Duo Security's two-factor authentication platform can be used to protect access to Caradigm EPCS services by adding an extra level of security for user login.
Caradigm offers a full suite of identity and access management (IAM) solutions. Duo Security’s two-factor authentication integrates with Caradigm’s healthcare solutions as an approved provider of two-factor authentication, which enables organizations to quickly and easily satisfy user authentication compliance requirements.
For healthcare delivery organizations who want to electronically prescribe controlled substances to achieve business objectives or meet state mandates, Caradigm’s EPCS solutions provide a breadth of capabilities to support identity proofing and prescription signing. Now that Duo’s easy and effective two-factor authentication product integrates with Caradigm’s SSO/IAM offerings, healthcare institutions can satisfy those new mandates in one simple step. Unlike other offerings, Caradigm EPCS will receive the independent attestation that its components can help an organization earn DEA certification.
Please contact Caradigm to learn more about their solutions or for technical support.
Duo Security integrates seamlessly into your VPNs, servers, and web applications to provide two-factor authentication for all of your remotely accessible services.
Whether online or offline Duo supports a variety of authentication methods including smartphone mobile apps, cell phones, landlines, and tokens. Users can have multiple devices and choose their preferred method during login. Learn more »
Most customers get their first Duo integration up and running within 15 minutes. Check out the documentation to see how to configure Duo with your remotely accessible service.
Once deployed users set up their phones as authentication devices using Duo’s self-enrollment process. User-friendly guides are provided online.
The Duo Admin Panel provides a powerful management console for your IT staff. Forgotten phones? Lost tokens? Administrators can help employees set up new phones and get temporary bypass codes. All authentication attempts and admin actions are fully logged and able to be quickly filtered.