The 10 Most Trusted Healthcare IT Security Solution Providers 2018 Final file Healthcare IT optimize | Page 34
Prey
Devouring Cyber Theft with Modernism
& Amendment
T
he development of technology
is leading to more and more
devices to be connected to the
internet; data is becoming the new oil
for both the developed and developing
nations. However, this has given rise to
the threat of data breach, loss, and
misuse, which have become an
alarming issue in today’s scenario.
This is especially true for medical data,
which is increasingly stored on mobile
and connected devices, becoming
vulnerable to theft or misplacement.
Even with the industry in constant
development, IT security in healthcare
suffers from outdated regulations that
set security standards far below the
threat line.
To counter this issue emerged a
company, Prey Software. It specializes
in providing a software platform that
secures and manages mobile devices
like laptops, phones, and tablets
against theft, loss, and data
misplacement.
Prey wants its users to have all the
necessary tools to stop fearing theft,
and to prevent the chance of devices
getting lost or stolen in the first place.
The company wants to turn that
problem into an opportunity for
organizations and users to stand up
against theft or loss of critical devices
and regain control over their data.
32 | September 2018 |
‘Prey’ing Tactics
It integrates all devices independently
and irrespective of their operating
system, and centralizes them under an
online panel that serves as a remote
control room. From there, the
administrator can operate Prey’s
functionality, triggered by Prey’s
installed agent to monitor a mobile
device fleet’s position, organize into
labeled groups, and passively monitor
devices utilizing its Control Zones
geofencing tool to detect movement, if
the devices leave a designated area
such as a hospital lab, building, or
campus.
In case of theft or loss of a device, the
administrator will be ready to react to
the event and secure the data located
on a lost device remotely, locking it
down and eventually retrieving it. As
for the asset itself, Prey’s tracking, or
“Our solution promises
no theft, no data leaks,
only organized and
secured mobile fleets”
‘MISSING mode’ will generate reports
with pictures, location, nearby Wi-Fi
networks, hardware changes, and a
wealth of actionable data that
empowers police to take immediate
action to retrieve the mobile device.
Overpowering the Cyber Security
Space
Prey provides a thorough solution with
a steadfast focus upon anti-theft and
data loss prevention. Health and
educational organizations interact with
extremely sensitive data regularly and
require a solution that, aside from
general management, ensures that there
is a barrier against all the worst cases.
This is why Prey focuses on protecting
the data, locking it, or eliminating it if
necessary.
The company makes it easy to retrieve
a misplaced device, or stolen devices.
It initiates proper device recovery and
identification of the perpetrator through
comprehensive evidence reports.
The organization’s initial success has
created a strong base of trust. Prey
Software, being a part of an industry
that deals with extremely sensitive
issues, focuses on transparency and
open development that has proven to
give its users the peace of mind they
need.