Cyber security

Comarch IAM is a tool allowing you to identify, authorize, authenticate and manage users  in order to decide whether to grant them access to your applications, devices and crucial data. In healthcare, it enables particular employees to access medical records based on role, facility or location – with data access accountability in place.

Key business advantages:

Identity management solution

Identity management solution

Enables individual healthcare professionals to access medical records or history at specific times and for specific reasons

Access management feature

Access management feature

Allows to manage access to systems and resources across the entire network of medical facilities, with full accounting included

Workflow processes for multi-level acceptance schemes

Workflow processes for multi-level acceptance schemes

Keep interested parties in the loop whenever a new permission is requested – by activating the four-eye principle

Role-based Access Control approach (RBAC)

Role-based Access Control approach (RBAC)

Simplifies user management by defining access rights around roles and privileges

Single Sign-On solution (SSO)

Single Sign-On solution (SSO)

Ensures hassle-free integration across medical systems – a single click to access them all

Compatibility with PKI and SmartCards

Compatibility with PKI and SmartCards

Provides trusted server access plus microprocessor cards for secure storage of sensitive information

Delegation of duties

Delegation of duties

Enables delegation of user permissions under limited timeframes

Compliance with GDPR regulations

Compliance with GDPR regulations

Provides support for data portability, anonymization, pseudonymization, reporting and more

How does Comarch IAM solution work?

The following diagram illustrates the position of the IAM platform in the enterprise infrastructure and the importance of identity and access management software for protected data access.

 

How does Comarch IAM solution work?

Methods of identification & authorization

Static and masked password

Static and masked password

One-time password (OTP) tokens mobile and hardware (including Comarch tPro family)

One-time password (OTP) tokens mobile and hardware (including Comarch tPro family)

(including Comarch tPro family)

PKI SmartCards and cryptographic tokens

PKI SmartCards and cryptographic tokens

Support for RSA and ECC algorithms

Biometric identity

Biometric identity

(fingerprints)

Kerberos ans LDAP

Kerberos ans LDAP

Social media login

Social media login

Selected capabilities:


• Centralized and efficient access control policy
• Reflection of company’s organizational structure
• Two-factor authentication scheme allowing medical staff to apply stronger security measures to patient data
• Support for third-party and Comarch own authentication devices including ECC tokens, OTP tokens, or cryptographic cards
• Management of user and device identities in a large number of IT systems integrated with various applications and operating systems
• Encryption in transit for all connections through SSL
• Fast and secure access to medical systems based on location and user permissions
• Remote access to medical facilities

access to medical data

References

MSIM-it-Comarch-Healthcare.png
PeZ-it.png
PSIeZ-it.png

Want to know more? Need some help with product selection?

Tell us about your business needs. We will find the perfect solution.