Patient Data Theft on the Rise

As the world accelerates toward a fully digital economy, information and data have become high-value targets for hackers and thieves resulting in ever larger and costlier data breaches, and with new regulations making organizations legally responsible for the confidentiality of sensitive data, the data stored in databases now represents a business risk that must be carefully managed.

Nearly all IT executives recognize that their information systems process and store sensitive and regulated data, but the mixture of on premise and cloud based IT infrastructure along with the use of diverse applications and multiple database platforms make it difficult to ensure all your sensitive data is protected everywhere it is stored or processed.

The need to protect data is particularly acute in healthcare due to the regulations that mandate the protection electronic health information (e-PHI). E-PHI is broadly defined as information that can reasonably define an individual and is related to their past, present or future health conditions or their payments for treatments.These regulations add significant financial penalties to the reputational costs associated with healthcare data breaches.

Key Capabilities

Secure Compute

Secure Compute provides encryption capability that utilizes AES-256 strong encryption with customer-owned keys and allows operations on encrypted data without any application modifications or breakage.

Dynamic Access Control

Users are often over-provisioned to data (e.g. see the latest data leak headline) in app environments.  Dynamic Access Control cryptographically enforces control at the record level to prevent overexposure of data to end-users.

Record Access Monitoring

Determining who is accessing which records with what frequency is a key capability to ensure compliance with data classification and regulatory policies. Record Access Monitoring tracks access to data at the record level and enables anomalous access triggers.

This approach virtually eliminates the risk of a data breach due to compromised DBA or admin credentials.