IT Vortex - Managed IT Services

Epic and Workspace ONE Come Together to Secure Patient Data

Mobile technologies have dramatically changed the operational efficiency and quality of patient care provided by clinical staff at hospitals all over the world. Now, healthcare providers are turning their attention to how these technologies can improve the patient experience. With Workspace ONE and Epic, mobile experiences are more secure for patients and more automated for clinicians, with zero additional cost or overhead for IT.

What is the need?

Many pioneers of patient experience have already deployed iPads and other mobile devices in their hospitals for patients to use during their stay. These devices give patients access to critical information such as medical records, their current care plan, and even meal selection in apps like Epic’s MyChart Bedside.

However, these devices can go one step further by providing a modern and familiar experience for communication and entertainment. Whether it’s chatting with friends on WhatsApp, dancing to victory in Fortnite, or streaming the latest episode of Netflix’s Stranger Things, access to Apple’s App Store or Google’s Play Store lets patients tailor their mobile experience.

What are the challenges?

With this degree of freedom surrounding the patient experience, users are likely to add sensitive and private data to these devices. Organizations must remove this data the instant the patient leaves the hospital. Any time a device is left unattended is a chance for a malicious actor to gain access to the data. This risk introduces two significant technical problems that must be solved in order to offer a truly secure experience for patients.

  1. How do hospitals thoroughly remove all patient data from a device without disrupting the day-to-day operations of nurses and staff?
  2. How do we ensure patient data removal is as close to the patient’s real-time exit or discharge from the hospital as possible?

Where do current solutions fall short?

Current market solutions typically solve one of the two problems listed and add unwanted complexity and rigidity to mobile deployments. The most common form of these solutions is middle-man listeners. Middle-man listeners are automated but require complex integrations to function, including a middle-man server that ingests a hospital’s EMR activity feed and “listens” for patient discharge messages. Once the listener identifies a discharge, it calls an API of the device’s EMM provider to wipe a device. However, since the EMM provider does not know the patient’s information, the listener must rely on a pre-configured value, often a room number, to know which device to wipe. This limits portability because it can’t allow for things like room transfers or inadvertent device relocation, resulting in a rigid, constricted solution. In addition, beyond standing up a new server, IT also has to manually pre-configure new and moving devices.

What is Epic + Workspace ONE’s solution?

As of Epic’s 2019 August release, Workspace ONE now integrates directly with Epic’s systems and MyChart Bedside app to perform over-the-air device wipes for patient devices. Hospitals do not need to send their EMR activity containing patient data to a middle-man server to initiate a device wipe. The integration of Epic and Workspace ONE lets Epic systems directly call Workspace ONE APIs to wipe a patient’s mobile device immediately after a patient has been discharged or transferred.

This solution also makes it easy to identify which device to wipe since Epic securely stores all patient data alongside the device identifiers. Users can move freely about the hospital with the same device because there’s no need to pre-configure devices with a room number or other identifier. With this powerful improvement, patients can enjoy mobile devices during their stay with the assurance that upon discharge, the system will remove all their sensitive data.

To take this one step further, Workspace ONE and Epic customers can deploy tethered solutions to automate the re-configuring of mobile devices for the next patient that is admitted. These solutions are extremely reliable and offer the unique advantage of restoring the device fully back to the home screen with cached apps installed.

Epic’s innovation is a significant step in providing a world-class patient experience. By leveraging the industries greatest mobile technologies and solutions from healthcare leaders like Epic, Workspace ONE empowers healthcare providers to inform, entertain and protect patients on their journey back to health.

Share this post

questions about our services?

Request a free consultation. Fill out the form and we will call you to answer all your questions



Tech Tips, Cyber Threat Mitigation, Cutting Edge Technology, Cost Savings and More!



 

IT Vortex, LLC is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. You will consent to us contacting you for this purpose, by submitting the form.

Apply for this position

Fill out the form below and our hiring team will reach out to you as soon as possible



zoom-logo

We use Zoom extensively to meet internally and externally. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

wasabi logo

Wasabi is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

vmware logo

Our Datacenter is built on a VMWare architecture. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation. 

veeam green logo

Veeam is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Trend Micro Logo
Solarwinds Logo

Solarwinds is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Proofpoint essentials Logo

Fortinet is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

observe IT Logo

ObserveIT/Fortinet is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

NEAT Logo

We use NEAT extensively in our offices. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

mitel logo

Our telephone platform of choice. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

microsoft logo

Various Microsoft technologies are offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation. 

ingram micro cloud logo

Our distribution preferred partner for our technology offerings.

Fortinet logo

Fortinet is offered in our Cloud Hosting Platform? We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

DTEN logo

We use DTEN extensively in our offices. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Dropbox logo

We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Dell logo

Dell servers are a key component offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Condusiv Technologies logo

Condusiv Technology is offered in our Cloud Hosting Platform? We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Cisco logo

Cisco Technology is offered in our Cloud Hosting Platform via DUO for MFA. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Barracuda Logo

Barracuda Technology is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Amazon_Web_Services_Logo

IT Vortex partners with AWS via VMware for the VMware on AWS offering that allows for cloud services fulfillment via AWS utilizing the same VMware products many companies already enjoy the benefits from.

ACTI Logo

Technology Reseller and Distributor, Certified Implementation Expertise with all ACTi products and services. IT Vortex has worked with ACTi for over a decade implementing security camera solutions for a multitude of industries with AI, Facial Recognition, License Plate Recognition, Loitering Detection, Cloud storage, and more.

questions about our services?

Request a free consultation. Fill out the form and we will call you to answer all your questions



microsoft logo

Name of the partner

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco

Security as a Service (SECaaS) by IT Vortex

Pricing Calculator

Choose a service, answer a few simple questions, and receive an individual quote for our services

User count by type

Fill out the form and we will call you to answer all your questions