CurrentWare Helps Companies become HIPAA Compliant

How do I become HIPAA compliant?


In today’s digital and mobile age, the healthcare sector is susceptible to increasing vulnerabilities of exposing confidential patient files. With the dissemination of data via the “information superhighway” and mobile communication devices, the incidences of data loss through security breaches continues to be a growing risk for medical facilities. The rising number of data breaches has resulted in a federally governed regulation that mandates data loss prevention for medical data.

To safeguard the privacy of patient information, the healthcare sector in the US is obliged to comply with the guidelines under the Health Insurance Portability and Accountability Act (HIPAA).

CurrentWare offers a range of solutions to help healthcare organizations address HIPAA compliance security standards.


AccessPatrol controls device access


Restrict and Audit Access to USB and Endpoint Devices

With the influx of mobile storage devices such as USB devices and smartphones, stealing confidential data and electronic personal health information (ePHI) files can be achieved quite discreetly without the approval or knowledge of authorities.

AccessPatrol provides comprehensive endpoint security to prevent theft of sensitive data and ePHI:

  • Enforce selective data access: Implement access privileges: read only, read and write, or no access to patient data files.
  • Whitelist Endpoints: Completely block access to all endpoints. Allow access to authorized endpoint devices, such as USBs and external hard drives, using the AccessPatrol Allowed List.
  • Removable Storage Auditing: Inclusive reporting ensures speedy identification of abusive use of endpoint devices.
  • Offsite Management: Endpoint security policies will be maintained, even if the computer or laptop is used outside the building.

BrowseReporter monitor Internet access


Report on Internet, Bandwidth & Application Usage

Monitor Internet usage by tracking and reporting on the websites visited and the duration of visits by the healthcare staff. Identify users that are frequently visiting sites that may compromise patient information or infect your network.

  • Real Time Monitoring: Accurate real time monitoring of Internet activity on a per employee or per computer basis. Meticulous recording of all employee Internet activity.
  • Bandwidth Tracking: Capture and instantly analyze bandwidth usage to realize bottlenecks and detect trends of suspicious usage of bandwidth.
  • Application Tracking: Discover if malicious software is being launched on your end user's computers.
  • Email Reports Automatically: Schedule reports to be automatically emailed to the managers on a daily, weekly or monthly basis.
  • Offsite Monitoring: Computers or laptops that are typically used offsite, such as in ambulances, can be assured the same level of Internet monitoring as the computers that are onsite. Monitoring of offsite systems is not compromised.

Web Filter control Internet access


Block Websites and Malicious Applications

Protect against Internet threats by blocking and filtering websites not related to the medical practice. Enforce Internet restriction policies for HIPAA compliance. Improve staff productivity and mitigate security threats to your network and ePHI.

  • Whitelist & Blacklist Sites: Reduce Internet threats and infections by restricting web access to medical related sites only. Build custom lists of Allowed and Blocked websites.
  • URL Category Filtering: Choose from over 100 URL Categories to instantly block thousands of sites within a Category. Restricting access to questionable sites reduces the risk of users frequenting malicious sites that could be hosted by cybercriminals.
  • Block Downloading of Files: Restrict users from downloading files that could inadvertently compromise the company network. Preventing users from downloading music and video files limits the hogging of the corporate bandwidth and reduces staff distractions.
  • Block Suspicious applications: Increase employee productivity by blocking time wasting applications such as online chats and games.
  • Offsite Filtering: Laptops used by mobile medical workers can be subject to the same Internet policies as those onsite. This mitigates the risk of Internet misuse by offsite employees as well.

How does CurrentWare work?

CurrentWare HIPAA Compliance Software

Let's get started!

On this page, we will show you how to install and configure CurrentWare on your Windows workstations.

Before you begin: Download the CurrentWare Setup File

Please wait...

Install CurrentWare Web Filter Console on IT manager's computer

On the Manager’s computer, install the CurrentWare Console

  1. Run the setup file
  2. Select AccessPatrol, BrowseReporter, BrowseControl and Category Filtering
  3. The Installer will proceed to install the CurrentWare Server, Console and BrowseControl onto your computer
Install CurrentWare Web Filter Client on Employee's computers

On the employee’s computers, install the CurrentWare Clients

  1. Take the CurrentWare Client setup file and run it on the client computer.
  2. The installer will ask you for the computer name of the CurrentWare Console to establish a connection.
  3. After the CurrentWare Client is installed, it will connect to your CurrentWare Console automatically.
  4. Repeat step 1-3 on all the computers you want to manage.
Install CurrentWare Web Filter Console on IT manager's computer

You're all set!

Return to the Manager’s PC and launch the CurrentWare Console

Try CurrentWare for Free - Become HIPAA Compliant


Fill out the form to Download a FREE Trial - 14 days on 10 PCs!

Please wait...
CurrentWare Customers