On the GK Comarch websites, both we and our partners use cookie files and targeting. Cookie files (a.k.a. "cookies") are small text files sent to your browser by the site you visit at any given time. They are used for analytical and statistical purposes as well as to ensure the proper functioning of the site. Additionally, they are used to tailor marketing content to the interests of users visiting our sites.
As we respect your privacy, we ask for your consent to use these technologies. You can consent to cookies by clicking "Accept all". If you want to personalize your choices, click "Settings." You can withdraw your previous consent or change your preferences at any time by clicking the "Settings" button.
Using cookies for the purposes indicated above is related to the processing of your personal data. The administrator of your data is Comarch SA. In some cases, our partners may also be the administrators of your data.
For more information on how we and our partners use cookies and process your personal data, please see our Data Processing Notice and Cookie Policy.
Data protection from unauthorized access is especially important in healthcare.
The access to sensitive data should only be granted to authorized persons, with scope of doing so strictly regulated, and accountability mechanisms in place.
Comarch cyber security solutions allow you to protect the identity of both your patients and healthcare staff as well as authorize, authenticate and manage the access to medical applications, devices and crucial data.
Comarch Identity & Access Management (CIAM) and tPro family systems are a good fit here.
Enables individual healthcare professionals to access medical records or history at specific times and for specific reasons.
Allows to manage access to systems and resources across the entire network of medical facilities, with full accounting included.
Ensures hassle-free integration across web medical systems – a single click to access them all.
Allows to request permission on medical platform to be added or revoked by the four-eye principle.
Enables delegation of medical employees permissions under limited timeframes.
Provides trusted resources access and secure storage of sensitive information based on Public Key Infrastructure (PKI) and microprocessor cards.
Provides support for security-by-design approach, Role-Based Access Control (RBAC), Separation of Duties (SoC), data portability, right to be forgotten, registry of all actions and processes, reporting and more.
Moreover, with our tPro family solution, we offer two-factor authentication (2FA) paradigm allowing medical staff to apply stronger security measures to patient data. Thanks to this, strong and various customer authentication methods meeting PSD2 requirements are provided.
Comarch supports own authentication mobile and hardware tokens including both ECC / RSA algorithms and OTP approach. We also support third-party tokens.
Our security audits focus on risk analysis, penetration tests as well as audits of compliance with standards, guidelines and good practices. Such a service allows you to check the security of your entire IT environment and identifies potential threats and gaps in the protection of medical data.
Tell us about your business needs. We will find the perfect solution.