Resources

Case Study

WellSpan Health

Overview WellSpan selected Core Security’s Identity Governance & Administration Solution to ensure that access to information, buildings and systems were given to the right people at the right time. Key Results Include: Increased operational efficiency and transparency Strengthened security Improved compliance Delivering fast time to value and the lowest total cost of ownership ...
Case Study

West Midlands Police

Overview West Midlands Police selected the Core Access Assurance Suite to ensure that access to information, buildings, and systems were given to the right people at the right time. Key Results: Increased operational efficiency and transparency Strengthened security Improved compliance Delivering fast time to value and the lowest total cost of ownership ...
Case Study

Large Health System Turns to Core Privileged Access Manager (BoKS) for Server Management & System Security

Overview A leading not-for-profit health system in the United States, with multiple hospitals, rehabilitation centers, physician clinics, mental health facilities, independent living centers, and home health agencies, employs more than 9,000 individuals, including nearly 1,400 physicians. Collectively, the entities within the healthcare organization also maintain more than 1,500 licensed beds...
Case Study

U.S. Government Laboratory

Overview Core Impact helped this U.S. Government Lab: Compliment vulnerability scanning Prepare for security audits Test end-user security awareness
Case Study

Cigna-HealthSpring

Overview Cigna-HealthSpring chose Core Security to help the organization focus on maintaining compliance with federal regulations such as HIPAA, HITECH and SarbanesOxley while automating the user access process. With Compliance and Access Request, CignaHealthSpring can now: Automate manual user access review processes Easily analyze, review and certify user access enterprise-wide Protect...
Blog

Are you prepared for DFARS?

For several years the Department of Defense (DoD) has been focused on protecting controlled and unclassified information. Seven years ago, around November 2010, the White House issued Executive Order 13556 that established an open and consistent program across all civilian and defense agencies for managing information. The issue this Executive Order was trying to rectify was that departments...
Blog

Healthcare’s Unique Cyber Security Challenges

It’s no secret that healthcare organizations are constantly in the crosshairs of cyber criminals. One of the reasons healthcare records are 30 times more valuable than financial records is because they contain full identity profiles – including your social security number which is the gateway to acquiring any and all of your personal information. According to data gathered by the United States...
Guide

Doing Healthcare Identity Governance Right

Healthcare Organizations Face Extraordinary Challenges in a Dynamic, Complex Landscape During the last two decades, the healthcare industry has seen increasing regulations, an acceleration of technology, consolidation, and the pressure to increase operational efficiencies and decrease overall costs, while meeting growing patient demands. Addressing these issues, while staying focused on delivering...