Contents

Health / Con­fi­den­tial Clin­i­cal Trials

Back­ground

Health­care is one of the most impor­tant and impact­ful areas in our soci­ety, with access to patients’ most pri­vate data: their med­ical records. Health­care insti­tu­tions share a unique posi­tion when it comes to pro­tect­ing data, as they are respon­si­ble for safe­guard­ing their patients’ high­ly sen­si­tive and dis­crete data. 

Because of neg­a­tive con­se­quences, such as finan­cial and rep­u­ta­tion­al costs, due to data breach­es, med­ical insti­tu­tions are extreme­ly hes­i­tant to share or allow access to their sen­si­tive patient data. There­fore, a move to the cloud with­out jeop­ar­diz­ing data secu­ri­ty and pri­va­cy seemed far stretched, until now.

Chal­lenge

Phar­ma­ceu­ti­cal com­pa­nies sought to increase col­lab­o­ra­tion between clin­i­cal users, uni­ver­si­ty par­tic­i­pants, and research teams val­i­dat­ing new treat­ments faster with improved but low­er costs for security.

Devel­op­ing and ver­i­fy­ing new treat­ments requires the gath­er­ing of large amounts of data and an inter­dis­ci­pli­nary and insti­tu­tion­al approach to the analysis. 

High reg­u­la­to­ry require­ments and com­pli­ance hur­dles to pro­tect patient per­son­al data, lack of trust in ser­vices providers, and the need to pro­tect insight and IP with­in a spe­cif­ic research group lim­it the pos­si­bil­i­ties to c

Solu­tion: Data secu­ri­ty and shar­ing as a ser­vice plat­form from enclaive

enclaive’s Con­fi­den­tial Con­tain­er comes with a series of inbuilt fea­tures to address the above chal­lenges, most notably the following:

  • Data remains encrypt­ed even when in use to retain data own­er­ship where it belongs
  • Con­fi­den­tial Con­tain­ers have a cryp­to­graph­ic iden­ti­ty. The author­ship is ver­i­fi­able, allow­ing the imple­men­ta­tion of fin­er-grained white-label­ing mech­a­nisms as well as proac­tive user pro­tec­tion: Remote attes­ta­tion allows for on-the-fly scan­ning of out­dat­ed or vul­ner­a­ble con­tain­ers in use based on their cryp­to­graph­ic identity.
  • Real-time vis­i­bil­i­ty of who has used the data with which approved appli­ca­tion to ensure agreed use
  • Appli­ca­tion val­i­da­tion in use ensur­ing val­i­dat­ed pro­cess­ing and algo­rithm to pro­tect your IP
  • Enable­ment of com­pli­ance with reg­u­la­tions like SozGB IV, GDPR, and GxP to secure your business
  • Sup­port for exist­ing appli­ca­tions lever­ag­ing the enclaive full base of encrypt­ed ser­vices and appli­ca­tions to jump­start the use with­out redesign­ing your code or retrain­ing your teams.
  • Enabling cross-depart­men­tal col­lab­o­ra­tion, allow­ing med­ical and research insti­tu­tions to share data bidi­rec­tion­al­ly with­out expos­ing it 
  • Sup­port mul­ti-par­ty ana­lyt­ics and AI train­ing, when the data own­er wants to share only a part of the dataset

enclaive offers a large port­fo­lio of Con­fi­den­tial con­tain­ers to shield sen­si­tive data in the high­ly reg­u­lat­ed health­care sec­tor from mali­cious threads. Promi­nent exam­ples include:

arangodb-sgx
ArangoDB
mysql-sgx
Mari­aDB
mongodb-sgx
Mon­goDB
redis-sgx
Redis
nodejs-sgx
Node­js
python-sgx
Python
rust-sgx
Rust
go-sgx
Go
php-sgx
PHP
ruby-sgx
Ruby
java-sgx
Java
c-sgx
C
cplusplus-sgx
C++
csharp-sgx
C#

Contact us

Cookie Consent with Real Cookie Banner