SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Identix (IDNX) -- Ignore unavailable to you. Want to Upgrade?


To: gcrieff who wrote (10375)9/17/1998 5:12:00 PM
From: David  Respond to of 26039
 
Good points in that health care intranet article about the need to use legacy systems and the fact that there are hundreds of health care VPN candidates out there by now.

I did some looking into Internet Dynamics. They seem to be state of the art in putting together a sophisticated, secure virtual private network over the internet, using legacy systems (as long as Windows NT is in use everywhere). They integrate all kinds of security technology -- firewalls, encryption, authentication, anti-virus and biometric option -- into a network that has policy levels of access available, based on where you are (your particular hospital, for instance), or who you are (a supervisor with broad access, a nurse with limited access, a doctor with broad medical access, a business partner with access to business matters, or a customer with access to product pricing). Further, Internet Dynamics have partnered up with two other companies to develop a "WANTop" box (it sounds similar to a cable box) that attaches to the local workstation and takes over the necessary control functions to let that workstation be a part of a Virtual Private Network (an interanet/extranet) with an appropriate access level determined by the network administrator, as well as full internal security measures. Any biometric would also, obviously, have to be added at the workstation. If a worker is working at home, this, plus a modem, puts that person on the fully protected VPN. From an article dated a few months ago, it looks like Internet Dynamics was rated better than Network Associates for security, and the product itself is considered inexpensive for the market.

Internet Dynamics was also competing with DEC (now part of Compaq) on firewall security. It is a very small company, according to what I can find, apparently with no more than a few dozen employees. It is also involved with the ACT regional government in Australia in setting up the "ACT Centre of Excellence," which is a unit intended to facilitate business between Australian companies and multinationals.

As to the announced deal . . . 100 hospitals, eventually, will represent thousands of seats. Real money.

Here's a link: conclave.com



To: gcrieff who wrote (10375)9/17/1998 5:23:00 PM
From: David  Respond to of 26039
 
Some more on this partner's product, from its web site:

"Conclave Offers Boundary-less Security
Accessware defines those products that help users control
access, manage resources and establish security. Conclave
individualizes the security model from the location-centric view to
an information/user view. The owner of the information sets the
access rights, thereby reducing the need for a central security
authority.

"Conclave provides security for Web, File Transfer, News, Mail
and other popular Internet protocols. With Conclave's simple
administration GUI, it is as easy to grant access to a single web
page as it is to a whole server or complete network. This access
granularity can be as fine as one authenticated individual or as
gross as the entire public. An unlimited array of security
relationships between user groups and information sets are now
possible. This creates boundary-less security with distributed
administration. A company news release, for example, becomes
information for the world. Technical product updates, created by
the engineering team, are accessible to customers of that
product. The latest financial projections can be readily obtained
by the investor relations analyst. Each information resource can
be connected to exactly the right audience. This is boundary-less
security."