Skip to main content
Skip to footer

Cerner Security Offerings

We’ve listened and advanced to meet your needs. Together, we are on a cybersecurity journey.

To learn how we are an extension of your team to help fortify your organization with a more protected and secure posture, download the infographic.



Services and Technology

Contact us to learn more about our enterprise-wide offering

Related Offerings

Security

To improve your security posture, it’s critical to start with the basics and address and areas of highest risk. Leverage our consulting expertise on policies, procedures, risk assessments and training. We offer advanced malware protection, from the endpoints to the firewalls, along with countermeasures for the top attack vectors including email and web filtering gateways. Our integrated solutions include identification, advanced authentication, auditing and log correlation.

Security Operations Center

A 24x7 security operations center that provides the people, process and technology needed to monitor, detect and analyze threats on your network, enabling remediation.

P2Sentinel

Tracks end user access to confidential patient data as it happens. Able to be integrated with non-Millennium clinical and PHI systems. The solution is EHR agnostic. All capabilities of P2Sentinel are available with SaaS.

Instant Access

With Cerner Instant Access, authentication workflows are streamlined by providing location-based context and single sign-on technologies. The solution helps to reduce the time it takes to navigate various applications within the clinician’s workflow by launching applications in context, such as the patient list, where the user previously left off by seamlessly integrating role and location.

PatientSecure

With PatientSecure, your healthcare organization can positively identify patients through a variety of biometric options that create a 1:1 link between patients and their correct medical record. This biometric solution works by capturing a patient’s unique biometric scan – either their palm vein or iris pattern. The scan produces a digital representation of the biometric pattern which is encrypted for protection, then tied to the unique medical record of the patient.

Workflow Authentication

With Cerner Workflow Authentication it provides your health care organization compatibility with one-time password tokens to satisfy the “something the user has” credential for authentication. The first authentication of two-factor authentication is the user’s password: satisfying “something the user knows”.

Unified Endpoint Management

The Cerner Unified Endpoint Management provides a secure way for your health care organization to embrace mobility and helps simplify the management of the growing number of endpoints in health care. This solution offers the ability to track assets across your entire health care organization, secure access to sensitive data, distribute apps/content and ensure devices are compliant with corporate policies and industry standards.

724Access

The Cerner 724Access solution provides 7x24 access to all clinical data currently available in the Cerner Millennium® production database when the Cerner Millennium system or supporting infrastructure is otherwise unavailable. The solution also allows 7x24 access to a more limited subset of clinical data for cases when the network is unavailable. Access to clinical data is typically less than one minute behind production for both planned and unplanned outages.

Lights On Network

Identify both slowness across your network and potential security vulnerabilities vital to maintaining a secure EHR installation.

Network

Your organization’s network relies on a multitude of components to deliver a great experience. Cerner works with you to deliver proven architectures and validated network components, including switches, routers, wireless, cabling, NAC, DDI and stream analytics.

Compute/Storage

Virtualization and cloud has continuously shifted compute demands to more innovative platforms and designs. We deliver virtual desktops running on servers (VDI), including hyper-converged infrastructure, that enables new applications and solutions for health care without the burden associated with legacy compute nodes. To ensure that your operations stay online, Cerner offers robust and integrated data protection solutions. Hyper-converged architectures utilizing all-flash storage provides lightning fast performance where it’s needed the most.

Endpoint protection and response

Health care organizations are utilizing more than the traditional computers to provide care. Technologies such as laptops, mobile and medical devices are being utilized to protect critical health information. Endpoint protection and response allows health care organizations an end-to-end view of malicious activity with detailed information collected on a 24x7 basis.

Managed security service provider (MSSP)

Managed services can assist in health care organizations tackle challenges of protecting data, clinical outcomes and financial resources from cybersecurity threats. These services help build customizable security programs specific to meet the needs of health care organizations of any size.

Medical device security

Medical device security provides visibility in discovering all connected medical devices that are in a health care organizations network. This solution helps to streamline medical device inventory management, visibility and detection into connected medical devices.