04.01.2017 Views

Two factor authentication and digital identity management

2izGJqj

2izGJqj

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

How about retrofitting older systems? If they were not originally built to meet<br />

modern security st<strong>and</strong>ards, Venkat says, Cerner could upgrade them by<br />

rewriting some components. “Our system provides a layered architecture, so<br />

we are able to replace some of the parts to be able to support the st<strong>and</strong>ards as<br />

they evolve.”<br />

Ready for change<br />

Venkat believes that healthcare providers <strong>and</strong> EHR vendors are both ready for<br />

the advent of an <strong>identity</strong> ecosystem <strong>and</strong> <strong>digital</strong> <strong>identity</strong> <strong>management</strong>. “In my<br />

discussions with hospitals <strong>and</strong> other vendors, I see there’s an urgent need to<br />

integrate those systems beyond their own EHR infrastructure,” he observes.<br />

“I’m seeing a larger eagerness of the industry to move towards that than in the<br />

past.”<br />

The new emphasis on interoperability requires a new approach to data security<br />

<strong>and</strong> <strong>authentication</strong>, he adds. “The interoperability goes h<strong>and</strong> in h<strong>and</strong> with the<br />

security aspect of the data that you’re sharing.”<br />

Regarding his own company’s position on <strong>digital</strong> <strong>identity</strong> <strong>management</strong> , Venkat<br />

notes, “Cerner has always looked beyond the EHR as part of population health.<br />

Now we’re seeing clients wanting to do that, <strong>and</strong> that will help drive us toward<br />

<strong>digital</strong> <strong>identity</strong> <strong>management</strong>.”<br />

“The<br />

interoperability<br />

goes h<strong>and</strong> in h<strong>and</strong><br />

with the security<br />

aspect of the data<br />

that you’re sharing.”<br />

—Ch<strong>and</strong>ra Venkat<br />

16 TWO FACTOR AUTHENTICATION AND DIGITAL IDENTITY MANAGEMENT

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!