Healthcare About DRIS Data can fundamentally transform the future of healthcare. The challenge however, is to free data from the silos in which it exists. DRIS, not only helps decommission legacy technology and consolidate data, but also mitigates the challenge of accessing data from disparate systems. Find the Right Balance Between Care and Costs CITI Healthcare’s Data Retention & Interoperability Solution - DRIS, has been designed to decommission legacy applications, resulting in reduced operational costs. DRIS is the right choice for organizations grappling with the rising costs of maintaining legacy applications, while trying to provide better health outcomes and experiences. Key Features • HIPAA Compliant • Patient In-Context Integration with Most EHRs • Database Agnostic to be Agile • On Premise, Cloud and Hybrid Hosting • AR Work-Down, Audit Logs and ROI Reporting • Supports multiple EMPI models • Dev-Ops and Agile Augmented Methodologies Multi-modular Architecture Advantage Archive and Retrieve Data Faster DRIS is a HIPAA compliant, standards-based, light-weight, vendor-neutral, and comprehensive repository. It is designed to archive electronic Protected Health Information (PHI) from all major enterprise databases, including; clinical, financial, human resources, payroll, ancillary payer, documents, images, and ERP applications. DRIS uses the Data Lakes ‘store-everything’ approach to allow for the storage and quick retrieval of large sets of diverse data types, which can then be processed by open sourced frameworks such as Hadoop. Access Data When It Matters Most DRIS allows the data to be viewed within the EHR at the point of care through its simple yet rich graphical user interface (GUI). An integrated document viewer enables viewing documents and images in various formats such as PDF, JPG, PNG, TIFF, RTF etc. DRIS also has a built-in scanning and OCR feature, and can generate PDF (PAMI) and CCDA documents from clinical information. Roles and authorizations can be customized to allow clinicians access to relevant data through their EHR, while other users such as HIM and Legal can access it directly. DRIS also makes it easy to generate reports, run queries, make parameter changes, and add filters to visualize the data, while complex processing runs in the background. DRIS Return on Investment State and local About Unify Endorsed by child welfare experts, Unify is an experience and outcome focused, deployment ready, Child Welfare solution powered by the EBMS platform. A paradigm shift in child welfare Unify addresses federal CCWIS requirements, and delivers efficiencies to Child Welfare agencies in rapid time. Unify accelerates improved outcomes through the rapid deployment power of a COTS solution. Unify is supported by a foundational and scalable HHS platform designed specifically for HHS business needs. Unify can be easily extended to other welfare domains such as Juvenile and Adult Services. Unify is platform agnostic and supports business and technology roadmaps. 3600 View of Child and Family Services Features • Deployment-ready COTS Solution • Built on a foundation of Core Domain Experience gained from deep collaboration with customers and Child Welfare Subject Matter Experts. • Complete Lifecycle Case Management - from Intake to Post Permanency / Adoption • Supports all business processes in Juvenile Justice and Adult Service Programs as well • Offers complete Modularity, Interoperability and Mobility • Superior UX developed with Child Welfare Practitioners for Child Welfare Practice • Capture and Integrate Data from all Systems • Integrate with Data Exchange Partners HHS Solutioning Drivers Identity management About manageID® manageID® is the complete identity, access management, and governance solution which securely controls digital personas, credentials, and access entitlements associated with every organizational identity. manageID® enables securely authenticated access to information resources and physical assets, all from an integrated service that makes it easy to provision and manage information. manageID® will help your organization • Focus on Your Business • Expedite Cloud Adoption • Achieve Business Agility • Optimize Manpower • Leverage Investment • Enhance Security Posture Features Identity Management manageID® provides comprehensive identity management capabilities for your organization’s IAM requirement. Identity Provisioning Our solution delivers the flexibility of multiple methods for identity creation. manageID® has built-in support for HR driven, sponsor initiated, self-service, API, and JIT/Claim-based initial provisioning of digital identities and supports provisioning of identities within downstream systems. Identity Assurance Our solution supports NIST 800-63A Identity Assurance Levels (IAL) 1 - 3 and meets assurance requirements for various types of identities. It allows for the capture/collection of demographic and biometric identity attributes to support any organization specific requirements. Standard Connector Leverage identity data and attributes from any data source such as HR (PeopleSoft, Workday etc.), Active Directory/LDAP, SQL, etc. with built-in interfaces. Use built-in APIs for any custom integration with data sources. Concurrently connect with multiple data sources to meet organizational integration requirements. Identity Data Management Connect with multiple data sources and downstream systems to create/update identity data attributes based on organization specific configurations. Promote the solution to become the authoritative data source for defined attributes and support identity data de-duplication/reconciliation based on pre-defined sets of attributes. Collaborative Workflow Leverage built-in workflow capabilities and templates to quickly configure support for any identity management related business processes. Support workflows for various types of identity (constituents) managed within the solution. Rules Engine Automate the identity and lifecycle management processes via business rules that can be configured to meet organization specific requirements for automation. Rules are configured by business domain users and do not require any custom development and scripting support from technical staff. Credential Management manageID® supports the creation and lifecycle management of credentials assigned to a digital identity. Each identity can be assigned multiple credentials based on the needs of the organization. User ID / Password Create and manage user ID/password-based credentials in Active Directory and other LDAP compliant directories, and enforce password policies for an organization. Digital Certificates / PIV-C Generate, encode, and issue PKI technology based credentials such as PIV and PIV-C tokens, as well as user and device certificates. Connect with industry leading PKI platforms and services via vendor-approved built-in connectors. Hardware Tokens Utilize built-in connectors to industry leading hardware token systems that offer OTP/Oauth functionality. Our solution includes comprehensive capabilities to manage token stock and enables or disable access, based on assignment and lifecycle stages. Physical Access Control Cards Integrate with leading Physical Access Control Systems (PACS) to provision identity and enable physical access via assignment of access levels. Automate the initial provisioning and lifecycle management of the PACS credential. Support various data formats for PACS credentials such as Proximity, DESFire EV1, EV2, SEOS, etc. Mobile / Derived Credentials Issue and manage PKI technology-based strong credentials derived on mobile devices associated with users. The derived credentials can be used to authenticate and allow access to information assets, and can be derived onto non-mobile devices such as TPM chips on Windows machines. Third Party Authentication Service Use built-in connectors with several third-party authentication products and services to provision and manage credentials within the application. Our solution can co-exist with existing products and services that may be in use within an organization. Access Management Manage access to all organizational information resources and physical assets via built-in access entitlement management capabilities. An organization can manage any number of external systems and physical access systems to control access for all types of users • Support NIST 800-63B-based Authentication Assurance Levels (AAL) 1-3. • Leverage our solution to configure and enforce organizational access policies. • Manage multiple external relying systems for enabling access entitlements. Utilize built-in connectors for several relying systems for access assignment updates. • Includes workflow for access request and approval with configurable levels of automation based on organization specific needs. • Automate account and access provisioning in downstream systems and services. • Enable authentication and authorization services via built-in MFA/SSO component, or integration with existing product and services. Support NIST 800-63B based Authentication Assurance Levels (AAL) 1-3. Lifecycle Management manageID® includes functionality to control the entire lifecycle for an identity as it progresses, from establishing the identity to termination and archival of the identity record. During this process, the solution orchestrates the relationships between identities, and all of the linked, underlying credentials and access. • Policy-based lifecycle actions for identity, credential, and access attribute updates. • Solution provides a person-centric view of the digital identity, credentials, and access entitlements. • Self-service, helpdesk, and admin functionality for lifecycle management of the identities credentials, and access. Governance manageID® includes built-in functionality to configure and implement identity and access governance processes. The configuration and transactional audit data regarding identity access entitlements and relying systems is leveraged for this purpose. • Configure business processes for access attestation/ certification in support of organizational risk management processes. • Create and deliver person, application (software or hardware relying system), or (sub-)organization-based attestation reports. • Automate workflows for attestation processes including task assignments, etc. • Automate access lifecycle updates based on business rules configured for the organization. Key Benefits manageID® ICAM/IGA provides a collection of business, functional, technical, and security benefi ts for any organization, bred from CITI’s comprehensive business practices based in identity, credential, and access activities over the past 15 years. The modular architecture and high level of configuration makes the manageID® solution ideal for any organization. The benefits listed are common amongst all organizations that have chosen to use manageID® to revamp their ICAM/IGA implementation. Enhanced User Experience The manageID® solution provides an enhanced user experience which allows the user to: • Access a self-service portal to reset passwords, change security questions, recover accounts, and request further access. • Access custom login page based on organizational assignment. • View a custom user dashboard to access applications and resources based on organizational assignments. • View online help tips for user functionalities. Business Benefits The manageID® solution from the offset offers several business benefits which include: • Offloading identity, credential, and access management to experts to focus on core business capabilities, transferring business and security risk. • Minimizing startup costs by providing subscription-based modular pricing per functionality. • Reducing manpower requirements to provision and support identity, credential, and access management capabilities. • Adapting to changing business and regulatory environments, e.g. acquisitions, change in regulations, etc. • Supporting business initiatives to modernize IT and adopt cloud services. • Minimizing rip-and-replace methodology and gradually migrate to this solution. Enhanced Security Posture The manageID® solution helps organizations enhance their information security management and business risk posture. Features that deliver a high level of security assurance include: • Creating and enabling the use of strong (PKI) credentials for user authentication. • Providing authorized users with a comprehensive auditing platform for reporting and analysis. • Real-time visibility into organizational access entitlements including lifecycle updates. • Minimizing risk associated with manual enforcement of policies related to account and access provisioning/de-provisioning.
© Creative Information Technology, Inc. All rights reserved.