The 10 Most Trusted Healthcare IT Security Solution Providers 2018 Final file Healthcare IT optimize | Page 34

Prey Devouring Cyber Theft with Modernism & Amendment T he development of technology is leading to more and more devices to be connected to the internet; data is becoming the new oil for both the developed and developing nations. However, this has given rise to the threat of data breach, loss, and misuse, which have become an alarming issue in today’s scenario. This is especially true for medical data, which is increasingly stored on mobile and connected devices, becoming vulnerable to theft or misplacement. Even with the industry in constant development, IT security in healthcare suffers from outdated regulations that set security standards far below the threat line. To counter this issue emerged a company, Prey Software. It specializes in providing a software platform that secures and manages mobile devices like laptops, phones, and tablets against theft, loss, and data misplacement. Prey wants its users to have all the necessary tools to stop fearing theft, and to prevent the chance of devices getting lost or stolen in the first place. The company wants to turn that problem into an opportunity for organizations and users to stand up against theft or loss of critical devices and regain control over their data. 32 | September 2018 | ‘Prey’ing Tactics It integrates all devices independently and irrespective of their operating system, and centralizes them under an online panel that serves as a remote control room. From there, the administrator can operate Prey’s functionality, triggered by Prey’s installed agent to monitor a mobile device fleet’s position, organize into labeled groups, and passively monitor devices utilizing its Control Zones geofencing tool to detect movement, if the devices leave a designated area such as a hospital lab, building, or campus. In case of theft or loss of a device, the administrator will be ready to react to the event and secure the data located on a lost device remotely, locking it down and eventually retrieving it. As for the asset itself, Prey’s tracking, or “Our solution promises no theft, no data leaks, only organized and secured mobile fleets” ‘MISSING mode’ will generate reports with pictures, location, nearby Wi-Fi networks, hardware changes, and a wealth of actionable data that empowers police to take immediate action to retrieve the mobile device. Overpowering the Cyber Security Space Prey provides a thorough solution with a steadfast focus upon anti-theft and data loss prevention. Health and educational organizations interact with extremely sensitive data regularly and require a solution that, aside from general management, ensures that there is a barrier against all the worst cases. This is why Prey focuses on protecting the data, locking it, or eliminating it if necessary. The company makes it easy to retrieve a misplaced device, or stolen devices. It initiates proper device recovery and identification of the perpetrator through comprehensive evidence reports. The organization’s initial success has created a strong base of trust. Prey Software, being a part of an industry that deals with extremely sensitive issues, focuses on transparency and open development that has proven to give its users the peace of mind they need.