Reading Hospital Chooses SSO

The Reading Hospital selects Encentuate for identity and access management

Dark Reading Staff, Dark Reading

September 10, 2007

1 Min Read
Dark Reading logo in a gray background | Dark Reading

REDWOOD CITY, Calif. -- Encentuate, a leading provider of identity and access management (IAM) solutions, today announced that The Reading Hospital, in Reading, Pa., has selected Encentuate Single Sign-On for the hospital's more than 1,000 caregivers. The Encentuate IAM Suite simplifies and secures access to applications and network resources, allowing caregivers to be more productive and to focus less on security and more on quality patient care. With Encentuate, Reading's IT staff maintains centralized control over user roles and rights, which ensures that private patient information is only accessed by authorized persons.

The Reading Hospital selected Encentuate because of its comprehensive end-point identity and access management solution and its commitment to customer care. Encentuate complements the hospital's shared workstation environment by enabling caregivers to roam from computer to computer, while maintaining their workflow and active sessions. Reading also plans to take advantage of Encentuate's Secure Remote Access capabilities to enable secure and fast access to information by leveraging browser based single sign-on to all applications, including legacy, desktop, and Web, from outside the firewall.

"Encentuate delivers a well-rounded product that provides automated access to all applications without the need for infrastructure or application changes," said Jayashree Raman, CIO of The Reading Hospital. "Our medical staff has responded very positively to the change, which has proven fast and easy to use, further ensuring reliable and secure access to the information we need to help our patients."

Encentuate Inc.

Read more about:

2007

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights