Ensure Technologies Makes Proximity-Based Authentication Available in Epic Software

Ann Arbor, Mich.-based Ensure Technologies, an industry leader in providing intelligent access control solutions for healthcare, announced that its XyLoc MD solution has been directly integrated into Epic Systems Corporation's software.

Direct integration with the XyLoc MD system will be supported to deliver convenient, full-time access control, and simplified sign on for clinical users. The award-winning XyLoc MD system is unique in its ability to address complex security requirements while providing users with a convenient and easy-to-use solution.

The XyLoc MD system incorporates active Radio Frequency Identification (RFID) badges that communicate with proximity detection hardware and sophisticated software residing on each secured workstation. A secured clinical computer is unlocked only after XyLoc has identified and authenticated the user. Once a user is authenticated, they are given instant access into the system. Even more significantly, the integrated solution delivers fast and fully audited change of control, because the XyLoc continuously monitors for the presence of authorized users.

"We knew that several of Epic's existing customers were interested in using our proximity-based authentication system to address HIPAA security regulations, so we were delighted to partner on this integration effort," said David Shook, executive vice president of Ensure Technologies. "We are confident that users will appreciate the balance of security and convenience that XyLoc provides in often busy but security conscious healthcare environment."

XyLoc MD provides full-time access control to PCs and thin client terminals, continuously authorizing users without burdening them with cumbersome security protocols. Its patented technology protects confidential patient data when it is most vulnerable - after logon, whenever the authorized user steps away. Users in XyLoc MD-protected facilities have immediate access to their applications and data and their workstations are automatically secured the moment they step away.