product direction. It is intended for information purposes

More information

Primavera Analytics and Primavera Data Warehouse Security Overview

Primavera Analytics and Primavera Data Warehouse Security Overview Analytics and Primavera Data Warehouse Security Guide 15 R2 October 2015 Contents Primavera Analytics and Primavera Data Warehouse Security Overview... 5 Safe Deployment of Primavera Analytics and Primavera

More information

This guide which is primarily intended for administrators and supervisors includes the following sections:

This guide which is primarily intended for administrators and supervisors includes the following sections: Micro Focus Service Desk - Getting Started May 2017 The Micro Focus Service Desk Getting Started guide gives information about the basic steps that are required to quickly configure Micro Focus Service

More information

Identity & Access Management Unlocking the Business Value

Identity & Access Management Unlocking the Business Value Identity & Management Unlocking the Business Value Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Unlocking the Value of Identity and Management Defining the IAM challenge

More information

Amol Bhandarkar Technology Specialist Identity & Access Microsoft

Amol Bhandarkar Technology Specialist Identity & Access Microsoft Amol Bhandarkar Technology Specialist Identity & Access Microsoft Agenda Identity & Access ILM 2 High level architecture ILM 2 Features Demo of ILM 2 Identity & Access Identity & Access Compliance and

More information

National Disclosure Summit

National Disclosure Summit www.pwc.com National Disclosure Summit Best Practices in implementing a coordinated Global Transparency Program February 7, 2014 Agenda Global transparency overview Your path to a global transparency program

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme UEM1798BU The ROI Driver: Transition from Cost Center to Business Driver with AirWatch for Windows 10 VMworld 2017 Content: Not for publication Jason Roszak #VMworld #UEM1798BU Disclaimer This presentation

More information

Infor Risk and Compliance for CDM Phase 2: Automate, integrate, manage, and report across your enterprise

Infor Risk and Compliance for CDM Phase 2: Automate, integrate, manage, and report across your enterprise Public Sector Infor Risk and Compliance for CDM Phase 2: Automate, integrate, manage, and report across your enterprise Now in its Phase 2 rollout, The Department of Homeland Security (DHS) and General

More information

IBM Business Process Manager on Cloud

IBM Business Process Manager on Cloud Service Description IBM Business Process Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

IBM Business Process Manager on Cloud

IBM Business Process Manager on Cloud Service Description IBM Business Process Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

IBM TRIRIGA Version 10 Release 5.2. Document Management User Guide IBM

IBM TRIRIGA Version 10 Release 5.2. Document Management User Guide IBM IBM TRIRIGA Version 10 Release 5.2 Document Management User Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 11. This edition applies to

More information

On the Alert: Incident Response Plan for Healthcare 111/13/2017

On the Alert: Incident Response Plan for Healthcare 111/13/2017 On the Alert: Incident Response Plan for Healthcare 111/13/2017 Presenter Introductions Nadia Fahim-Koster Managing Director, IT Risk Management Meditology Services Kevin Henry Senior Associate, IT Risk

More information

_ PRODUCT OVERVIEW EFFECTIVE MARCH 6, 2019 PRODUCT OVERVIEW

_ PRODUCT OVERVIEW EFFECTIVE MARCH 6, 2019 PRODUCT OVERVIEW ServiceNow Applications PRODUCT OVERVIEW Activity Designer Activity Packs Agent Intelligence Agile Development Provides capabilities to construct reusable Workflow activities based on an organization's

More information

Optimizing Security Practices Among Employees

Optimizing Security Practices Among Employees Optimizing Security Practices Among Employees How to manage user security practices and access to IT services during employment and after employment ends. Processes for establishing a highly secure environment

More information

Effective Data Governance & GDPR Compliance for the Nonprofit CFP

Effective Data Governance & GDPR Compliance for the Nonprofit CFP Effective Data Governance & GDPR Compliance for the Nonprofit CFP March 22, 2018 BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited

More information

a physicians guide to security risk assessment

a physicians guide to security risk assessment PAGE//1 a physicians guide to security risk assessment isalus healthcare isalus healthcare a physicians guide to security risk assessment table of contents INTRO 1 DO I NEED TO OUTSOURCE MY SECURITY RISK

More information

The power of the Converge platform lies in the ability to share data across all aspects of risk management over a secure workspace.

The power of the Converge platform lies in the ability to share data across all aspects of risk management over a secure workspace. Converge Platform The transition to value-based care is breaking down the barriers between the CNO, CMO, and Chief Legal Counsel in managing enterprise risk. It s time to take a proactive systems approach

More information

HR APPROVALS. Version 5.5

HR APPROVALS. Version 5.5 HR APPROVALS Version 5.5 Multiple Levels of Approval This manual walks you through the process of enabling and establishing approval levels for basic HR functions such as hiring and terminating employees.

More information

An Oracle White Paper March Access Certification: Addressing and Building On a Critical Security Control

An Oracle White Paper March Access Certification: Addressing and Building On a Critical Security Control An Oracle White Paper March 2010 Access Certification: Addressing and Building On a Critical Security Control Introduction Today s enterprise faces multiple multifaceted business challenges in which the

More information

What s New with Version 9.5

What s New with Version 9.5 What s New with Version 9.5 Marco Loprete, Senior Solution Specialist Business Analytics Important Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.

More information

Place the organization in their hands. BlackBerry Enterprise Solution For Government

Place the organization in their hands. BlackBerry Enterprise Solution For Government Place the organization in their hands. BlackBerry Enterprise Solution For Government The Complete Wireless Solution for Government The BlackBerry Enterprise Solution is a complete wireless solution for

More information

CA Workload Automation Agent for Micro Focus

CA Workload Automation Agent for Micro Focus CA Workload Automation Agent for Micro Focus Release Notes r11.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

How to sell Azure to SMB customers. Paul Bowkett Microsoft NZ

How to sell Azure to SMB customers. Paul Bowkett Microsoft NZ How to sell Azure to SMB customers Paul Bowkett Microsoft NZ CLOUD INFRASTRUCTURE DEVELOPER + APP PLATFORM Visual Studio Family + Azure App Service DATA + ANALYTICS Cortana Analytics Suite INTERNET OF

More information

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy? SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business

More information

Effects of GDPR and NY DFS on your Third Party Risk Management Program

Effects of GDPR and NY DFS on your Third Party Risk Management Program Effects of GDPR and NY DFS on your Third Party Risk Management Program Please disable popup blocking software before viewing this webcast June 27, 2017 Grant Thornton LLP. All rights reserved. 1 CPE Reminders

More information

Deltek Touch for Maconomy. Touch 2.2 User Guide

Deltek Touch for Maconomy. Touch 2.2 User Guide Deltek Touch for Maconomy Touch 2.2 User Guide July 2017 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical errors may

More information

Security Monitoring Service Description

Security Monitoring Service Description Security Monitoring Service Description Contents Section 1: UnderdefenseSOC Security Monitoring Service Overview 3 Section 2: Key Components of the Service 4 Section 3: Onboarding Process 5 Section 4:

More information

The Business Case for Unified IT: Automated IT Service and Unified Endpoint Management Solution

The Business Case for Unified IT: Automated IT Service and Unified Endpoint Management Solution The Business Case for Unified IT: Automated IT Service and Unified Endpoint Management Solution The Business Case for Unified IT: Automated IT Service and Unified Endpoint Management Solution An ROI White

More information

IBM Sterling Supply Chain Visibility Vendor Compliance

IBM Sterling Supply Chain Visibility Vendor Compliance IBM Terms of Use IBM Sterling Supply Chain Visibility Vendor Compliance The terms of this IBM Terms of Use are in addition to those of the IBM International Passport Advantage Agreement, the IBM International

More information

EGUIDE BRIDGING THE GAP BETWEEN HEALTHCARE & HIPAA COMPLIANT CLOUD TECHNOLOGY Created for mike elfassi

EGUIDE BRIDGING THE GAP BETWEEN HEALTHCARE & HIPAA COMPLIANT CLOUD TECHNOLOGY Created for mike elfassi Created for mike elfassi Bridging The Gap Between Healthcare & Hipaa Compliant Cloud Technology and outsource computing resources to external entities, would provide substantial relief to healthcare service

More information

PeopleSoft Human Capital Management Strategy Update and Roadmap

PeopleSoft Human Capital Management Strategy Update and Roadmap PeopleSoft Human Capital Management Strategy Update and Roadmap Marc Weintraub Senior Director, Product Strategy Luciana Miranda Senior Manager, PeopleSoft HCM PeopleSoft June, 2015 Copyright 2015, Oracle

More information

ServiceNow Order Form Product and Use Definitions

ServiceNow Order Form Product and Use Definitions SERVICENOW USE AUTHORIZATION Order Number 06915JF UC1 ServiceNow, Inc. 3260 Jay Street Santa Clara, CA 95054 End Customer Address: Reseller: Company Name Address Suite City State/Province Zip/Postal Code

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

_ PRODUCT OVERVIEW EFFECTIVE AUGUST 6, 2018 PRODUCT OVERVIEW

_ PRODUCT OVERVIEW EFFECTIVE AUGUST 6, 2018 PRODUCT OVERVIEW ServiceNow Applications PRODUCT OVERVIEW Activity Designer Activity Packs Agent Intelligence Agile Development Application Portfolio Asset Audit Basic Case Case and Knowledge (Formerly: HR Service ) Change

More information

IBM Business Process Manager on Cloud

IBM Business Process Manager on Cloud Service Description IBM Business Process Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of

More information

Fulfilling CDM Phase II with Identity Governance and Provisioning

Fulfilling CDM Phase II with Identity Governance and Provisioning SOLUTION BRIEF Fulfilling CDM Phase II with Identity Governance and Provisioning SailPoint has been selected as a trusted vendor by the Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring

More information

SAP SuccessFactors Recruiting

SAP SuccessFactors Recruiting SAP SuccessFactors Recruiting Technical and Functional Specifications CUSTOMER TABLE OF CONTENTS KEY FEATURES AND FUNCTIONALITIES... 3 RECRUITING POSTING... 3 User Experience and Interface... 3 Channel

More information

CHHS Master Data Management Strategy

CHHS Master Data Management Strategy CHHS Master Data Management Strategy Master Data Management (MDM) will provide the California Health and Human Services Agency (CHHS) and its Departments with a 360-degree view of CHHS clients, providers,

More information

DKSystems DKHelpDesk Software

DKSystems DKHelpDesk Software John Inverso Product Report 27 October 2003 DKSystems DKHelpDesk Software Summary DKHelpDesk combines help-desk capabilities with asset-tracking features for the small-to-midsize internal help desk. Modules

More information

Sage HRMS 2014 Sage Employee Self Service Installation and Setup Guide. October 2013

Sage HRMS 2014 Sage Employee Self Service Installation and Setup Guide. October 2013 Sage HRMS 2014 Sage Employee Self Service Installation and Setup Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All

More information

Policy Outsourcing and Cloud-Based File Sharing

Policy Outsourcing and Cloud-Based File Sharing Policy Outsourcing and Cloud-Based File Sharing Version 3.3 Table of Contents Outsourcing and Cloud-Based File Sharing Policy... 2 Outsourcing Cloud-Based File Sharing Management Standard... 2 Overview...

More information

Top 10 SAP audit and security risks

Top 10 SAP audit and security risks Top 10 SAP audit and security risks Securing your system and vital data Prepared by: Luke Leaon, Manager, RSM US LLP luke.leaon@rsmus.com, +1 612 629 9072 SAP is a functional enterprise resource planning

More information

Financial Services Cloud Administrator Guide

Financial Services Cloud Administrator Guide Financial Services Cloud Administrator Guide Salesforce, Spring 18 @salesforcedocs Last updated: February 1, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

IBM Clinical Trial Management System for Sites

IBM Clinical Trial Management System for Sites Service Description IBM Clinical Trial Management System for Sites This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users

More information

Deltek Touch Time & Expense for Vision. User Guide

Deltek Touch Time & Expense for Vision. User Guide Deltek Touch Time & Expense for Vision User Guide September 2017 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical errors

More information