The listings featured on this site are from companies from which this site receives compensation. This influences: Appearance, order, and manner in which these listings are presented.
Our videos have over 5 million views on Youtube! Visit our channel now »
Disclosure:
Professional Reviews

vpnMentor contains reviews that are written by our community reviewers. These take into consideration the reviewers’ independent and professional examination of the products/services.

Ownership

vpnMentor was established in 2014 as an independent site reviewing VPN services and covering privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

Affiliate Commissions Advertising

vpnMentor contains reviews that follow the strict reviewing standards, including ethical standards, that we have adopted. Such standards require that each review will take into consideration the independent, honest and professional examination of the reviewer. That being said, we may earn a commission when a user completes an action using our links, at no additional cost to them. On listicle pages, we rank vendors based on a system that prioritizes the reviewer’s examination of each service, but also considers feedback received from our readers and our commercial agreements with providers.

Reviews Guidelines

The reviews published on vpnMentor are written by community reviewers that examine the products according to our strict reviewing standards. Such standards ensure that each review prioritizes the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings we publish may also take into consideration the affiliate commissions we earn for purchases through links on our website.

Protenus – Protecting Patient Privacy in Electronic Health Records

Kristina Perunicic Updated on 13th July 2023 Managing Editor

Do we really need yet another enterprise threat detection system? If you are in the healthcare field, the answer is a resounding yes! In this interview, Protenus co-founder and President Robert Lord outlines very clearly how the security and privacy needs of electronic health records are very different from traditional enterprise security issues. Moreover, the privacy and security challenges facing the world of healthcare are very different – and difficult to address – as well.

Robert also shares with us his top privacy protection tips and his thoughts on the future of medical health records software – including why healthcare security and privacy should become the paradigm for other industries to imitate.

Most company co-founders that I talk to met either in engineering school or in business school. You and your co-founder Nick Culbertson met in medical school.  Did you finish medical school? Did you ever practice as a doctor?

Yes, Nick and I met in medical school, but we both left half way through, and we therefore never practiced as physicians.

How/why did you start Protenus?

We founded Protenus with the goal of gaining a better understanding of the state of electronic health records (EHR). What we discovered was that a tremendous amount of money was being spent rolling out EHR systems, but that very little effort and money was being spent on security and privacy for those systems.

We saw a huge need and opportunity to address this problem.  The great challenge was to figure out what was the appropriate behavior for every different person/role with access to the EHR system.

Please give me an overview of Protenus.

Protenus is a health data analytics platform specifically designed to understand the clinical workflows within in the complex clinical environment of a healthcare organization. This technology helps hospitals accurately detect the obvious and often hidden threats to patient data. Its main functions are to:

  • Detect and prevent data breaches in healthcare records.
  • Detect inappropriate activity and raise alarms to handle it.
  • Visualize activity in real-time enabling security staff to rapidly see suspect events and respond to them.

Why do we need a product specifically for healthcare, instead of just leveraging existing security and collaboration products?

We actually asked ourselves that exact question when we were first getting started. However, we quickly learned that there are many unique issues and challenges in the healthcare security and privacy space.

For starters, the security challenges facing EHR systems are different from traditional IT security issues. We have identified and addressed the following threat scenarios, which are unique to EHRs:

  1. VIPs and public figures
  2. Friends, family, and other snooping
  3. Criminal insiders
  4. Phishing attacks
  5. Contractors, affiliates, and business partners
  6. Lost or stolen devices

In addition, hospital workflows are extremely complex and it is very hard to determine access rights a priori. Moreover, healthcare defaults to open access for all healthcare workers, so that they can handle any/all emergencies. That means that if you have any level of access, you essentially have complete access. Role-based methods do not work very well in this environment. Every doctor or nurse is different. You really need to understand the clinical and administrative context.

protenus dashboard

Who do you see as your main competitors? How are you different from them?

Several legacy systems try to address this space, but they are not well suited to the modern healthcare environment. Their integration with existing EHR systems is very difficult and they tend to produce many false positive warnings.  In addition, those systems do not have as much deep information as we do, which makes it difficult for the security team to decide how to react.

One of the key differentiators of our system is that it is behavior-based. We are not trying to identify “bad guys.”  Instead, we figure out what is normal behavior for each individual and report on anything that deviates from that. We make extensive use of big data, analytics, and machine learning. We track what each individual is doing in the HER systems on a second-by-second basis over long periods of time.  We also utilize multi-dimensional behavior fingerprints in order to characterize each user.

That is not to say, however, that it takes a long time for our system to get up to speed. The Protenus system is effective from the first day you install it. It is able to analyze existing records, logs, and human resources information to get started.

How do you define your market? Is there a specific target audience within that market?

Our target market is any organization maintaining healthcare data, but here are a few of the main specific categories:

  • Hospitals
  • Health systems
  • Health Information Exchanges (HIEs)
  • Insurance companies

protenus patterns

How do you normally attract and engage with new customers?

We are recognized as the leading privacy analytics provider in this space. We are also recognized as thought leaders since we are creating new ways of thinking about this problem. This results in many potential clients approaching us to begin a discussion.

In terms of our proactive efforts to engage with potential customers, we have your typical enterprise software sales and marketing efforts and also attend many industry conferences.

How many active customers do you have today? Where are they mainly located?

I cannot discuss specific numbers, but we have clients located throughout North America.

Who are some of your biggest customers?

Our system is deployed at the Johns Hopkins Health System and other similar top-tier health institutions.

What are your top three privacy protection tips?

I will actually give you four…

  1. You need to have the support for privacy and security at the highest level of the organization.
  2. Given the large attack surface and huge amounts of data, manual methods will not work – you must look to deploy big data and artificial intelligence solutions.
  3. You must actively engage the workforce, including culture, priorities, education, and incentives/consequences.
  4. You must re-orient your mindset – it is not enough to be just concerned about compliance, you must be concerned about being able to trust the EHR system.

How do you see the medical health records software market evolving in the next few years?

I can only address the privacy and security aspects of the EHR market.

  • I see us turning a corner – I am witnessing increasingly more support from top management. We need to see more spending from government and large organizations.
  • An organization’s trust posture and position will become a strategic asset.
  • Healthcare security and privacy should become a paradigm for other industries, since the data in this industry is so massive and so sensitive.

What are your future plans for Protenus?

  1. Continue growing the business, message, and vision.
  2. Continue educating the market.
  3. Investigating and embracing opportunities for novel approaches in this space.
  4. Extending into additional areas of healthcare analytics.

How many employees do you have today? Where are they located?

We now have 30 employees and they are mainly located in the Baltimore, Maryland area.

How many hours a day do you normally work?  What do you like to do when you are not working?

I generally try to keep it to a reasonable average of 12 hours per day. I feel that I need to set the example of work-life balance for the rest of team.  Although I try to keep up with emerging technologies and trends in areas such as big data, AI (Artificial Intelligence), and healthcare, even outside of my formal working hours.

During my leisure time, I enjoy engaging in physical activities at the gym, while on the opposite end of the spectrum, I relish exploring new dining establishments. Additionally, I make an effort to embark on captivating journeys to enrich my travel experiences.

About the Author

Kristina Perunicic is a former editor for vpnMentor. She’s a cybersecurity expert with an interest in VPNs and their importance in the digital privacy landscape.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback