Network Access Compliance in the Cards

May 2006
Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p26
Trade Publication
The article offers information about cards as the network access solution needed by the University of Colorado Hospital. After an assessment of several providers, the University of Colorado Hospital went for a solution combining pcProx and pcProx Sonar from PF IDeas. The hospital is prepared for the HIPAA compliance with the help of pcProx and eXactACCESS. The doctors and nurses pass their badge through the reader by using pcProx and type their PIN. eXactACCESS routes the data and security access and also brings to the administrator the defined portion of the network.


Related Articles

  • Maximum security. Taylor, Mark // Modern Healthcare;11/18/2002, Vol. 32 Issue 46, p36 

    Focuses on the role of high-technology systems in U.S. hospitals. Advantages of using hospital security systems; Kinds of high-technology equipment that are purchased by hospitals; Background on the reduction of crimes committed in hospitals; Disadvantages of such systems for privacy and...

  • Proactive planning. Hodgson, Karyn // Security: Solutions for Enterprise Security Leaders;Jun98, Vol. 35 Issue 6, p22 

    Discusses the security systems implemented by Thomas Knox, director of safety, security and transportation services of Oak Park, Illinois-based West Suburban Hospital Medical Center. Implementation of black and white cameras; Need to take a proactive and preventive stance when looking at...

  • Security's focus on healthcare industry. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jun98, Vol. 35 Issue 6, p24 

    Focuses on security system implementation of hospitals in the United States. Interest of security executives in CCTV surveillance and specialized technology such as infant monitoring; Prevalence of using security ID; Security requirements; Security integration; Lowest risk of security concerns...

  • Puzzled by security? Moss, Brenda // Health Facilities Management;Jul2002, Vol. 15 Issue 7, p16 

    Discusses the role of hospital personnel in improving hospital security efforts. Information on the solicitation of hospital participation for security programs; Venues for introducing staff to hospital security efforts; Strategies to gain support for security programs.

  • Keeping Italian City's Main Hospital Secure.  // Security: Solutions for Enterprise Security Leaders;Apr2009, Vol. 46 Issue 4, p18 

    The article reports that Villa Sofia-CTO, the main hospital in Palermo, Italy, has been installed with more than 650 camera security video systems to provide the latest surveillance technology which would protect the staff, patients, visitors, and assets. The video system will be installed on...

  • User identity: the key to safe authentication. Stuhlmuller, Rod // Communications News;Mar2000, Vol. 37 Issue 3, p32 

    Reports on the need for user identity authentication to keep data stored in computer networks secure. Security implications of electronic commerce; Weakness of traditional username/password network security measures; Details on the symmetric key infrastructure security solution.

  • IDENTIFY SECURITY LEAKS. Courter, Eileen // Credit Union Management;Dec2000, Vol. 23 Issue 12, p22 

    Discusses the importance of an information system security audit. How Insuretrust conducts an audit; Factors to consider when assessing information system security; Steps a security audit should cover. INSETS: NOTHING IS PERFECT;ONLINE RESOURCES.

  • Hackers (and business competitors) beware. Martin Jr., Walter P.; McHenry-Schmal, Linda L. // America's Network;8/1/94, Vol. 98 Issue 15, p50 

    Features the development of the Secured System Access Line (SSAL) network security system by Proctor and Associates. Protection against network intruders; Highly effective anti-hacking safeguards of the SSAL.

  • ISS bolsters security analysis. Messmer, Ellen // Network World;3/25/2002, Vol. 19 Issue 12, p12 

    Focuses on the computer network security software of Internet Security Systems in the U.S. Collection of security date from multiple vendors; Assessment on the condition of the intrusion-detection system market; Acquisition of Network ICE.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics