search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
PRODUCTS & SERVICES


tracking solutions to be deployed in a more cost-effective manner than other solutions. With our cloud platform we can collect and analyze data from hundreds of locations in real-time, enabling healthcare organizations to proac- tively locate and manage valuable assets and supplies in the value chain.”


Adam Peck, Vice President, Marketing, CenTrak Inc., Newtown, PA


“CenTrak’s combination of technologies, which combines Second Generation Infrared (Gen2IR), Wi-Fi, Bluetooth Low Energy (BLE), Active-UHF, Passive-UHF, and Low Fre- quency (LF), provides a platform for the most accurate and scalable asset tracking and management solution on the market. CenTrak’s patented Gen2IR technology delivers certainty-based location data with rapid update speeds specifically engineered to handle today’s healthcare envi- ronment. Gen2IR will not pass through walls and it does not suffer from line-of-sight limitations. These devices can be positioned wherever location data is needed including rooms, hallways, bays, and even chairs or shelves — allow- ing for support of countless clinical application use cases, maximizing value and ROI. With CenTrak’s open platform, location information can then be effortlessly connected and streamed in real-time to our 130+ integrated solutions including Nurse Call, Electronic Medical Records, Capacity Management, Asset Management, Computerized Main- tenance Management, and Hand Hygiene applications. “While basic asset tracking and visibility is useful in


many healthcare applications, true asset management and clinical workflow automation cannot be confidently achieved without certainty-based locating. We are often asked, ‘is this solution accurate within (x number of) feet?’ However, it is important to understand that whether it is within one foot or 10, all of these accuracy ‘requirements’ still leave room for error. What healthcare facilities really need to know with 100 percent absolute certainty is if an asset, patient or staff member is in or out of the clinically meaningful zone they have defined. One foot can mean the difference between an IV pump in a patient’s room, out in the hallway, or in a soiled closet. This uncertainty makes it difficult to accurately manage PAR-levels or measure to improve asset utilization rates.”


Sandy Murti, Senior Director, Industry Solutions & Business Development, Impinj Inc., Seattle


“Impinj is a leading provider and pioneer of RAIN RFID solutions for identifying, locating and authenticating ev- eryday items. We work with partners and customers who use RAIN RFID technology to complement their RTLS asset management systems. RAIN RFID is an established wireless technology that is battery-free (i.e., passive) and represents a unified, global standard for RFID technology. “What does this mean for healthcare providers and RTLS


systems providers? In essence, RAIN RFID tags are much less expensive than many active RFID tags, yet can be read at distances of up to 30 feet by RAIN RFID reader systems. The low cost of these tags enables healthcare organizations to scale their asset management out to a broad range of asset types, different shapes, sizes and price points. For many healthcare organizations this can mean the differ- ence between tracking 1,000 assets or tracking tens of thousands of assets.”


From page 69


MURTI: “Should a RTLS system be compromised, providers should quickly implement their emergency security procedures. The provider should bring the RTLS system into a safe operating mode — this would mean temporarily shutting down access to external networks, such as the internet or third-party systems.”


Finally, how realistic is it to ensure RTLS systems are secure and “hack-proof” so to speak, knowing that not even biometrics (e.g., thumbprint, ocular, facial) truly is secure because the system creates and stores a file of the biometric image, which can be accessed by hackers? GEVA: “No system is 100 percent bulletproof, but the risks to RTLS systems can be managed and substantially mitigated through the technology and methodologies discussed earlier.” JACKSON: “Complying with industry cybersecurity standards, applying network and system controls and ensuring applications are security-coded are the mechanics RTLS vendors must employ to assist in deterring a malicious event. However, establishing a ‘hack-proof’ system relies on the healthcare organization to understand techniques that deter harmful events, as well as to adopt, govern, and execute policies and procedures that take cybersecurity seriously. By working in concert on limiting accessibility to the computing systems, the networks they reside upon, the applications that are running, along with the ongoing monitoring of each, healthcare entities can establish a solid defense against potential threats.” SULLIVAN: “No system is ‘hack-proof.’ By design, RTLS systems should consider what data they use and how that information is managed and protected. A good practice that helps ensure a compromised RTLS system carries little risk is to avoid duplicating data and keeping data separate until such time as it must be presented as information. Separating RTLS data from business/operations and personal data records whenever possible is also a good practice. Firewalls and data storage protections should also be employed. Also, network access policies should always be strictly enforced. Maintaining security is especially challenging as the capabilities to attack systems evolves along with the very technologies used to secure networks and RTLS systems. A simple and often overlooked part of an effective security solution involves the diligent management of system access to employees, contractors, consul- tants and other parties. Organizations that minimize potential risks will also minimize overall damage. CARNEY: “New hacks and cyberattack strategies arise every day, so even if a system has the ultimate security today, that’s not necessarily going to be true tomorrow. It’s imperative to evolve with criminal trends and tactics just as those criminals evolve with industry standards and developments. Keep up with best practices and modern technical tools for protecting data, stay abreast of the news, and ensure that all systems are patched in a prompt manner. Re- maining vigilant and alert is the best defense to a hack when combined with solid technology practices, inside and out of an RTLS system.” CANNELL: “Encompass uses Wi-Fi and thus inherits the security level of the hospital’s own network. However, by utilizing BLE beacons that only broadcast their MAC identifier, an extra level of security is achieved. There is no personal or private information included in the BLE broadcast packet, and the RTLS information is only achieved when the BLE beacon ID is matched via a prior knowledge to the asset information stored outside of the hospital infrastructure in the GE Microsoft Azure Cloud managed infrastructure. In the case of Encompass, security is achieved via the system architecture design and the latest wired and wireless security protocols.” MURTI: “One of the key principles of cyber security is to develop a system where it would be a more expensive and resource-intensive process for hack- ers than the benefit they could get out of the hack. This principle also applies to RTLS systems. The system should be designed so that the cost of hacking an RTLS system far exceeds the benefit.” HPN


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82