CrowdStrike Completes Acquisition of Preempt Security

Healthcare

Conditional Access to Safeguard Patient Privacy

Preempt Platform protects ePHI through Zero Trust

Protecting access to electronic Patient Health Information (ePHI) is core to HIPAA compliance. Conditional Access ensures only authorized care givers have access to critical patient data through logical segmentation, risk-based access policies, and verifications which address both the Security and Privacy rules to reduce the risk of breach. The key is automation, and providing extra security without interrupting the flow of patient care.

Securing Access to Critical Healthcare Systems

Any medical professional from any device anywhere in the world should verify their identity to protect against unauthorized access. Zero Trust offers risk-based Multi-factor Authentication (MFA) to your care portal, patient records, and billing systems to guarantee the right users are accessing your protected infrastructure.

Stopping Compromised Credential Abuse

In the majority of ePHI data breaches, a privileged credential was abused in a malicious or negligent manner. In order to protect against the risk of stealthy administrators or lateral movement via privileged users, you need to ensure that privileged credentials for both end user and service accounts are not being misused. Preempt can help you pass your next audit and show controls over identity and access management (IAM) processes.

Protect Against Ransomware and Targeted Attacks

Since 2016, Ransomware and Targeted Attacks against critical healthcare workstations, care portals, and patient databases have persisted as one of the main threats to providing continuous patient assistance. Preempts help hospitals, insurance companies, and healthcare services protect themselves from ransomware like Maze and SamSam.

Enabling HIPAA Compliance Requirements

Established by the Health Insurance Portability and Accountability Act of 1996, HIPAA requirements demand a complete lock down of the identity store with strict rules for authentication. Preempt can help achieve the requirements for Access Control including inventory and action controls via step-up authentication (MFA/2FA), establishing a Risk Management Policy, and restricting third-party access.