AdobeStock_218581890.jpg

Security

  • Users

    • Cyber Security Training

    • Access control and monitoring

    • HIPAA Compliant workspace

    • HIPAA Awareness Training

    • Two-factor Authentication

  • Infrastructure

    • Layer 7 firewalls

    • IPS/IDS

    • Vulnerability Scanning and advanced threat protection

  • Data

    • Encrypted sessions for all patient contact

    • Data encryption at rest and in motion