SlideShare una empresa de Scribd logo
1 de 19
Future-ready Healthcare 
IT Platforms: 
Get to the Cloud 
Andrew Litt, MD, Chief Medical Officer, 
Dell Healthcare and Life sciences 
2013
Panelist 
David Tomlinson 
CIO/CFO; 
Centegra 
2013 
Bill Russell 
CIO; 
St. Joseph Health 
Ismelda Garza 
IT Director; 
Comanche 
County Medical 
Center
Moving beyond the cloud hype 
Enterprise 
cloud 
application 
revenues 
reached $22.9B 
in 2011 and are 
projected to 
reach$67.3B by 
2016. 
Current 
Usage 
2013 
60% of 
server 
workloads 
will be 
virtualized 
by 2014. 
Global cloud 
traffic will account 
for nearly two-thirds 
of total data 
center traffic by 
2016. 
Today 46% of 
business data 
stored outside 
of internal IT 
structures. 
Over the past 
three years 
nearly 74% of 
data centers 
increased 
physical 
server count. 
IaaS cloud 
management & 
security and PaaS 
are growing from 
$7.6B in 2011 
to $35.5B in 2016. 
24% 
37% 
39% 
Hybrid 
Private 
Public 
Projected Market Spend of 
$241 Billion 
by 2020 
Source: Dell Customer Research, April 2013
Industry adoption varies 
Advanced Heavy Moderate Measured Lagging Gartner 
2013 
Adopting 
Private cloud PaaS and IaaS 
Community cloud and service providers 
Community cloud and SaaS 
Email and collaboration 
Panicky migration from vendor to provider 
Not much happening 
Public records, medical processes 
Industry 
Financial services 
Telecommunications 
Government 
Education 
High tech 
Energy and utilities 
Healthcare 
Retail Brokerage and messaging integration
Healthcare 
transformation 
in the cloud 
2013 
Healthcare and Life Sciences
Changing healthcare landscape 
2013 
Traditional IT still dominant 
41.8% of a healthcare 
organization's IT budget is 
allocated to traditional IT 
deployment 
2013 
2017 
Cloud IT multi $B market 
Although adoption is held back by 
regulatory initiatives and security 
concerns, the cloud market in 
healthcare is expected to grow to 
$5.4 billion by 2017 
2015 
Cloud IT growth accelerates 
Within two years' time traditional IT budget 
will decrease to 35.4%. Use of public cloud 
services will increase from 12.6% to 15.8%
Impediments to cloud adoption for 
healthcare providers 
Concerns that cloud providers will not continue to innovate 
Have not identified what our exit plan for cloud would be 
Have concerns about cross-border rules 
Have not yet created a service catalog for cloud services 
Unclear future and roadmap for cloud services 
No end-to-end service management strategy 
2013 
40 
28.4 
20.5 
17.4 
11.3 
11.8 
14.1 
7 
Have not yet developed a cloud roadmap 
Concerns over security and availability 
Source: IDC's Global Technology and Industry Research Organization IT Survey, 2012 
(% of respondents)
Multiple regulatory requirements 
HIPA HITECH MEANINGFUL 
Health Insurance 
Portability and 
Accountability Act (1996) 
Security rules 
• 45 CFR 160 
• 45 CFR 162 
• 45 CFR 164 
2013 
USE 
American Recovery and 
Reinvestment Act – Health 
Information Technology 
for Economic and Clinical 
Health (2009) 
HIPAA Security Rule Plus 
• New civil money penalties for 
violations 
• Covered entities and business 
associates must comply 
• Breach notification obligation for 
breaches on or after Sept. 2009 
Meaningful Use (2010) 
Risk Analysis 
• 45 CFR 164.308 (a) (1) 
• Core Measure 15
How can audits and penalties impact you 
2013 
Breach 
Notification Rule 
KPMG contract: 
Audits of 150 
hospitals 
Fines and 
penalties
Challenges = cloud opportunity 
Improve quality 
of care 
Reduce costs 
2013 
Operate 
under high 
regulations 
Effectively 
manage 
IT resources
Why Cloud? 
Secure Flexible Simple 
2013 
• Manage specific 
environment on customer 
behalf 
• Facilitate aggressive 
implementation schedules 
• SLA easy to understand 
and implement (99.95% 
uptime) 
• Free up hospital IT 
resources to focus on 
service delivery and 
application 
implementation 
• Expect predictable outcomes 
with a choice of service levels 
for operational availability. 
• Choose disaster recovery 
options that allow you to 
meet Recovery Point 
Objectives and Recovery 
Time Objectives 
• Select add-on solution 
options to fulfill your specific 
requirements 
• Reliable & secure ISB 
backup, recovery, and tape 
administration 
• Highly secure and reliable 
network connectivity 
options offer HIPAA-compliant 
data encryption 
• System monitoring 
• Pre-defined server 
availability levels 
• Standard data administration 
procedures and tools
Dell cloud strategy for healthcare 
Hospitals Physicians Payers Life Science 
2013 
Healthcare cloud platform 
Strategic Pillars 
Establish an 
Interoperability 
Network connecting 
Healthcare 
Constituents 
Develop a Next 
Generation delivery 
mechanism based on a 
secure Cloud Platform 
that support derivative 
data driven solutions 
Integrate Current and 
Future Solutions 
through the cloud to 
deploy at scale 
1 
2 
Archiving & 
Storage 
Reporting 
& Alerting 
Healthcare solutions 
Analytics 3 
Other 
Electronic 
Medical 
Records 
Revenue 
Cycle 
Services 
Payers 
Solutions 
Data Management Security 
Other 
Mobility Interoperability
Dell Healthcare in the Cloud 
50+ 29B 
customers supported 
with cloud-based HIS 
and DR 
650,000+ 
2013 
6B+ 
diagnostic image objects 
managed by Dell in the 
cloud. Protecting medical 
images for 7% of US 
Population 
Security events 
MEDITECH 
Processed daily by 
Dell SecureWorks, a 
core component of 
the Dell Cloud 
Integration processes 
Per day with Dell Boomi, 
over 3Xs our nearest 
competitor 
1st 
To market with 
the Dell 
OpenStack 
Solution 
More EMRs supported in a 
secure dedicated 
Healthcare Cloud than any 
other healthcare IT 
services provider 
$200M 
Dell achieved this by 
virtualizing 10,000 servers 
and reducing applications 
from 7,000 to less than 
2,500 
Dell’s Crowbar 
deployment, management 
and services 
saved by Dell 
400K 
physicians and 500 
individual 
practices 
supported by Dell’s 
physician hosting 
cloud solution
David 
Tomlinson, 
CIO/CFO 
Centegra 
2013
Bill Russell, CIO 
St. Joseph 
Health, 
2013
Ismelda Garza; 
IT Director 
Comanche 
County Medical 
Center 
2013
2013 
Q&A
Let’s get 
started 
2013 
Visit the Solution Showcase to see our end-to- 
end healthcare solutions and services 
Gain hands on experience, see 
demonstrations at the Solution Showcase 
Schedule a visit to a Dell Solution Center 
near you: 
Austin • New York City • Washington D.C. 
Chicago • Santa Clara • Mexico City • Sao 
Paolo 
Go to www.Dell.com/healthcare
2013

Más contenido relacionado

La actualidad más candente

Cloud Computing Stats - Cloud for Healthcare
Cloud Computing Stats - Cloud for HealthcareCloud Computing Stats - Cloud for Healthcare
Cloud Computing Stats - Cloud for HealthcareRapidScale
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
 
A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...cloud100
 
Healthcare in the Clouds
Healthcare in the CloudsHealthcare in the Clouds
Healthcare in the CloudsGail Wilcox
 
The Rise of Hybrid IT
The Rise of Hybrid ITThe Rise of Hybrid IT
The Rise of Hybrid ITInterxion
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudeDiscoveryConsultant
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
 
10 Tech Trends in Healthcare
10 Tech Trends in Healthcare10 Tech Trends in Healthcare
10 Tech Trends in HealthcareExtreme Networks
 
Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017InterQuest Group
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureJerry Fahrni
 
Harnessing and securing cloud in patient health monitoring
Harnessing and securing cloud in patient health monitoringHarnessing and securing cloud in patient health monitoring
Harnessing and securing cloud in patient health monitoringAshok Rangaswamy
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...Ajeet Singh
 
DriCloud. Cloud based Electronic Medical Record
DriCloud. Cloud based Electronic Medical RecordDriCloud. Cloud based Electronic Medical Record
DriCloud. Cloud based Electronic Medical Recorddricloud
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutionsxband
 
Cloud Methodology and Facts
Cloud Methodology and FactsCloud Methodology and Facts
Cloud Methodology and FactsCSI Solutions
 
IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IJECEIAES
 

La actualidad más candente (20)

Cloud Computing Stats - Cloud for Healthcare
Cloud Computing Stats - Cloud for HealthcareCloud Computing Stats - Cloud for Healthcare
Cloud Computing Stats - Cloud for Healthcare
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...
 
Healthcare in the Clouds
Healthcare in the CloudsHealthcare in the Clouds
Healthcare in the Clouds
 
Cloud computing in healthcare
Cloud computing in healthcareCloud computing in healthcare
Cloud computing in healthcare
 
The Rise of Hybrid IT
The Rise of Hybrid ITThe Rise of Hybrid IT
The Rise of Hybrid IT
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
 
Accenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po VAccenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po V
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
10 Tech Trends in Healthcare
10 Tech Trends in Healthcare10 Tech Trends in Healthcare
10 Tech Trends in Healthcare
 
Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017Top 6 Data Centre Trends For 2017
Top 6 Data Centre Trends For 2017
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the Future
 
Harnessing and securing cloud in patient health monitoring
Harnessing and securing cloud in patient health monitoringHarnessing and securing cloud in patient health monitoring
Harnessing and securing cloud in patient health monitoring
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
 
DriCloud. Cloud based Electronic Medical Record
DriCloud. Cloud based Electronic Medical RecordDriCloud. Cloud based Electronic Medical Record
DriCloud. Cloud based Electronic Medical Record
 
Health IT and Information security by Manish Tiwari
Health IT and Information security by Manish TiwariHealth IT and Information security by Manish Tiwari
Health IT and Information security by Manish Tiwari
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
Cloud Methodology and Facts
Cloud Methodology and FactsCloud Methodology and Facts
Cloud Methodology and Facts
 
IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography
 

Destacado

Enterprise cloudadoption
Enterprise cloudadoptionEnterprise cloudadoption
Enterprise cloudadoptionAccenture
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus
 
Managed Converged Infrastructure
Managed Converged InfrastructureManaged Converged Infrastructure
Managed Converged InfrastructureePlus
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing StudyNorth Bridge
 
The State of the Cloud Report 2017
The State of the Cloud Report 2017 The State of the Cloud Report 2017
The State of the Cloud Report 2017 Anna Khan
 

Destacado (8)

Enterprise cloudadoption
Enterprise cloudadoptionEnterprise cloudadoption
Enterprise cloudadoption
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 
Managed Converged Infrastructure
Managed Converged InfrastructureManaged Converged Infrastructure
Managed Converged Infrastructure
 
2016 Cloud Computing Trends
2016 Cloud Computing Trends 2016 Cloud Computing Trends
2016 Cloud Computing Trends
 
IoT in Healthcare
IoT in HealthcareIoT in Healthcare
IoT in Healthcare
 
Bessemer's 10 Laws of Cloud Computing
Bessemer's 10 Laws of Cloud ComputingBessemer's 10 Laws of Cloud Computing
Bessemer's 10 Laws of Cloud Computing
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 
The State of the Cloud Report 2017
The State of the Cloud Report 2017 The State of the Cloud Report 2017
The State of the Cloud Report 2017
 

Similar a Building Future-Ready Healthcare IT Platforms: Get To The Cloud

Connected Healthcare - New Perspective
Connected Healthcare - New PerspectiveConnected Healthcare - New Perspective
Connected Healthcare - New PerspectiveSomenath Nag
 
Future of Cloud Computing in Healthcare.pdf
Future of Cloud Computing in Healthcare.pdfFuture of Cloud Computing in Healthcare.pdf
Future of Cloud Computing in Healthcare.pdfMarie Weaver
 
cloud computing iRevolutionizing Healthcare The Power of Cloud Computingn hea...
cloud computing iRevolutionizing Healthcare The Power of Cloud Computingn hea...cloud computing iRevolutionizing Healthcare The Power of Cloud Computingn hea...
cloud computing iRevolutionizing Healthcare The Power of Cloud Computingn hea...Elina619459
 
Halloween Infographic
Halloween InfographicHalloween Infographic
Halloween InfographicNetAppUK
 
How cloud computing is beneficial for the Healthcare industry.pdf
How cloud computing is beneficial for the Healthcare industry.pdfHow cloud computing is beneficial for the Healthcare industry.pdf
How cloud computing is beneficial for the Healthcare industry.pdfLaura Miller
 
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationCloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationKeynote Mobile Testing
 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systemsijtsrd
 
Discover How Allscripts Uses InfluxDB to Monitor its Healthcare IT Platform
Discover How Allscripts Uses InfluxDB to Monitor its Healthcare IT PlatformDiscover How Allscripts Uses InfluxDB to Monitor its Healthcare IT Platform
Discover How Allscripts Uses InfluxDB to Monitor its Healthcare IT PlatformInfluxData
 
cloud computing in health care.pptx
cloud computing in health care.pptxcloud computing in health care.pptx
cloud computing in health care.pptxamanyosama12
 
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...ThousandEyes
 
dinCloud PR Highlights Q3 2015
dinCloud PR Highlights Q3 2015dinCloud PR Highlights Q3 2015
dinCloud PR Highlights Q3 2015dinCloud Inc.
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeCapgemini
 
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)Denodo
 
A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)Denodo
 
Cloud Services & Solutions | Mindtree
Cloud Services & Solutions | MindtreeCloud Services & Solutions | Mindtree
Cloud Services & Solutions | MindtreeAnikeyRoy
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 

Similar a Building Future-Ready Healthcare IT Platforms: Get To The Cloud (20)

Veera raghavan
Veera raghavanVeera raghavan
Veera raghavan
 
Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0Impact of Cloud Computing on Healthcare v2.0
Impact of Cloud Computing on Healthcare v2.0
 
Connected Healthcare - New Perspective
Connected Healthcare - New PerspectiveConnected Healthcare - New Perspective
Connected Healthcare - New Perspective
 
Future of Cloud Computing in Healthcare.pdf
Future of Cloud Computing in Healthcare.pdfFuture of Cloud Computing in Healthcare.pdf
Future of Cloud Computing in Healthcare.pdf
 
cloud computing iRevolutionizing Healthcare The Power of Cloud Computingn hea...
cloud computing iRevolutionizing Healthcare The Power of Cloud Computingn hea...cloud computing iRevolutionizing Healthcare The Power of Cloud Computingn hea...
cloud computing iRevolutionizing Healthcare The Power of Cloud Computingn hea...
 
Halloween Infographic
Halloween InfographicHalloween Infographic
Halloween Infographic
 
How cloud computing is beneficial for the Healthcare industry.pdf
How cloud computing is beneficial for the Healthcare industry.pdfHow cloud computing is beneficial for the Healthcare industry.pdf
How cloud computing is beneficial for the Healthcare industry.pdf
 
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationCloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
 
Accenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po VAccenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po V
 
Accenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po VAccenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po V
 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systems
 
Discover How Allscripts Uses InfluxDB to Monitor its Healthcare IT Platform
Discover How Allscripts Uses InfluxDB to Monitor its Healthcare IT PlatformDiscover How Allscripts Uses InfluxDB to Monitor its Healthcare IT Platform
Discover How Allscripts Uses InfluxDB to Monitor its Healthcare IT Platform
 
cloud computing in health care.pptx
cloud computing in health care.pptxcloud computing in health care.pptx
cloud computing in health care.pptx
 
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
 
dinCloud PR Highlights Q3 2015
dinCloud PR Highlights Q3 2015dinCloud PR Highlights Q3 2015
dinCloud PR Highlights Q3 2015
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
 
A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)
 
Cloud Services & Solutions | Mindtree
Cloud Services & Solutions | MindtreeCloud Services & Solutions | Mindtree
Cloud Services & Solutions | Mindtree
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 

Más de Dell World

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 

Más de Dell World (20)

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 

Último

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Building Future-Ready Healthcare IT Platforms: Get To The Cloud

  • 1. Future-ready Healthcare IT Platforms: Get to the Cloud Andrew Litt, MD, Chief Medical Officer, Dell Healthcare and Life sciences 2013
  • 2. Panelist David Tomlinson CIO/CFO; Centegra 2013 Bill Russell CIO; St. Joseph Health Ismelda Garza IT Director; Comanche County Medical Center
  • 3. Moving beyond the cloud hype Enterprise cloud application revenues reached $22.9B in 2011 and are projected to reach$67.3B by 2016. Current Usage 2013 60% of server workloads will be virtualized by 2014. Global cloud traffic will account for nearly two-thirds of total data center traffic by 2016. Today 46% of business data stored outside of internal IT structures. Over the past three years nearly 74% of data centers increased physical server count. IaaS cloud management & security and PaaS are growing from $7.6B in 2011 to $35.5B in 2016. 24% 37% 39% Hybrid Private Public Projected Market Spend of $241 Billion by 2020 Source: Dell Customer Research, April 2013
  • 4. Industry adoption varies Advanced Heavy Moderate Measured Lagging Gartner 2013 Adopting Private cloud PaaS and IaaS Community cloud and service providers Community cloud and SaaS Email and collaboration Panicky migration from vendor to provider Not much happening Public records, medical processes Industry Financial services Telecommunications Government Education High tech Energy and utilities Healthcare Retail Brokerage and messaging integration
  • 5. Healthcare transformation in the cloud 2013 Healthcare and Life Sciences
  • 6. Changing healthcare landscape 2013 Traditional IT still dominant 41.8% of a healthcare organization's IT budget is allocated to traditional IT deployment 2013 2017 Cloud IT multi $B market Although adoption is held back by regulatory initiatives and security concerns, the cloud market in healthcare is expected to grow to $5.4 billion by 2017 2015 Cloud IT growth accelerates Within two years' time traditional IT budget will decrease to 35.4%. Use of public cloud services will increase from 12.6% to 15.8%
  • 7. Impediments to cloud adoption for healthcare providers Concerns that cloud providers will not continue to innovate Have not identified what our exit plan for cloud would be Have concerns about cross-border rules Have not yet created a service catalog for cloud services Unclear future and roadmap for cloud services No end-to-end service management strategy 2013 40 28.4 20.5 17.4 11.3 11.8 14.1 7 Have not yet developed a cloud roadmap Concerns over security and availability Source: IDC's Global Technology and Industry Research Organization IT Survey, 2012 (% of respondents)
  • 8. Multiple regulatory requirements HIPA HITECH MEANINGFUL Health Insurance Portability and Accountability Act (1996) Security rules • 45 CFR 160 • 45 CFR 162 • 45 CFR 164 2013 USE American Recovery and Reinvestment Act – Health Information Technology for Economic and Clinical Health (2009) HIPAA Security Rule Plus • New civil money penalties for violations • Covered entities and business associates must comply • Breach notification obligation for breaches on or after Sept. 2009 Meaningful Use (2010) Risk Analysis • 45 CFR 164.308 (a) (1) • Core Measure 15
  • 9. How can audits and penalties impact you 2013 Breach Notification Rule KPMG contract: Audits of 150 hospitals Fines and penalties
  • 10. Challenges = cloud opportunity Improve quality of care Reduce costs 2013 Operate under high regulations Effectively manage IT resources
  • 11. Why Cloud? Secure Flexible Simple 2013 • Manage specific environment on customer behalf • Facilitate aggressive implementation schedules • SLA easy to understand and implement (99.95% uptime) • Free up hospital IT resources to focus on service delivery and application implementation • Expect predictable outcomes with a choice of service levels for operational availability. • Choose disaster recovery options that allow you to meet Recovery Point Objectives and Recovery Time Objectives • Select add-on solution options to fulfill your specific requirements • Reliable & secure ISB backup, recovery, and tape administration • Highly secure and reliable network connectivity options offer HIPAA-compliant data encryption • System monitoring • Pre-defined server availability levels • Standard data administration procedures and tools
  • 12. Dell cloud strategy for healthcare Hospitals Physicians Payers Life Science 2013 Healthcare cloud platform Strategic Pillars Establish an Interoperability Network connecting Healthcare Constituents Develop a Next Generation delivery mechanism based on a secure Cloud Platform that support derivative data driven solutions Integrate Current and Future Solutions through the cloud to deploy at scale 1 2 Archiving & Storage Reporting & Alerting Healthcare solutions Analytics 3 Other Electronic Medical Records Revenue Cycle Services Payers Solutions Data Management Security Other Mobility Interoperability
  • 13. Dell Healthcare in the Cloud 50+ 29B customers supported with cloud-based HIS and DR 650,000+ 2013 6B+ diagnostic image objects managed by Dell in the cloud. Protecting medical images for 7% of US Population Security events MEDITECH Processed daily by Dell SecureWorks, a core component of the Dell Cloud Integration processes Per day with Dell Boomi, over 3Xs our nearest competitor 1st To market with the Dell OpenStack Solution More EMRs supported in a secure dedicated Healthcare Cloud than any other healthcare IT services provider $200M Dell achieved this by virtualizing 10,000 servers and reducing applications from 7,000 to less than 2,500 Dell’s Crowbar deployment, management and services saved by Dell 400K physicians and 500 individual practices supported by Dell’s physician hosting cloud solution
  • 14. David Tomlinson, CIO/CFO Centegra 2013
  • 15. Bill Russell, CIO St. Joseph Health, 2013
  • 16. Ismelda Garza; IT Director Comanche County Medical Center 2013
  • 18. Let’s get started 2013 Visit the Solution Showcase to see our end-to- end healthcare solutions and services Gain hands on experience, see demonstrations at the Solution Showcase Schedule a visit to a Dell Solution Center near you: Austin • New York City • Washington D.C. Chicago • Santa Clara • Mexico City • Sao Paolo Go to www.Dell.com/healthcare
  • 19. 2013

Notas del editor

  1. Corrine – What’s the source? The adoption of IT cloud services among healthcare firms is roughly at parity with all firms. However, there is a far greater (32.5%) percentage of healthcare firms evaluating IT cloud services for a specific workload or service compared with all firms (23.6%). This represents an opportunity for suppliers to help educate healthcare organizations about best practices and use cases for cloud adoption. Also increasing are private cloud deployments, both internal and external –changes how firms will procure services and solutions.
  2. Emphasize that these are common concerns across industries.
  3. A HIMSS survey of large healthcare organizations found that just 47% currently conduct annual risk assessments as of last year, which is part of the original HIPAA requirement. Fifty-eight percent of the respondents had no staff members dedicated to security, and 50% spent 3% or less of organizational resources on security. So, you’re certainly not alone if you have yet to implement and conduct periodic risk assessments. We wanted to show on this slide that Meaningful Use is really nothing new. The Security Rule has been around since 1996 in the original form of HIPAA. When the HITECH Act was developed as part of the American Recovery and Reinvestment Act, it applied some new extensions to the already existing rule. For instance, with HITECH, new breach notification rules were extended, mandating reporting of breach incidents to HHS for breaches that affect more than 500 people, and extending the rules to health care business associates. HITECH also implements a new tiered system that increases civil monetary penalties for noncompliance and also allows state attorney generals to file civil actions for HIPAA violations on behalf of a community’s constituents. The Meaningful Use guidelines, set out by CMS, cover measure 45 CFR 164.308, which sets out the requirement to conduct a risk assessment. This measure, in turn is part of a series of measures that encompass the full security rule from HIPAA. Meaningful Use can be thought of as HHS finally starting to get some sizzle to their steak in terms of enforcing and incenting providers to not only adopt EHR, but also to make sure that they are implemented in a way that supports the original HIPAA guidelines. How the risk assessments are conducted still has some flexibility built in, which adds some confusion to the environment. Many federal guidelines are often referred to such as NIST SP 800-66. Some of the basic questions that this guideline and other recommend that you should consider in implementing the security Rule are questions such as: Have you identified ePHI within your organization? – including ePHI that you create, maintain, or transmit. What are the external sources of ePHI? For example, do vendors or consultants create, receive, maintain or transmit ePHI? And, What are the human, natural, and environmental threats to information systems that contain ePHI? While risk analysis is a necessary component to reach and achieve the Meaningful Use requirements, it’s also a necessary tool to reach any sort of substantial compliance with many other standards and implementation specifications. So, although it’s a starting point, the risk assessment is really just a stepping stone to the complete compliance that will be required and continually enforced in the near future. The HIPAA Security Rule specifically focuses on the safeguarding of EPHI and is the most comprehensive guideline around protected health information. All HIPAA covered entities, which includes some federal agencies, must comply with the Security Rule. The Security Rule specifically focuses on protecting the confidentiality, integrity, and availability of EPHI, as defined in the Security Rule. The EPHI that a covered entity creates, receives, maintains, or transmits must be protected against reasonably anticipated threats, hazards, and impermissible uses and/or disclosures. In general, the requirements, standards, and implementation specifications of the Security Rule apply to covered entities including: Covered Healthcare Providers— Any provider of medical or other health services, or supplies, who transmits any health information in electronic form in connection with a transaction for which HHS has adopted a standard. Health Plans— Any individual or group plan that provides or pays the cost of medical care (e.g., a health insurance issuer and the Medicare and Medicaid programs). Healthcare Clearinghouses— A public or private entity that processes another entity’s healthcare transactions from a standard format to a nonstandard format, or vice versa. Medicare Prescription Drug Card Sponsors – A nongovernmental entity that offers an endorsed discount drug program under the Medicare Modernization Act.
  4. Since 2009, 435 healthcare entities reported data breach affecting over 20 million patients1 The average economic impact of a data breach over the past two years is approx $2.2 M 2. Nearly 40% involves lost/stolen portable media device containing unencrypted PHI Encrypted patient data is covered under Safe-Harbor In July of 2011, the HHS’ Office of Civil Rights (OCR) announced that they had appointed consulting firm KPMG to conduct up to 150 HIPAA audits of covered entities and business associates by the end of 2012, and the implementation of the audit program fulfills a compliance enforcement mandate of the 2009 HITECH Act. The KPMG contract enables OCR to put “feet on the street,” while retaining an oversight role in the process. Sue McAndrew, OCR’s deputy director for health information privacy, confirms that some audits could even result in OCR enforcement action. “Certainly, if we uncover in the course of the audit major violations or potential violations … we will be dealing with those … in the same manner we would through our formal enforcement process,” she said recently. Criminal and civil penalties can be levied against organizations and/or individuals for violations of HIPAA Privacy and Security Rules. Monetary penalties for a breach of HIPAA Privacy and Security Rules range from $100 to $50,000 per violation. In addition to all this, state attorneys general are now authorized to bring civil actions against HIPAA violators on behalf of state residents. These audits have already begun These audits will supposedly “initially offer comprehensive assessments of compliance with the HIPAA privacy and security rules rather than specific narrower issues.” While the projected number of 150 audits in 2012 makes the likelihood of an audit visit to your organization fairly low – keep in mind, OCR has a separate initiative underway to train State Attorneys General on the HIPAA audit process as well, so this is something that will likely become even more persistent and granular in the future. Organizations participating in the EHR “meaningful use” plan already have a compelling incentive to “conduct or update a security risk analysis” but with or without meaningful use, this is a mandatory requirement for all covered entities and business associates, taken verbatim from the HIPAA Security Rule itself. And as you may know, organizations are required to report breaches affecting 500 or more individuals to HHS, along with details of the breach – where the entire incident is then posted publicly on the HHS website on their so-called “wall of shame”. And a third factor is that OCR and States Attorneys’ offices now have the ability to penalize healthcare providers for failing an audit. This is level of scrutiny is not likely to dissipate anytime soon; if anything, there is more likelihood than ever that a breach or lack of risk management can have disastrous consequences. In addition to this trifecta of incentives to focus on security, there’s also the reality that breaches are happening every day. In fact 60% of hospitals had more than two data breaches in the past two years. This is likely because over 2 thirds of hospitals don’t have the proper policies and controls to detect and respond to breaches, according to a recent Ponemon research study. Since the data breach notification regulations by HHS went into effect in September 2009, 435 (as of 7/15/2012) incidents affecting 500 or more individuals have been reported to HHS, according to its website. A total of over 20 million individuals have been affected by a large data breach since 2009. The regulations require a covered entity that discovers a reportable breach affecting 500 individuals or more to report the incident to the HHS Office of Civil Rights immediately. A report recently released by Redspin, an IT security firm, states that data breaches stemming from employees losing unencrypted devices spiked 525 percent in the last year (2011) alone.  This statistic confirms that devices, including laptops, tablets and smartphones, pose a very high risk for a data breach. Redspin reported that eighty-one percent of healthcare organizations now use smartphones, iPads, and other tablets, but forty-nine percent of respondents in a recent healthcare IT poll by the Ponemon Institute said that nothing was being done to protect the data on those devices. In a study published in 2011, the Ponemon Institute found that the cost of a data breach was $214 per compromised record and the average cost of a breach is $7.2 million. Encryption of PHI is a major step a provider or institution can take to secure its sensitive patient data. Encryption is the use of an algorithmic process to transform data into a form in which there is a low probability of assigning meaning without use of a confidential process or key. According to a Guidance from HHS, if an entity encrypts its data in accordance with the National Institute of Standards and Technology standards for encryption, then any breach of the encrypted data falls within a safe harbor and does not have to be reported. This is an incredibly important safe harbor that could save an entity a lot of money.