!

Cognetyx Launches Ambient Cognitive Cyber Surveillance to Help Safeguard Medical Information

Cognetyx has launched its patented “Ambient Cognitive Cyber Surveillance” technology. The surveillance platform, which leverages artificial intelligence and machine learning, gives the healthcare industry the unprecedented ability to detect privacy violation, patient record snooping, and cyber security breaches in real time. This technology offers a new formidable defense against criminal hackers and malicious insiders that in the last year alone have affected over 100 million healthcare patients here in the US alone.

Today the threat is more real than ever: hackers are increasingly targeting the healthcare industry because the bounty on these records is as high as $500 a piece. And a new study from Ponemon Institute, onPrivacy and Security of Healthcare Data illustrates this increased risk, saying 90 percent of healthcare organizations are suffering from at least one data breach in a two year period.

Cognetyx’s healthcare specific security solution fills the gap left by the current technology in place to help stop cybercriminals in their tracks. The Ambient Cognitive Cyber Surveillance (ACCS pronounced ‘access’) system quickly identifies unauthorized or inappropriate users within confidential healthcare medical records software and other confidential applications in real time. Current methods take an average of 206 days nearly 7 months to identify a single breach, but the Ambient Cognitive Cyber Surveillancecan ‘predict’ and detect a probable breach just moments after it has happened.

The Ambient Cognitive Cyber Surveillanceis able to do this because it’s built upon artificial intelligence that continuously surveys and learns a specific healthcare system’s, and its user’s patterns, and detects abnormalities. This innovative ‘intelligent’ all-seeing virtual eye then establishes a pattern of normal usage for each login credential, allowing it to quickly and accurately discern whether a login is legitimate, from an outsider using stolen credentials, or from an insider or employee misusing their own credentials or using login details of a colleague.

Comments are closed.