SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
WWT Educational Webcast

     Wireless Mobility in Healthcare
Wireless Mobility in Healthcare


□   Bob Olwig, WWT
□   Bruce Alexander, Cisco
□   Grace Lanni, Motion Computing
□   Gabi Daniely, AeroScout
□   Derek Lohman, WWT
Questions are Encouraged




     You can ask questions during the
   presentation by using the link provided
          in the Webcast Viewer.
Your Success Drives Ours




 □   Relentless Focus on People, Process & Partnerships
 □   Strong Partner Relationships
 □   Over 1,000 Talented Employees
 □   Proven Processes
 □   Revenues In Excess of $2 Billion
 □   Strong Credit Line - $350MM +
 □   Key Contract Vehicles: VHA, HPG
                 ITES-2H, GSA, SEWP
Question 1




□   What are some things we should consider
    when securing a wireless network?
Control WLANs Before
They Control You

   Protect your network
         A corporate controlled WLAN
         eliminates 99% of rogue APs
         Deploy strong authentication
         and strong encryption
   Protect mobile clients
                                                             “Endpoint systems
         Mobile clients are exposed to                        are vulnerable and
         hostile networks more often                          represent the most likely
                                                              point of infection from
         (think hotels, airports, coffee                      which a virus or worm can
         shop hot spots)                                      spread rapidly and cause
                                                              serious disruption and
   Keep mobile clients “honest”                               economic damage.”
         Use Network Admission Control                       Burton Group
         (NAC) to make sure clients have
         the latest patches and AV
         definitions
   © 2006 Cisco Systems, Inc. All rights reserved.   Cisco                                6
Mapping Wireless Security Policies
to the Wired Network
                                                                    To Distribution/
 Multiple WLAN security                                               Core Layer
 policies
  Data vs. voice vs. legacy devices vs.
  guest access, depending on device                         AP Channel: 6
  capability                                                SSID “Data” = VLAN 1
  SSID to VLAN mapping—provides                             SSID “Voice” = VLAN 2
  appropriate wireless L2 segmentation                      SSID “Visitor” = VLAN 3

 Permits mapping WLAN
 security policies to wired
 security policies
  No dependence on WLAN device
  capability
  Use security features on the interface
  which terminates wireless traffic
  Can enforce the necessary access
  security, regardless of access method
  (guest, unencrypted/voice, WEP/etc.)


  © 2006 Cisco Systems, Inc. All rights reserved.   Cisco                              7
The Business Agenda
Business and Security Compliance Is Top of Mind
for Executives

 Protecting sensitive business and customer data is
 the key focus of regulatory compliance requirements
                                All Publicly Traded Companies Must:
 Sarbanes-                      a) Maintain an adequate internal control structure and procedures
   Oxley                            for financial reporting
                                b) Assess the effectiveness of internal control structures

                                Maintain Administrative, Technical and Physical Safeguards To:
                                a) Ensure the integrity and confidentiality of patient information
  HIPAA                         b) Protect against threats or hazards; unauthorized uses or
                                   disclosures of patient information

                                Any Merchant (Including Electronic) Using Payment Cards, Must:
                                a) Build and maintain a secure network
    PCI                         b) Protect and encrypt cardholder data
                                c) Regularly monitor and test networks, including wireless

   © 2006 Cisco Systems, Inc. All rights reserved.   Cisco                                           8
Question 2




□   What are the requirements regarding the
    design and layout of Access Points in a
    Healthcare environment?
Question 3




□   What are the key applications in hospitals
    that Active RFID can be used for and who
    are the users?
Key Applications



 Real-time                                                            Workflow &
                       Preventive    Temperature        Patient &
  Asset                                                                Resource
                       Maintenance    Monitoring       Staff Safety
Management                                                            Management




   www.aeroscout.com                    CONFIDENTIAL                      Page 11
Real-time Asset Management

 Challenge
      Maintaining par levels for equipment throughout the hospital departments
      Efficient management of the decontamination process of medical devices
      Equipment orders must be fulfilled on time so that not to delay procedures
      and drug administration
      Loss and theft of mobile devices
      Low asset utilization rates result in excessive and unnecessary purchasing
      and rental of medical devices




 Solution
      Automated real-time inventory and location reports
      Full control of rental equipment inventory and items out for repair/maintenance
      Automated par level maintenance and control of equipment at specific locations
      (e.g. shortage/surplus of pumps in clean/soiled utility rooms and on medical
      devices leaving the facility/area)
      Identify trends in equipment availability and utilization


 www.aeroscout.com                           CONFIDENTIAL                           Page 12
Preventive Maintenance

 Challenge
      Patient equipment must be maintained periodically in order to have
      highly functioning equipment for quality patient care and JACHO
      regulatory compliance.
      Equipment cannot be located on time leading to non compliance with
      regulatory requirements
      Valuable staff time spent on searching for assets due for PM




 Solution
      Tagged equipment is located immediately according to preventive maintenance
      pickup schedule
      Automated maintenance alerts include equipment location, enabling biomedical
      engineers to perform work in a timely manner
      Stored tag location and event history for audits



 www.aeroscout.com                      CONFIDENTIAL                             Page 13
Temperature Monitoring

 Challenge
      Nursing, lab and pharmacy staff must perform manual temperature monitoring
      and logging several times a day (blood, drugs, vaccines, food, tissue samples)
      JCAHO requires to maintain daily records and continuous temperature monitoring
      for storage refrigerators and freezers
      Logging mechanisms are unreliable (lost data and gaps in records) and utilize
      labor inefficiently




 Solution
      Temperature Sensor Wi-Fi Tags placed in refrigerators provide
      automated 24x7 constant temperature reads
      No hard wires and easy to install
      Alert on exceeded temperature readings
      Maintain temperature historical and alerts data


 www.aeroscout.com                        CONFIDENTIAL                                 Page 14
Patient & Staff Safety

 Challenge
      No effective way to determine the location of medical
      emergencies that occur out-of-room
      Hospital staff may often work with patients that pose
      a risk to staff
      At-risk patients (Psychiatric ward, Alzheimer, elderly, etc.)
      wandering and elopement




 Solution
      Patients wear call-button tags, and press the button in case
      of an emergency to signal medical staff immediately
      Staff can carry call-button tags which they can
      press upon encountering an emergency
      Patient movement between zones (exit event), into a specific
      restricted area (entrance event), or away from confined area
      triggers immediate alert to closest on-call staff.
 www.aeroscout.com                         CONFIDENTIAL               Page 15
Workflow & Resource Management


Challenge
      Non optimal process & resource management results in patient, staff and
      equipment delays in hospital departments (e.g. OR/ER)




Solution
      Online equipment/staff/patient tracking required for procedures
      Patient workflow tracking from admission to discharge
      Alert prior to a procedure if any necessary equipment is missing
      Location information is automatically sent to scheduling system, enabling
      procedure prioritization in real-time based on location and status
      Throughput analysis (wait times, bottlenecks, fixed asset utilization)



 www.aeroscout.com                    CONFIDENTIAL                             Page 16
Question 4




□   How do we get prepared to implement
    mobile point of care?
Defining a Successful Project?
     Include the Executives, Clinical
     Leadership (CMO, CNO) and Technology

     Define Clinical Goal(s)

     Clinical Usability Project Management

     Wireless Network Validation

     Clinical Workflow Analysis (hardware &
     software) (SSO, imaging, etc.)

     Training & Support Strategy

     Measurement and Reporting

     Units & Peripherals Design
18                             MOTION COMPUTING CONFIDENTIAL
Question 5




□   What is the next technology to make an
    impact on Wireless LAN and when is it
    coming?
Cisco Next Generation Wireless
      2x increase in reliability
      5x increase in throughput
      Backwards compatible with existing 802.11abg clients
      Operates in 2.4GHz and 5GHz
      MIMO improves wireless network reliability and
      predictability
          Throughput                                                                            Reliability                                                     Predictability
          Time to File Transfer                                                                 Roving Laptop Comparison                                         Laptop Rotational Spin
                                                                                                                                  11g
                                                                               24
                                                                                                                                                                                          11n
                                                              Packet Retries




                                                                               22                                                                      20




                                                                                                                                          Throughput
                                                                               20
11g
                                                                               18                                                                      15
                                                                               16
                                                                               14                       SAMPLE                    11n                  10               SAMPLE
                                                                               12
11n                  SAMPLE                                                    10                                                                      5
                                                                                                                                                                                          11g
                                                                                8
                                                                                    0            50      100          150   200     250                0
                                                                                                                                                            0          20          40           60
      0          2                 4                  6                                                        Time                                                         Time

            © 2006 Cisco Systems, Inc. All rights reserved.                             Cisco                                                                                                        20
Introducing the Aironet 1250 Access Point

AP1250 is the first enterprise class Wi-Fi
CERTIFIED 802.11n draft 2.0 access point
Selected for the Wi-Fi test bed
  ALL clients that are Wi-Fi certified will be tested
  with the AP1250
Designed to support higher speed WLAN
technologies
  Faster CPU, increased memory for expanded
  features
Expect a gradual migration to 802.11n
  Architectural flexibility
  Backwards compatibility with ABG
  Tested interoperability with Intel during development



     © 2006 Cisco Systems, Inc. All rights reserved.   Cisco   21
802.11n Business Benefits Summary
    Next Generation Wireless delivers
1   performance approaching wired


2   Consistent mobility applications
    deployed across wired and wireless


3   802.11n delivers 5x throughput for
    bandwidth intensive applications

    Greater reliability and predictability
4   for challenging RF and latency
    sensitive applications

    Extends network reach into hard-to-
5   wire locations

       © 2006 Cisco Systems, Inc. All rights reserved.   Cisco   22
Question 6




□   What are hospitals purchasing C5 for?
Motion C5 Clinical Outcomes Gained

     Mobility – true mobile and wireless point of care
     integrating pen w/o being tethered to a keyboard
     or a WOW
      •   Reduce # steps a nurse takes during a shift
      •   Increase time a nurse spends with the patient
      •   Decrease errors (no duplicated entry/loss of data)
      •   Increased nursing satisfaction
     Infection Prevention – Motion C5 industrial design
     supports procedures to eliminate microbial threats
     posed by keyboards within the clinical workflow
      •   Increase in staff and patient safety
      •   Increase quality of care
     Vitals integration – fast realization of tangible
     benefit for clinicians
      • Decrease the delay in time between vitals & I/O
        acquisition and availability in patient record
      • Decrease errors (no duplicated entry/loss of data)



24                               MOTION COMPUTING CONFIDENTIAL
Motion C5 Clinical Outcomes Gained

     Patient identification – qualified access to patient
     record
      • Increase the speed and accuracy of charting
      • Increase the % of charting and orders done bedside
     Med Administration - enable 5 rights at bedside
     without cart
      • Increase adherence to 5 rights
      • Decrease # separate devices necessary to support
        workflow
     Clinician Satisfaction – deploy technology and
     define benefit




25                            MOTION COMPUTING CONFIDENTIAL
Question 7




□   What are the advantages of using the Wi-Fi
    network for tracking assets and people
    throughout the hospital?
A Ubiquitous Standard Network for
Visibility

Healthcare visibility problems are distributed throughout the entire
              hospital campus and outside hospitals


Requires a standard ubiquitous solution throughout the healthcare
facilities that will:
• Leverage existing networks
• Keep management and maintenance costs low
• Keep TCO as low as possible



                       Wi-Fi-based Active RFID



  www.aeroscout.com            CONFIDENTIAL                     Page 27
Using Wi-Fi for Location

     Non-Wi-Fi Infrastructure:                     Wi-Fi based Infrastructure:
                                                            The existing WLAN is the location
                 Single-purpose Active RFID
                                                            system, often without the need
                 readers for location add                   for additional hardware.
                 unnecessary infrastructure.

               + Data Services                                 + Data Services
               + Voice Services                                + Voice Services
               + Location Services                             + Location Services




                                                      Fast ROI, ability to track Wi-Fi devices, no
     + Overhead, wiring, support x2                   interoperability or interference issues

 www.aeroscout.com                         CONFIDENTIAL                                     Page 28
How Does it Work?




   Wi-Fi-Based Active RFID tags send a tiny wireless 802.11 signal at a regular
   interval
         Tag’s messages consume less than 1/2msec, tags do not associate with Wi-Fi access points
         and do not require thousands of IP addresses
   Signal is received by the Wi-Fi access points, and is sent to a Location Engine
   The Location Engine determines the tag’s location, and sends it to the visibility
   software
   Visibility software uses location data to display maps and reports, enable
   searches, create alerts, manage assets, etc.
 www.aeroscout.com                           CONFIDENTIAL                                    Page 29
Question 8




□   What is the profile of a hospital or user of
    mobility solutions?
Question & Answer Session




     You can ask questions during the
   presentation by using the link provided
          in the Webcast Viewer.
Thank You.

Weitere ähnliche Inhalte

Was ist angesagt?

Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
HyTrust
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
Charles McNeil
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
stefanjung
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
Erik Ginalick
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
amiable_indian
 
IPSec_Case_Study_DEECD_Managed_Security_Services
IPSec_Case_Study_DEECD_Managed_Security_ServicesIPSec_Case_Study_DEECD_Managed_Security_Services
IPSec_Case_Study_DEECD_Managed_Security_Services
Iby Boztepe
 

Was ist angesagt? (20)

Content Aware SIEM™ defined
Content Aware SIEM™ definedContent Aware SIEM™ defined
Content Aware SIEM™ defined
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
 
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Privileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safePrivileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safe
 
The Role of Government in Identity Management
The Role of Government in Identity ManagementThe Role of Government in Identity Management
The Role of Government in Identity Management
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
 
MedITEX IVF with RFID
MedITEX IVF with RFIDMedITEX IVF with RFID
MedITEX IVF with RFID
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
IPSec_Case_Study_DEECD_Managed_Security_Services
IPSec_Case_Study_DEECD_Managed_Security_ServicesIPSec_Case_Study_DEECD_Managed_Security_Services
IPSec_Case_Study_DEECD_Managed_Security_Services
 
Past and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environmentsPast and future of integrity based attacks in ics environments
Past and future of integrity based attacks in ics environments
 
SOC 2 Compliance and Certification
SOC 2 Compliance and CertificationSOC 2 Compliance and Certification
SOC 2 Compliance and Certification
 
7 Software Development Security
7 Software Development Security7 Software Development Security
7 Software Development Security
 
System of security controls
System of security controlsSystem of security controls
System of security controls
 
CiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical SecurityCiNPA Security SIG - Physical Security
CiNPA Security SIG - Physical Security
 

Andere mochten auch

Aeroscout Aami
Aeroscout AamiAeroscout Aami
Aeroscout Aami
Marc
 
Aeroscout Canada
Aeroscout CanadaAeroscout Canada
Aeroscout Canada
Marc
 
Ekahau
EkahauEkahau
Ekahau
Marc
 

Andere mochten auch (6)

Aeroscout Aami
Aeroscout AamiAeroscout Aami
Aeroscout Aami
 
Aeroscout Canada
Aeroscout CanadaAeroscout Canada
Aeroscout Canada
 
Ekahau
EkahauEkahau
Ekahau
 
GAO Asset Tracking System: know where your assets are at all times!
GAO Asset Tracking System: know where your assets are at all times!GAO Asset Tracking System: know where your assets are at all times!
GAO Asset Tracking System: know where your assets are at all times!
 
Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...
Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...
Real Time Locating Systems (RTLS, RFID, Bluetooth, Wi-Fi, UWB, GPS, IR, NFER,...
 
Indoor positioning system
Indoor positioning systemIndoor positioning system
Indoor positioning system
 

Ähnlich wie Aeroscout Wwt Wireless Mobilityin Hc Webcast

IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
Ali Youssef
 
Aeroscout Phillips
Aeroscout PhillipsAeroscout Phillips
Aeroscout Phillips
Marc
 
Presentation next step 13 novembre
Presentation next step 13 novembrePresentation next step 13 novembre
Presentation next step 13 novembre
Nabil Majoul
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 

Ähnlich wie Aeroscout Wwt Wireless Mobilityin Hc Webcast (20)

White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Aeroscout Phillips
Aeroscout PhillipsAeroscout Phillips
Aeroscout Phillips
 
Presentation next step 13 novembre
Presentation next step 13 novembrePresentation next step 13 novembre
Presentation next step 13 novembre
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
REMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptxREMOTE MONITORING- A RECENT ADVANCE.pptx
REMOTE MONITORING- A RECENT ADVANCE.pptx
 
RF_NEC
RF_NECRF_NEC
RF_NEC
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attack
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
 

Mehr von Marc

Aeroscout Random2
Aeroscout Random2Aeroscout Random2
Aeroscout Random2
Marc
 
Aeroscout Random
Aeroscout RandomAeroscout Random
Aeroscout Random
Marc
 
Aeroscout Hca
Aeroscout HcaAeroscout Hca
Aeroscout Hca
Marc
 
Aeroscout 2008 Architecture
Aeroscout 2008 ArchitectureAeroscout 2008 Architecture
Aeroscout 2008 Architecture
Marc
 
Aeroscout 2007 Marketing
Aeroscout 2007 MarketingAeroscout 2007 Marketing
Aeroscout 2007 Marketing
Marc
 
Aeroscout 090325154500 Phpapp02
Aeroscout 090325154500 Phpapp02Aeroscout 090325154500 Phpapp02
Aeroscout 090325154500 Phpapp02
Marc
 

Mehr von Marc (6)

Aeroscout Random2
Aeroscout Random2Aeroscout Random2
Aeroscout Random2
 
Aeroscout Random
Aeroscout RandomAeroscout Random
Aeroscout Random
 
Aeroscout Hca
Aeroscout HcaAeroscout Hca
Aeroscout Hca
 
Aeroscout 2008 Architecture
Aeroscout 2008 ArchitectureAeroscout 2008 Architecture
Aeroscout 2008 Architecture
 
Aeroscout 2007 Marketing
Aeroscout 2007 MarketingAeroscout 2007 Marketing
Aeroscout 2007 Marketing
 
Aeroscout 090325154500 Phpapp02
Aeroscout 090325154500 Phpapp02Aeroscout 090325154500 Phpapp02
Aeroscout 090325154500 Phpapp02
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Aeroscout Wwt Wireless Mobilityin Hc Webcast

  • 1. WWT Educational Webcast Wireless Mobility in Healthcare
  • 2. Wireless Mobility in Healthcare □ Bob Olwig, WWT □ Bruce Alexander, Cisco □ Grace Lanni, Motion Computing □ Gabi Daniely, AeroScout □ Derek Lohman, WWT
  • 3. Questions are Encouraged You can ask questions during the presentation by using the link provided in the Webcast Viewer.
  • 4. Your Success Drives Ours □ Relentless Focus on People, Process & Partnerships □ Strong Partner Relationships □ Over 1,000 Talented Employees □ Proven Processes □ Revenues In Excess of $2 Billion □ Strong Credit Line - $350MM + □ Key Contract Vehicles: VHA, HPG ITES-2H, GSA, SEWP
  • 5. Question 1 □ What are some things we should consider when securing a wireless network?
  • 6. Control WLANs Before They Control You Protect your network A corporate controlled WLAN eliminates 99% of rogue APs Deploy strong authentication and strong encryption Protect mobile clients “Endpoint systems Mobile clients are exposed to are vulnerable and hostile networks more often represent the most likely point of infection from (think hotels, airports, coffee which a virus or worm can shop hot spots) spread rapidly and cause serious disruption and Keep mobile clients “honest” economic damage.” Use Network Admission Control Burton Group (NAC) to make sure clients have the latest patches and AV definitions © 2006 Cisco Systems, Inc. All rights reserved. Cisco 6
  • 7. Mapping Wireless Security Policies to the Wired Network To Distribution/ Multiple WLAN security Core Layer policies Data vs. voice vs. legacy devices vs. guest access, depending on device AP Channel: 6 capability SSID “Data” = VLAN 1 SSID to VLAN mapping—provides SSID “Voice” = VLAN 2 appropriate wireless L2 segmentation SSID “Visitor” = VLAN 3 Permits mapping WLAN security policies to wired security policies No dependence on WLAN device capability Use security features on the interface which terminates wireless traffic Can enforce the necessary access security, regardless of access method (guest, unencrypted/voice, WEP/etc.) © 2006 Cisco Systems, Inc. All rights reserved. Cisco 7
  • 8. The Business Agenda Business and Security Compliance Is Top of Mind for Executives Protecting sensitive business and customer data is the key focus of regulatory compliance requirements All Publicly Traded Companies Must: Sarbanes- a) Maintain an adequate internal control structure and procedures Oxley for financial reporting b) Assess the effectiveness of internal control structures Maintain Administrative, Technical and Physical Safeguards To: a) Ensure the integrity and confidentiality of patient information HIPAA b) Protect against threats or hazards; unauthorized uses or disclosures of patient information Any Merchant (Including Electronic) Using Payment Cards, Must: a) Build and maintain a secure network PCI b) Protect and encrypt cardholder data c) Regularly monitor and test networks, including wireless © 2006 Cisco Systems, Inc. All rights reserved. Cisco 8
  • 9. Question 2 □ What are the requirements regarding the design and layout of Access Points in a Healthcare environment?
  • 10. Question 3 □ What are the key applications in hospitals that Active RFID can be used for and who are the users?
  • 11. Key Applications Real-time Workflow & Preventive Temperature Patient & Asset Resource Maintenance Monitoring Staff Safety Management Management www.aeroscout.com CONFIDENTIAL Page 11
  • 12. Real-time Asset Management Challenge Maintaining par levels for equipment throughout the hospital departments Efficient management of the decontamination process of medical devices Equipment orders must be fulfilled on time so that not to delay procedures and drug administration Loss and theft of mobile devices Low asset utilization rates result in excessive and unnecessary purchasing and rental of medical devices Solution Automated real-time inventory and location reports Full control of rental equipment inventory and items out for repair/maintenance Automated par level maintenance and control of equipment at specific locations (e.g. shortage/surplus of pumps in clean/soiled utility rooms and on medical devices leaving the facility/area) Identify trends in equipment availability and utilization www.aeroscout.com CONFIDENTIAL Page 12
  • 13. Preventive Maintenance Challenge Patient equipment must be maintained periodically in order to have highly functioning equipment for quality patient care and JACHO regulatory compliance. Equipment cannot be located on time leading to non compliance with regulatory requirements Valuable staff time spent on searching for assets due for PM Solution Tagged equipment is located immediately according to preventive maintenance pickup schedule Automated maintenance alerts include equipment location, enabling biomedical engineers to perform work in a timely manner Stored tag location and event history for audits www.aeroscout.com CONFIDENTIAL Page 13
  • 14. Temperature Monitoring Challenge Nursing, lab and pharmacy staff must perform manual temperature monitoring and logging several times a day (blood, drugs, vaccines, food, tissue samples) JCAHO requires to maintain daily records and continuous temperature monitoring for storage refrigerators and freezers Logging mechanisms are unreliable (lost data and gaps in records) and utilize labor inefficiently Solution Temperature Sensor Wi-Fi Tags placed in refrigerators provide automated 24x7 constant temperature reads No hard wires and easy to install Alert on exceeded temperature readings Maintain temperature historical and alerts data www.aeroscout.com CONFIDENTIAL Page 14
  • 15. Patient & Staff Safety Challenge No effective way to determine the location of medical emergencies that occur out-of-room Hospital staff may often work with patients that pose a risk to staff At-risk patients (Psychiatric ward, Alzheimer, elderly, etc.) wandering and elopement Solution Patients wear call-button tags, and press the button in case of an emergency to signal medical staff immediately Staff can carry call-button tags which they can press upon encountering an emergency Patient movement between zones (exit event), into a specific restricted area (entrance event), or away from confined area triggers immediate alert to closest on-call staff. www.aeroscout.com CONFIDENTIAL Page 15
  • 16. Workflow & Resource Management Challenge Non optimal process & resource management results in patient, staff and equipment delays in hospital departments (e.g. OR/ER) Solution Online equipment/staff/patient tracking required for procedures Patient workflow tracking from admission to discharge Alert prior to a procedure if any necessary equipment is missing Location information is automatically sent to scheduling system, enabling procedure prioritization in real-time based on location and status Throughput analysis (wait times, bottlenecks, fixed asset utilization) www.aeroscout.com CONFIDENTIAL Page 16
  • 17. Question 4 □ How do we get prepared to implement mobile point of care?
  • 18. Defining a Successful Project? Include the Executives, Clinical Leadership (CMO, CNO) and Technology Define Clinical Goal(s) Clinical Usability Project Management Wireless Network Validation Clinical Workflow Analysis (hardware & software) (SSO, imaging, etc.) Training & Support Strategy Measurement and Reporting Units & Peripherals Design 18 MOTION COMPUTING CONFIDENTIAL
  • 19. Question 5 □ What is the next technology to make an impact on Wireless LAN and when is it coming?
  • 20. Cisco Next Generation Wireless 2x increase in reliability 5x increase in throughput Backwards compatible with existing 802.11abg clients Operates in 2.4GHz and 5GHz MIMO improves wireless network reliability and predictability Throughput Reliability Predictability Time to File Transfer Roving Laptop Comparison Laptop Rotational Spin 11g 24 11n Packet Retries 22 20 Throughput 20 11g 18 15 16 14 SAMPLE 11n 10 SAMPLE 12 11n SAMPLE 10 5 11g 8 0 50 100 150 200 250 0 0 20 40 60 0 2 4 6 Time Time © 2006 Cisco Systems, Inc. All rights reserved. Cisco 20
  • 21. Introducing the Aironet 1250 Access Point AP1250 is the first enterprise class Wi-Fi CERTIFIED 802.11n draft 2.0 access point Selected for the Wi-Fi test bed ALL clients that are Wi-Fi certified will be tested with the AP1250 Designed to support higher speed WLAN technologies Faster CPU, increased memory for expanded features Expect a gradual migration to 802.11n Architectural flexibility Backwards compatibility with ABG Tested interoperability with Intel during development © 2006 Cisco Systems, Inc. All rights reserved. Cisco 21
  • 22. 802.11n Business Benefits Summary Next Generation Wireless delivers 1 performance approaching wired 2 Consistent mobility applications deployed across wired and wireless 3 802.11n delivers 5x throughput for bandwidth intensive applications Greater reliability and predictability 4 for challenging RF and latency sensitive applications Extends network reach into hard-to- 5 wire locations © 2006 Cisco Systems, Inc. All rights reserved. Cisco 22
  • 23. Question 6 □ What are hospitals purchasing C5 for?
  • 24. Motion C5 Clinical Outcomes Gained Mobility – true mobile and wireless point of care integrating pen w/o being tethered to a keyboard or a WOW • Reduce # steps a nurse takes during a shift • Increase time a nurse spends with the patient • Decrease errors (no duplicated entry/loss of data) • Increased nursing satisfaction Infection Prevention – Motion C5 industrial design supports procedures to eliminate microbial threats posed by keyboards within the clinical workflow • Increase in staff and patient safety • Increase quality of care Vitals integration – fast realization of tangible benefit for clinicians • Decrease the delay in time between vitals & I/O acquisition and availability in patient record • Decrease errors (no duplicated entry/loss of data) 24 MOTION COMPUTING CONFIDENTIAL
  • 25. Motion C5 Clinical Outcomes Gained Patient identification – qualified access to patient record • Increase the speed and accuracy of charting • Increase the % of charting and orders done bedside Med Administration - enable 5 rights at bedside without cart • Increase adherence to 5 rights • Decrease # separate devices necessary to support workflow Clinician Satisfaction – deploy technology and define benefit 25 MOTION COMPUTING CONFIDENTIAL
  • 26. Question 7 □ What are the advantages of using the Wi-Fi network for tracking assets and people throughout the hospital?
  • 27. A Ubiquitous Standard Network for Visibility Healthcare visibility problems are distributed throughout the entire hospital campus and outside hospitals Requires a standard ubiquitous solution throughout the healthcare facilities that will: • Leverage existing networks • Keep management and maintenance costs low • Keep TCO as low as possible Wi-Fi-based Active RFID www.aeroscout.com CONFIDENTIAL Page 27
  • 28. Using Wi-Fi for Location Non-Wi-Fi Infrastructure: Wi-Fi based Infrastructure: The existing WLAN is the location Single-purpose Active RFID system, often without the need readers for location add for additional hardware. unnecessary infrastructure. + Data Services + Data Services + Voice Services + Voice Services + Location Services + Location Services Fast ROI, ability to track Wi-Fi devices, no + Overhead, wiring, support x2 interoperability or interference issues www.aeroscout.com CONFIDENTIAL Page 28
  • 29. How Does it Work? Wi-Fi-Based Active RFID tags send a tiny wireless 802.11 signal at a regular interval Tag’s messages consume less than 1/2msec, tags do not associate with Wi-Fi access points and do not require thousands of IP addresses Signal is received by the Wi-Fi access points, and is sent to a Location Engine The Location Engine determines the tag’s location, and sends it to the visibility software Visibility software uses location data to display maps and reports, enable searches, create alerts, manage assets, etc. www.aeroscout.com CONFIDENTIAL Page 29
  • 30. Question 8 □ What is the profile of a hospital or user of mobility solutions?
  • 31. Question & Answer Session You can ask questions during the presentation by using the link provided in the Webcast Viewer.