SYS-CON MEDIA Authors: Adine Deford, Cynthia Dunlop, Harry Trott, Xenia von Wedel, Peter Silva

News Feed Item

Online Tech Cloud Protects PHI With Encryption From Front End to Back Up

Difficult-to-Achieve Aspect of HIPAA Compliance Made Easy With End-to-End Encryption

ANN ARBOR, MI and ORLANDO, FL--(Marketwired - February 23, 2014) - At the HIMSS 2014 Conference this week, healthcare companies are looking for innovations to improve patient outcomes at lower costs. Many of those innovations will come from, or be supported by, new IT strategies. The space is ripe for innovation, from improving user interface designs to fortifying the IT infrastructure protecting patient data.

Online Tech launched an innovative approach to securing patient data by incorporating encryption at the very core of its cloud and backup infrastructure to protect PHI from the front-end of patient portals all the way to the data at rest in offsite disaster recovery environments. This approach means PHI is never in an unencrypted state. Furthermore, "encryption at the core" doesn't incur the performance sacrifices or administrative penalties that 3rd party or "bolted-on" encryption involves.

Online Tech's end-to-end encryption addresses one of the most disturbing discoveries by the OCR: encryption is often completely overlooked or not included at the point of implementation.

"Encrypting patient data throughout its lifecycle is a key strategy for a defense-in-depth approach to HIPAA compliance and protecting PHI. The proliferation of cloud-based healthcare apps and the use of mobile devices by care providers demands new levels of protection. Unfortunately, encryption is not always straightforward or without costs. As such, it remains one of the most widespread areas of non-compliance for healthcare organization," said April Sage, Director Healthcare IT, CPHIMS. "At HIMSS 2014, Online Tech will be a resource to healthcare companies that want to leverage the cloud, without sacrificing data security."

"Online Tech's expertise in HIPAA compliant data centers has been very important for helping CoherentRx build the right foundation for our healthcare apps, which helps doctors communicate more effectively with patients and help patients better understand the care they are receiving," said Tom Hartle, Founder of CoherentRx. "Online Tech has HIPAA expertise and compliant services that help us ensure the security of patient information in our app, and the company's fully redundant infrastructure ensures that our app is always available when doctors need them."

Online Tech will share best practices for addressing these security and compliance challenges in the cloud at HIMSS booth #3904. Throughout the event, Online Tech will have Enterprise Architects available for one-on-one consultations with companies seeking advice and best practices for health IT architecture, compliance strategies and security for PHI. Security and healthcare attorney Tatiana Melnik, will be dropping by the booth to answer questions about compliance in the cloud during HIMSS 2014. Melnik co-presents a HIMSS educational session on February 24 with the IRS' Jim Robnett entitled, "Identity Fraud and Data Breaches: Criminal and Civil Enforcement Efforts."

"One of the key issues facing healthcare CIOs is the security of patient information in from end-to-end. We want to protect PHI from the point of access in the cloud by mobile devices, all the way to its long-term storage destination for disaster recovery protection. Each stage of its lifecycle is a challenge that can lead to non-compliance with HIPAA, making this an urgent issue to resolve," said Mike Klein, co-CEO of Online Tech. "At HIMSS, we will demonstrate how end-to-end encryption solves that non-compliance challenge and keeps confidential patient information secure."

Online Tech will put a spotlight on customer stories during HIMSS, allowing healthcare organizations like CoherentRX, Annkissam and Rimage Designs to tell their stories about protecting PHI and demonstrating compliance with the encryption requirements of HIPAA. This video of instaRounds CEO & Founder Kurian Thott gives a preview of the case studies that Online Tech will highlight at the event.

About Online Tech
Online Tech leads in secure, compliant enterprise-class hosting services. Online Tech's Midwest data centers protect mission critical applications to ensure they are always available, secure, and comply with government & industry regulations. Backed by independent HIPAA, PCI, SOC 2 and Safe Harbor audits, Online Tech delivers exceptional experiences for companies in need of a strategic hosting partner. For more information, call (877) 740-5028, email [email protected] or visit www.onlinetech.com.

Image Available: http://www.marketwire.com/library/MwGo/2014/2/23/11G012681/Images/himss14-1202738089908.jpg

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...
Some developers believe that monitoring is a function of the operations team. Some operations teams firmly believe that monitoring the systems they maintain is sufficient to run the business successfully. Most of them are wrong. The complexity of today's applications have gone far and beyond the capabilities of "traditional" system-level monitoring tools and approaches and requires much broader knowledge of business and applications as a whole. The goal of DevOps is to connect all aspects of app...
15th Cloud Expo, which took place Nov. 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, expanded the conference content of @ThingsExpo, Big Data Expo, and DevOps Summit to include two developer events. IBM held a Bluemix Developer Playground on November 5 and ElasticBox held a Hackathon on November 6. Both events took place on the expo floor. The Bluemix Developer Playground, for developers of all levels, highlighted the ease of use of Bluemix, its services and functionalit...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more utilizing technologies such as Microsoft Azure, Visual Studio online, and Application Insights in this demo-heavy session.
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
"We help companies that are using a lot of Software as a Service. We help companies manage and gain visibility into what people are using inside the company and decide to secure them or use standards to lock down or to embrace the adoption of SaaS inside the company," explained Scott Kriz, Co-founder and CEO of Bitium, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.