WHITEPAPER BALANCING MOBILE HEALTHCARE RISK WITH PRODUCTIVITY Enabling Organizations To Embrace Improved Efficiencies While Ensuring Patient Privacy and Facilitating Compliance. 1 EXECUTIVE SUMMARY IT solution providers and software developers that focus on the healthcare industry are keenly aware of just how much healthcare organizations benefit from mobile technologies. Doctors, nurses and other healthcare personnel can interact with applications more easily and efficiently—on-the-go within healthcare facilities as well as from home, on the road, or in the air. Whether using smartphones, tablets or laptops, medical personnel can share and process information in ways that not only improve patient care but also streamline administrative tasks such as scheduling, admitting, and billing as well as critical and timely data exchanges with insurance payers and other covered entities. But when selecting mobile technology, healthcare organizations face a large roadblock: the missing or limited security features and controls that mobile devices and mobile applications introduce. All healthcare organizations must protect patient privacy and comply with HIPPA, HITECH and other regulations issued by nations across the world that enforce strict guidelines on the handling of patient electronic health records. Without applying the proper technology safeguards, mobile devices and applications will not meet compliance standards and may subject healthcare organizations to severe fines. Even worse, mobile devices could become vulnerable to data breaches, potentially placing patient lives at risk. This is particularly true when healthcare employees exchange electronic information with their peers and other providers or covered entities without applying a level of due care for the data. This whitepaper examines the various process efficiencies that healthcare organizations gain by adopting a business-enabling mobile platform and how to employ supporting technologies to protect patient information so lives can be saved and regulations can be adhered to. Taking steps to protect patient information in the mobile world is particularly critical since the latest mobile technology makes it possible for doctors, nurses and other staff to utilize their own personal devices to directly interact with patients and collaborate with their peers and colleagues. While the use of these technologies improves efficiencies and drives up productivity, healthcare organizations must apply extra security measures to protect their electronic information. 1 2 THE BENEFITS OF ENABLING MEDICAL PERSONNEL WITH MOBILE TECHNOLOGIES With healthcare organizations converting patient records and images into a variety of electronic formats, the possibility for increased collaboration and greater productivity through the use of mobile devices has increased exponentially. To capitalize on this opportunity, many applications designed for desktop use have already been adapted for use on tablets and smartphones. With the large variety of available mobile apps, a key challenge is integrating the apps to provide not only mobile document editing and record-review capabilities, but also addressing bigger healthcare challenges—such as improved document workflows that allow more patients to receive improved care with reduced overhead for the health organization. Imagine doctors relying on tablets that can be easily carried wherever they go—room-to-room in their office perhaps, or even from hospital-to-hospital. In a hospital, for example, doctors can click on a grid of patients at any time to see which room they are in, view patient electronic health records (EHRs), and hold conferences with specialists to review patient cases in a pop-up window. Doctors can also manipulate their mobile screens to increase or decrease the size of a hospital floor map as they locate high-priority patients. In addition, physicians and nurses can use a stylus to digitally draw diagrams directly on the patient x-ray images to show patients how a procedure might occur while capturing patient comments, questions, and concerns. All of this information, including the annotated diagram, can be saved as part of a patient’s EHR for future consultations. Technology will even allow patients to hand-write notes directly onto tablet screens and sign consent forms as part of the workflow. Doctors can also use instant messaging to instruct the hospital staff when it’s okay to discharge patients or issue orders for tasks such as removing intravenous fluid lines. Mobile technologies also make it possible for doctors and nurses to view a variety of daily workflows, starting from viewing their schedule the moment they drive up to the office or hospital and continuing to view events and tasks through the day as they work with patients. Doctors can literally follow patient treatments from start-to-finish at any time, from anywhere—from admission to discharge and from consultation to prescribing medication. Mobile technology also eliminates the need for antiquated pagers and insecure SMS technologies as colleagues can contact doctors and nurses just as quickly and with much more information via e-mail, instant messaging, or even voice communications and conference calls. Members of multi-disciplinary care teams can also stay better connected—by transferring calls through Bluetooth® earpieces. 30 MOBILE COLLABORATION WORKFLOW 2 3 EXAMPLE HEALTHCARE TASKS ENHANCED BY MOBILE TECHNOLOGY HEALTHCARE TASK MOBILIZED CAPABILITIES BUSINESS BENEFITS Patient Before leaving home, doctors and nurses can review patient lists Allows doctors and nurses to Preparation / Registration and schedules as well as case summaries—well before patients prepare in advance for their arrive and before the start of rounds. entire day. During case reviews, doctors can annotate electronic records; Provides doctors and nurses upon arrival at the clinic/hospital, doctors and nurses can quickly with access to up-to-the- review patient EHRs for stored notes and images to fine-tune minute patient information. patient scheduling. Gives patients an easy and Patients register using office-provided mobile device and stylus stress-free way to begin their to complete/sign the intake form while entering symptoms, new visits with the doctor. allergies, changes in health status, updated insurance, and other pertinent information. Staff members retrieve the mobile devices and e-mail the signed forms to office administrators who review and store the information in practice database. Patient / In preparation for doctor visits, nurses view existing lab reports Nurses can focus on engaging Nurse Consultation and then connect their mobile devices to control Wi-Fi enabled with patients rather than devices such as weight scales, blood pressure cuffs, pulse taking notes and recording oximeters, and glucose meters to collect patient vitals. statistics by hand. Nurses draw directly on mobile devices using stylus to enable Vitals information is patients to describe symptoms and to describe to patients how recorded more accurately and vitals compare to norms as well as how upcoming procedures is immediately available to might take place. entire staff. Nurses collect patient consent signatures prior to doctor visits, Doctors receive the latest check for doctor availability via presence application, an d send information regarding current latest patient stats/vitals while informing doctor of patients’ situation of each patient. state-of-readiness. Doctor reviews updated information from patient/nurse visits prior to consulting with patients. 3 HEALTHCARE TASK MOBILIZED CAPABILITIES BUSINESS BENEFITS Patient Monitoring Upon check-in, patients can be fitted with WiFi enabled clip- Patients can be located and on badges tracked by sensors positioned around the medical monitored from anywhere in building; badges securely relay location information the medical building. to hospital staff. Doctors receive a snap- Nurses can access the hospital map on mobile devices and shot lay-of-the-land and can pinch the screen to increase or decrease size of building floors to adjust schedules locate patients for family members. based on current, Doctors can click on grid of patients to view current location and review key information from patient EHRs. From hospital map, nurses and doctors can monitor relevant patient stats such as temperature, blood pressure, heart rate, blood glucose levels, and other vital signs. relevant information. Nurses can share timesensitive information for immediate viewing nad action by their medical colleagues. Doctors can adjust schedules based on their location compared to patient locations while considering patient vitals and EHR information. Doctor / Doctors view patient x-rays, EKGs, MRIs and CT scans on mobile Doctors gain access to all Patient Consultation devices and then annotate records during patient consultations. patient EHRs, which enables Doctors photograph symptom areas including wounds, rashes proper patient consultation and aches, and then store photographs as part of the EHR. and treatment. Doctors record patient consultation using mobile video cameras Patients receive real-time and store the video as part of the EHR. education regarding their Doctors display photographs, x-rays, and other images to patients illness and treatment. during consultations and annotate images onscreen while New information can be pointing out areas of interest to patients collected in real-time and Doctors photograph current state of treated area(s) to show patient recovery progress while swiping through photographs and displaying them side-by-side. 4 securely stored in patient EHRs. HEALTHCARE TASK MOBILIZED CAPABILITIES BUSINESS BENEFITS Consultation During patient visits, doctors can transcribe notes while gaining Doctors gain access to all Follow-Through access to available journals to review similar cases. facility content - resources and Doctors can click on a grid of patients, view EHRs, and confer with specialists in a pop-up window. Doctors can bring mobile devices to in-house lab to demonstrate issues to technicians; technicians can access images discussed by doctors. can assemble the resources into patient cases as references. Doctors can collaborate with other experts to determine proper treatments. Doctors compile medical images and other relevant data, assess and annotate the data, and then send the information to other physicians for review. Doctors can mobilize the necessary workforce to act on defined treatments. Technicians and other physicians can instant-message doctors to communicate discoveries and opinions; based on feedback, physicians can order additional clinical/laboratory tests. Doctors can instant-message nurses to let them know if patients will stay longer and if they need to order lunch for patients or assemble additional supplies. Nurses can order lunch for patients and requisition necessary supplies while doctors schedule surgery and assemble surgical team. Dispense Medication Doctors review current and discontinued meds and then consult Reduces risk of improper with patients on any items of concern while annotating EHRs as medication dispensing and appropriate. post - dispensing patient Doctors review previously-recorded allergies including those updated by patients upon registering. Doctors order medications to be dispensed. Using an integrated barcode scanner, nurses scan patient ID wristbands as well as barcodes on medications to ensure the correct patient, medication, dose, route, and time for medication administration. Doctors and nurses working on subsequent shifts can view medications administered by prior shifts. 5 monitoring (i.e. for allergies). Doctors can keep and share improved electronic records of patient medication history and current list of medications. HEALTHCARE TASK MOBILIZED CAPABILITIES BUSINESS BENEFITS Hospital Discharge Following patient visits, doctors can immediately order discharges or The patient experience is issue orders for tasks such as removing intravenous fluid lines using improved dramatically while instant messaging. preparing for and upon Housekeepers can communicate room and bed locations as well as readiness status for new patients. leaving the hospital. Hospitals experience Nurses can view exact status of the entire bed situation, accessing reference tables to see which housekeeper to contact based on location, day of week, and shift; nurses can then alert significant efficiency improvements in patient rotations. appropriate housekeeper about empty beds and the priority via The waiting time for patients secure text message. to pick up their prescriptions Discharge staff can refer to physician plans, help with follow-up is dramatically reduced. appointments/referrals, and e-mail discharge summaries Prescription slips cannot be to patients. lost or stolen When prescribing drugs, physicians can select medications and send them electronically to initiate orders directly with pharmacies; doctors can also select appropriate set of instructions and send them to a printer in the front office for patients upon departure. Business Analytics Doctors and staff report on all daily activity and share information Improves documentation with the office/executive staff. accuracy and availability Doctors capture treatments delivered, time spent with patients, and other relevant clinical information for each patient. throughout the entire healthcare program. Increases chances of meeting Office staff prepares subsequent invoices, billing, and follow-up and maintaining compliance. scheduling while e-mailing materials to appropriate recipients— Improves healthcare providers, patients, and health associates. organization efficiencies Executives communicate with each other, sharing notes and documents relevant to meeting agendas. Administrators compare information across multiple facilities in real time. On system-wide level, executives can view which medical conditions are most prevalent among patients and devote resources to treatment and prevention. Executives can determine if certain procedures lead to return hospital visits, securely sharing findings and best practices for rehabilitation and recovery with other hospitals in the area as well as national disease-control agencies. 6 across the board. 4 HEALTHCARE MOBILITY ROADBLOCKS As shown in the previous examples, the modern mobile worker is radically transforming healthcare. Time-stretched doctors and pragmatic nurses now rely on smartphones and tablets to keep connected while they keep moving. In hospitals and clinics throughout the world, these no-nonsense, independent, and demanding clinicians are already using iPhones®, iPads®, Android™, and Windows® Phone® devices to electronically access medical records, view radiological images, reference medical journals, and file prescriptions—in addition to carrying out regular e-mail, calendar, collaboration, and other back-office processes. The use of mobile technology can be justified through a recent survey that found that healthcare professionals save as much as a halfhour per day using mobile apps. As mobile technology enables doctors, nurses and other personnel to share patient records and images such as x-rays and MRIs, healthcare organizations must also ensure this sensitive and often-private information is protected from possible breaches as well as access or misuse by non-authorized personnel. This is true not only for intra-communications within the healthcare organization but also inter-communications with external parties such as colleagues that doctors consult with, partner laboratories, and insurance carriers. For example, if not controlled, a mobile device could allow for an x-ray image to be e-mailed to an external party or saved to a public cloud service, which could be accessed by any number of non-authorized parties. While the loss of EHR may not be top-of-mind for nurses and doctors, it is a necessary evil that must be addressed. Even the most popular mobile apps in the healthcare industry remain challenged to deliver information securely. Currently, more than 10,000 mobile healthcare applications can access electronic health records (EHRs) daily, and the U.S. Office of Civil Rights has reported dramatic increases in the incidence of data loss or leakage through mobile devices—with more than half attributed to tablets alone. As healthcare became one of the most breached industries in 2011, such breaches may have left the personal records of 1.9 million patients at risk. Medical records were involved in the three of the worst data breaches of that year. And this trend only continues to grow. Complicating matters in the U.S. is the recent regulatory impact of President Obama’s ‘We Can’t Wait’ initiative, which makes the Health Insurance Portability and Accountability Act (HIPAA) even more stringent. To safeguard the use of mobile devices among healthcare providers, regulations and best practices insist that all patient data be encrypted at all times—during transmission, at any time data resides on wireless devices, and even while data is stored within applications. The United States isn’t the only country in the world facing these challenges. Canada as well as countries in EMEA and Asia Pacific face similar challenges from their respective healthcare regulatory agencies. All these new rules mean the stakes are much higher for IT professionals in healthcare, not to mention those responsible for maintaining privacy and managing organizational risk. To this point, there’s greater financial liability, an increased chance of reputational damage and the threat of governmental fines as well as other business and even operational consequences. 5 RISKS OF DEPLOYING MOBILITY SOLUTIONS WITHIN THE HEALTHCARE INDUSTRY Along with the roadblocks, healthcare organizations also face a wide range of risks when trying to protect patient electronic health records and adhering to the appropriate government regulations. Following are five of the most susceptible areas. DEVICE HARDWARE PERSONALLY OWNED DEVICES MALICIOUS APPS 7 NETWORKS & CLOUD DEVICE LIFECYCLE The Device Lifecycle These threats include healthcare data-loss that occurs when doctors, nurses and other staff members lose their mobile devices as well as when devices are stolen or decommissioned. In addition to data owned by the organization, users can also potentially lose their personal data if the entire device is wiped by the organization, placing the company in a potentially costly legal situation. Healthcare organizations are not responsible for personal data, but it is in the organization’s best interest to protect personal information on behalf of the staff—especially if staff members agree to use their personal devices for business purposes. The device lifecycle threat is one of the most difficult to thwart because people literally carry their devices 24x7 everywhere they go, and lost/stolen devices occur with high frequency. Weak passwords, failure to use any password at all, and lack of data encryption can then lead to data theft. Organizations and end-users may also decommission (sell or discard) devices without realizing the healthcare data must be wiped first. Personally-Owned Devices Many healthcare organizations support Bring-Your-Own-Device (BYOD) policies, which help increase staff productivity by giving users the freedom to use their personal devices for business purposes. User familiarity with their own devices and the tendency to carry the devices at all times prompts users to interact with healthcare applications more often. Unfortunately, personally-owned devices also carry a higher level of risk than devices owned by the organization and directly managed and controlled by IT. Personal devices tend to have limited (or non-existent) encryption. And users often set weak passwords, re-use the same passwords across personal and corporate logins, or even turn off passwords altogether. Users may also not understand how to use devices in conjunction with the company’s security and governmental regulatory policies— often connecting their devices to and sharing data with other devices they own via cables and networks. Additionally, while bouncing back and forth from personal to business applications, users may inadvertently transfer corporate information into a personal application, thereby exposing that data to others who have access to that application. Device Hardware and Software All mobile hardware devices and their operating system software contain vulnerabilities susceptible to breaches that allow hackers to gain access to data as well as malware attacks that can degrade or shut down system performance. Just because devices haven’t been exploited yet doesn’t mean the risks are not there. Operating system developers, device manufacturers and carriers all apply hardware and software configuration changes to create a unique ecosystem within mobile devices, which need to be protected to the same degree as desktops—with the added challenge of defending against cellular-based threats. Carriers and manufacturers work together to apply updates to devices over the air—and oftentimes without user approval or acknowledgement. Healthcare organizations should also consider whether their IT teams have approved the use of the latest and greatest social networking app that a carrier decided to install. These apps can automatically access contact lists and calendars. Some healthcare organizations have turned to a mobile device management (MDM) platform as a means to control device security. MDM platforms are appropriate for specific situations such as corporate-liable devices and kiosk/retail devices, but MDM platforms are not an option for all personally-owned devices. Those that are an option present tricky provisioning decisions. For example, if IT turns off wireless and 3G (or LTE), this may provide value by preventing an app from accessing healthcare e-mail accounts. But this approach also eliminates many of the benefits of smart devices that the staff needs to be productive. One specific situation for which MDM would not be an option is when healthcare organizations contract across multiple hospitals and doctors use their personal devices to access healthcare information at the different locations. MDM does not allow multiple agents/ profiles installed on devices. Another area where MDM fails is that it gives IT control over the entire device, including personal data. End users are becoming more and more uncomfortable with providing this level of control for their device to anyone else. 8 While deploying an MDM platform is a good first step for some situations in gaining a baseline level of control over the mobile health environment, this type of platform is not the best option for all situations. Focusing solely on devices still leaves many risks exposed. To describe it a different way, organizations effectively have zero control over the hardware and operating system, which leaves them to address issues at the application layer—as described in more detail below. Malicious and Poorly-Designed Applications Although the leading application marketplaces, such as the Apple® App Store™, have built-in application security checks, the level of access required by each application and the level of security each application provides varies widely. For example, many data collection processes used by mobile applications are not necessary—either asking for too much data access or gathering more data than they need. This creates more ways for malware to succeed in an attempted breach. Consider for a moment an app store receiving tens of thousands of submissions per week; it is nearly impossible to vet every application for complete security. Even with automation, threats can be missed. Some malicious application developers even understand how the vetting system works and build their applications to by-pass the checks. They turn off the malicious code segments while running within the automated environment and turn on the malicious code segment when running in production—well after the app store has let it into the wild. Some healthcare organizations have tried to combat malicious and poorly-designed applications by deploying a mobile application management platform (MAM) or some other form of enterprise app store. Many find this is a good next step in which some additional and critical control is gained over the application layer across the mobile health environment via app whitelisting or blacklisting. Network Access and Cloud Environments As the number of mobile users increases, and as carrier data access costs remain high, users are accessing the Internet more often via free, public-access Wi-Fi hot spots. The number of hot spots that have emerged exponentially in recent years adds to the amount of time healthcare users are spending on these networks, which are often left wide open to attack. These developments have dramatically increased the number of opportunities hackers have to gain access to healthcare networks and the information they host. When hackers gain shared network access via a vulnerable device connected through an insecure Wi-Fi hot spot, a cellular network or VPN, they can establish rogue access points that enable eavesdropping, device compromise, or even malicious code injection on a healthcare network. 6 APPLICATION CONTAINER-BASED COLLABORATION TO ENABLE SECURE MOBILE HEALTHCARE WORKFLOWS To ensure the security of applications and data, many healthcare organizations have deployed Good Dynamics® mobile platforms that manage data via authorized devices, which employ secure application containers and connect through highly-secure private networks. Ensuring security through encryption—while data is at rest within an application container and in motion when sent to/from devices via secure communication channels—allows healthcare entities to prove records have not been compromised. These are key criteria for complying with HIPPA, HITECH and other international regulations. The Good Technology™ secure container approach, which builds upon device-based MDM and application-oriented MAM capabilities, better enables BYOD by keeping organizational application activity and data seperate from personal activity. This allows organizations to successfully perform selective data wipes for healthcare information on devices without forcing personal data wipes. Healthcare organizations, independent software vendors, systems integrators, and in-house mobile application developers are able to leverage Good Dynamics® to build and deploy nearly any application as a securecontainerized mobile application in a cost-effective manner across multiple device platforms. Unlike other mobile enterprise application platforms, mobile application security platforms such as Good Dynamics® offer a ready-to-use security architecture that developers can utilize immediately to add dynamic security enhancements to apps without slowing development time. 9 Secure containers also provide the ability to protect data on any device—managed or not—without having to take on device management. For healthcare organizations relying on MDM, Good Dynamics® applications can provide an additional layer or protection. Organizations can safely segregate business information on personal BYOD devices and manage that information without touching personal data. Good Dynamics® Features for Securing Mobile Technologies Good Dynamics® provides an enterprise app store that provides end users with the consumer-like experiences (such as rating, reviewing and searching) that they’ve become accustomed to on their own devices. Good Dynamics® also provides enterprise level controls such as AD/LDAP integration and RBAC to the app store. Adding these capabilities to the unique features of Good Dynamics® allows healthcare organizations to deploy enterprise-class mobility solutions that secure and distribute apps while also providing control of the apps on any device: Policy Enforcement: IT is empowered to enforce over-the-air app-level security controls for jailbreak and root detection, password, lock/wipe, compliance, app-specific custom policies and data leak prevention (DLP) without requiring an app update. Shared Authentication: After authenticating into a Good Dynamics® app, users do not have to authenticate into any of the other Good Dynamics® apps because their credentials are validated against the master app. Secure Document Collaboration: Secure exchange of documents (such as trapping Open In/Open With/Save In) between Good Dynamics® apps ensures documents remain secure throughout entire workflows. Corporate data never spills into personal applications, even if both corporate and personal apps co-exist on the same device. Shared Services: Enables creation of apps that provide a secure print app published as a shared service. For example, if an iPadbased CAD design editor needs the ability to print, rather than write code for printing in the CAD-design editing doc, the shared print service published from the secure print app could be used instead. Custom App-Specific Policies: Gives developers the ability to define app-specific controls in an XML file. For example, if the same HR app makes tabs visible depending on the Active Directory membership of users, the HR director might see the admin tab while an employee might only see the view tab. Key Features of Secure Mobile Applications: In addition to establishing a container-based mobile application security platform that enables mobile applications to securely share information, healthcare organizations also need to consider the development of enterprise-ready applications to utilize the platform properly: • Business Intelligence • Healthcare • Cloud Storage • Instant Messaging/Presence • Document Editing/Annotation • Remote Desktop • Enterprise Resource Planning • Document Management: SharePoint®/File Access/Sync • Customer Relationship Management • Social Business • Finance • e-Printing/Cloud Printing Common Uses of Mobile Technology in Health Management: • Chronic Disease Care • Fitness Programs • Remote Monitoring • Care Team/Patient Communications • Medication Observance • Wellness Programs Applications such as these and others commercially developed for the healthcare industry as well as customapplications built to facilitate process flows must enable collaboration while following organizational security policies. When a mobile application security platform is deployed, healthcare organizations can then extract the tremendous value enabled by secure collaboration. 10 The Role of App-to-App Enablement: Containerized Good Dynamics®-enabled apps can securely access healthcare information (such as an x-ray image) and open the information in an image annotator so doctors and nurses can draw on the image. They can then save notes and the drawing before sending the annotated x-ray via a secure e-mail application. In a world of collaboration, the multiple parties that work together multiply the number of applications running across multiple devices. Data thus becomes ubiquitous throughout the environment so that keeping track of and securing all data is critical. As clinicians and other involved parties continue to shift to a “bring your own” approach so devices, applications, and cloud services can enable healthcare mobility, meeting the IT need for security and control becomes increasingly complex. Good Dynamics® helps meet this challenge by managing and securing apps and confidential data on every device—even those beyond enterprise control. Good Dynamics® can instantaneously embed military-grade encryption and policy-control capabilities into any application without significant development work. In addition, unique inter-app communication technology enables app-to-app secure workflows and sharing of services. With Good Dynamics®, healthcare organizations gain several capabilities so they can focus on managing their apps and data, without having to manage devices they don’t own: Share Information Safely: Enables access to confidential business information from any device without risking data loss. Collaborate Securely: Ensures constant information protection in collaborative workflows with app-to-app secure data exchange. Enable Policy Controls: Enforces application-level security controls for jailbreaks, root detection, passwords, OS requirements, application-specific custom policies, and data leak prevention. Leverage Extensive Application Ecosystem: Selects from a variety of off-the-shelf applications embedded with Good Dynamics to enable secure healthcare mobility. Containerize Any Application: Embeds policy controls within in-house custom applications. 7 ENSURING PATIENT PRIVACY WHILE DOCTORS AND NURSES FOCUS ON PATIENTS Regulatory requirements throughout the world are driving the medical profession to utilize electronic medical records throughout the entire health system. At the same time, nurses and doctors are leveraging tablets and other mobile devices to improve health management via improved workflows. This includes collecting and sharing patient vital signs; depicting treatments and procedures using patient x-rays; prescribing medications; and even collecting patient signatures. Healthcare practitioners now want the environment at their fingertips to improve the level of patient care they deliver by saving time collaborating with each other through simplified workflows that would otherwise be complex if managed separately. By relying on a secure, container-based mobile application security platform, such as Good Dynamics®, mobile app developers can secure the productivity-enhancing applications they develop for healthcare organizations without having to invest in and build out their own security infrastructure—or worse, opening up their existing infrastructure to risk by exposing mobility-enabling ports on the firewall or adding complexity by setting up mobility-enabling VPNs.Good Dynamics® offers the tools, VPN-eliminating infrastructures, and APIs that ensure developers meet the highest standards of security in applications across all devices and operating systems. By utilizing proven security libraries such as encryption, app-level controls, and Web-based monitoring tools, developers can leverage Good Dynamics® to dramatically speed the delivery of application development projects to include industry-leading levels of protection and compliance. This approach offers a unique level of security for the healthcare industry: By providing protection beyond the device level, developers can rapidly incorporate technology that containerizes data within mobile applications by wrapping a layer of protection around fielddeployed apps. 11 Doing so ensures patient privacy while doctors and nurses can focus more time on what matters most—their patients. By synchronizing Good Dynamics® with properly-developed applications that enable multiple business processes to work hand-in-hand, healthcare organizations can also ensure maximum staff productivity. 8 ABOUT GOOD TECHNOLOGY Mobility is here, and business is changing. Your employees need to be productive on devices they bring from home. And you need to provision, monitor, and secure the mobile apps and services that allow them to collaborate anytime, anywhere. It’s how people work now. Good Technology™ is transforming how mobile work gets done, through secure app-to-app workflows that include integrated email, communications, document management, business intelligence, social business, wireless printing, and more. We also offer complete enterprise mobility management solutions, including device, app, data, and service management; as well as analytics and reporting. We complete our stack with professional services that include mobile deployment rollouts, BYO onboarding constructs, and platform transition consulting. Only Good™ offers a complete mobile solution that puts IT back in control. All of Good Technology’s secure solutions work to keep employees productive and corporate and personal data secure, and accessible. Established in 1996 and headquartered in Sunnyvale, California, Good Technology’s services are used by 4000+ major organizations worldwide, including more than half of the Fortune® 100. Good Technology™ has partnerships with industry leaders including Apple®, Google®, LG®, HTC®, Microsoft®, Nokia® and leading systems integrators. Want to know more? Visit good.com. Global Headquarters +1 408 212 7500 (main) +1 866 7 BE GOOD (sales) EMEA Headquarters +44 (0) 20 7845 5300 Asia / Pacific Headquarters +1 300 BE GOOD ©2014 Good Technology Corporation and its related entities. All use is subject to license terms posted at www.good.com/legal. All rights reserved. GOOD, GOOD TECHNOLOGY, the GOOD logo, GOOD FOR ENTERPRISE, GOOD FOR GOVERNMENT, GOOD FOR YOU, GOOD DYNAMICS, SECURED BY GOOD, GOOD MOBILE MANAGER, GOOD CONNECT, GOOD SHARE, GOOD VAULT and GOOD DYNAMICS APPKINETICS are trademarks of Good Technology Corporation and its related entities. All third-party trademarks, trade names, or service marks may be claimed as the property of their respective owners. Good’s technology and products are protected by issued and pending U.S. and foreign patents. 06/14 12
© Copyright 2024