Encryption & Key Management , Next-Generation Technologies & Secure Development , Security Operations
A 'Containerized' Approach to Encryption
Jonathan Cohen of Synchronoss on Security for BYOD EnvironmentWhen physicians and nurses use their own mobile devices to access clinical information and communicate with patients, an advanced form of encryption can help ensure all sensitive data remains secure, says Jonathan Cohen of Synchronoss.
See Also: Securing Your Business Begins with Password Security
The "containerized" encryption approach doesn't require control of the device itself or the use of a device management system, Cohen explains. "If you take a containerized approach, you're able to orchestrate workflow interactions between different applications," he says.
For example, if a clinician is populating an electronic case report form and then wants to contact the patient, if both the messaging application and case report application have been containerized, then all communication can happen within the container, fully encrypted in motion and at rest, Cohen says.
In this video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Cohen describes:
- The role of containerization in protecting intellectual property and PHI;
- How to ensure security in a BYOD environment;
- How the containerized approach to encryption can help with HIPAA compliance.
Cohen is vice president of strategy and corporate development in the enterprise business unit at Synchronoss. He has 22 years of IT strategy and solution management experience, focused on developing transformational technology solutions for enterprise clients in finance, healthcare, and life science industries. Previously, Cohen was the Americas lead for application transformation at EMC Global Services and held consulting leadership roles at BusinessEdge Solutions and Paragon Computer Professionals.