PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
November 2003

Four steps to ensure security deployment success

Sharp HealthCare prides itself on being at the forefront of technological adoption, with five campuses and 1,300 doctors connected on a network that's rated among the nation's best. So when Sharp CIO Bill Spooner led a major initiative to both boost security and increase physician computer use with a combination of biometrics and passwords, he was aware of the pitfalls. After interviewing vendors and making its choices, San Diego-based Sharp found the road to progress still marked with unexpected potholes, namely tying together disparate systems with different security features. "We may have gone into it a bit more naively than we should have," Spooner says. "We didn't recognize the complexity from day one." Sharp tapped Courion to handle its identity management and has been able to unite a network system that includes Linux software, a Unix platform and a plethora of specific applications from nurse charting programs to patient tracking software, each with its own security features. With even the most basic security deployment ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue