The Seattle Children’s Hospital has implemented Gemalto’s Protiva security solutions, including the Strong Authentication Server, two factor authentication devices and technical support services, to securely access its servers, networks and VPNs. Seattle Children’s Hospital, ranked one of the best children's hospitals in the country by U.S. News & World Report. It will equip 4,500 clinicians and IT administrators with Gemalto’s convenient portable multifactor authentication capability.
The hospital selected Gemalto’s Protiva .NET solution to leverage the intrinsic “plug and play” capabilities of their existing Microsoft infrastructure. This included the flexibility to deploy three types of .NET devices provisioned and managed through Protiva Strong Authentication Server - the .NET USB key, the .NET Dual token, and the Easy OTP token, effectively replacing all legacy tokens.
“We view Gemalto as a long-term partner as our organization and data security needs continue to change,” said Mike Kindle, senior director, Enterprise Architecture for Seattle Children’s Hospital. “With Protiva, we have the access protection we need today, a cost-effective path to PKI, and the flexibility to evolve our security technology to meet future requirements.”
Gemalto’s flexible Protiva suite contains secure smart card technology to provide hospital staff with two factor strong authentication for authorized user access to the hospital network. They can use either one-time passwords or public key infrastructure (PKI) as the underlying authentication technology, and offers digital signature capabilities.
“Securing patients data privacy, information access and capturing an audit trail of all access events is vital to any healthcare organization,” added Tom Flynn, vice president, Online Authentication and eBanking for Gemalto North America. “By choosing Gemalto, Seattle Children’s Hospital can ensure a smooth strong authentication deployment, tailored to the needs of the hospital’s diverse users. This includes providing the same high level of access security even when an authorized user is accessing from a remote location.”