- As the system monitors employee behavior, profiles are built for each user which can be used to determine if actions are potentially suspicious or part of their normal job. Example: If one employee frequently works with VIP patients, you would not want alerts going off every time that employee accesses a VIP record. Instead, the system would learn that this is a false positive and add that to the user’s profile.
- Profiling can also be used to identify suspicious behavior.Example: If a user normally looks at a few records a day but then begins viewing many different records, this could be flagged as suspicious activity for a compliance officer to investigate.
- A set of proven rules for HIPAA/HITECH compliance come pre-packaged with the solution. These rules leverage years of experience in fraud prevention as well as feedback received from healthcare organizations.
- Bottomline provides new rules and rule updates that healthcare providers can implement to address the ever changing tactics of cyber criminals use.
- All alerts generated by the system are displayed in the Investigation Center where they can be tracked and managed by compliance officers. Alerts contain all relevant information to help investigators make rapid decisions about alerts without forcing them to switch between applications.
All Bottomline data security and fraud prevention solutions incorporate Intellinx technology and use a common platform to capture, normalize, analyze, and act. With this platform all data is captured, normalized, encrypted, and signed—making it easy to analyze suspicious behavior over time and across applications, analyze and prevent new types of fraud, ensure compliance, and provide legally admissible forensic evidence. A common user interface for all types of compliance and fraud analysis maximizes productivity of network operators and fraud investigators.
Learn more about the Bottomline Cyber Fraud and Risk Management platform.