Comarch IAM is a tool allowing you to identify, authorize, authenticate and manage users  in order to decide whether to grant them access to your applications, devices and crucial data. In healthcare, it enables particular employees to access medical records based on role, facility or location – with data access accountability in place.

Key business advantages

Identity management solution

Enables individual healthcare professionals to access medical records or history at specific times and for specific reasons

Access management feature

Allows to manage access to systems and resources across the entire network of medical facilities, with full accounting included

Workflow processes for multi-level acceptance schemes

Keep interested parties in the loop whenever a new permission is requested – by activating the four-eye principle

Role-based Access Control approach (RBAC)

Simplifies user management by defining access rights around roles and privileges

Single Sign-On solution (SSO)

Ensures hassle-free integration across medical systems – a single click to access them all

Compatibility with PKI and SmartCards

Provides trusted server access plus microprocessor cards for secure storage of sensitive information

Delegation of duties

Enables delegation of user permissions under limited timeframes

Compliance with GDPR regulations

Provides support for data portability, anonymization, pseudonymization, reporting and more

How does Comarch IAM solution work?

The following diagram illustrates the position of the IAM platform in the enterprise infrastructure and the importance of identity and access management software for protected data access.

 

Methods of identification & authorization

Static and masked password

PKI SmartCards and cryptographic tokens

Biometric identity

Kerberos ans LDAP

One-time password tokens mobile and hardware

Social media login

Selected capabilities

  • Centralized and efficient access control policy
  • Reflection of a company’s organizational structure
  • Two-factor authentication scheme allowing medical staff to apply stronger security measures to patient data
  • Support for third-party and Comarch own authentication devices including ECC tokens, OTP tokens, or cryptographic cards
  • Management of user and device identities in a large number of IT systems integrated with various applications and operating systems
  • Encryption in transit for all connections through SSL
  • Fast and secure access to medical systems based on location and user permissions
  • Remote access to medical facilities

 

Cyber security

References

Want to know more?

Tell us about your business needs. We will find the perfect solution.