Security Management / Cybersecurity Suite
Fort Knox System and Role-Based Access Control: Designed to limit access to specific features and data based on user’s role, the auditing features log every interaction creating a tamper-resistant environment easily reviewed for compliance and security.
Cloud Server Logs and HIPAA Journal: Help detect unauthorized activity while assuring full HIPAA compliance including user access identification, and data/patient record modifications. Securely stored in the Cloud, Logs and Journal provide a reliable audit trail to secure accountability while allowing reviews of privacy concerns and assuring adherence.
AngelTrack’s Mark: Created by AngelTrack, the security mechanism assigns a digital fingerprint to significant actions creating an audit trail that tracks and reviews system usage to create a trace to the responsible user.
TimeClock Security Features:
IP Tracking and Terminal System: Authorized IP addresses and restricted time clock access to specific devices, prevents unauthorized clock-ins and confirms employees access the system from recognized locations resulting in secure and accurate timekeeping records. .
2FA (Two-Factor Authentication) and Authenticator Apps: Enhances login security by requiring users to verify their identity through an additional method, such as a code sent to their phone, reducing the risk of unauthorized access. AngelTrack supports most authenticator apps excluding Microsoft* for the 2FA system.
Biometric System: Another layer of security provided via integration with biometric systems that require fingerprint or facial recognition allowing only designated personnel to perform critical functions and access to sensitive data within the platform.
Exfiltration Tripwire: Monitors for abnormal data access patterns, such as large-scale data exports, and alerts administrators to potential security threats. Created to help prevent data breaches by detecting unauthorized attempts to remove data from the system.
Collectively these features allow AngelTrack to offer a secure, compliant, and robust platform for managing EMS and Fire operations, protecting both sensitive data and system integrity.