X

Request a Demo

"If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked."

Richard Clarke | White House Cybersecurity Advisor

Established in 1996, the Health Insurance Portability Act (HIPAA) sets national standards for securing electronic protected health information (ePHI). When the information is being collected, processed, stored or exchanged by covered entities or business associates, they are required to:

Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed. - 164.312(d) Technical Safeguards of the Security Standards for the Protection of ePHI, HHS.gov

Multifactor authentication (MFA) is a newer approach to the traditional username and password method of securing accounts and systems. MFA requires 2 or more key factors: something only the user knows (a password or PIN), something the user has (smartphone or hardware token), and something the user is (identity, which can be verified by fingerprint or other biometrics).

Duo Security

Duo Security is the industry leader in cloud based MFA and is trusted by more than 5,000 companies around the world. They provide applications for all recent smartphones and devices, talk and text options, as well as more traditional token-based solutions that work for organizations in any industry and size.

User Enrollment

Immense Analytics offers a customizable enrollment process to integrate existing user management systems, including Active Directory, with Duo multifactor authentication. Our enrollment portal can be added to any intranet site or cloud hosted for no additional charge.

MFA HelpDesk

Give your existing IT help desk staff the tools they need to assist users with their multifactor authentication account. Our easy to use interface allows authorized support agents to verify a user's identity and help get them up and running quickly if they're having trouble.

The HelpDesk software allows the search of your Active Directory users, and can determine if the user has a valid MFA account and create one if needed. From the user account overview devices, including tokens, can be added, modified and deleted. Temporary bypass can be granted for immediate access situations, with automatic reversion. All support agent actions are logged for future review in formats compatible with major log aggregation and analysis systems. Request a free interactive demo today.

Identity Management

Securing accounts from unauthorized access is important to network security. But equally as vital and often overlooked is identity management - ensuring users only have access to systems and information essential to their jobs. Dormant accounts that belonged to former or reassigned employees also present a vector for infiltration that can be undetectable until it's too late.

Whether you've inherited a legacy bloated user management system or are transitioning to a modern cloud based one, Immense Analytics can assist you in identifying dormant accounts, setting up user access policies and tying in the latest in multifactor authentication.

Interested in an interactive demo?

Request One