Software Bloc offers total I.T. solutions, including a full-service systems development and integration division, professional consulting division and offshore development. Software Bloc utilizes a proven and structured methodology that it uses as a model for all clients assuring the best quality and complete customer satisfaction.
- Web based applications development and expertise and significant resources in several technologies and tools.
- State of the art research and development centers in the United States and Offshore
- Strategically aligned with Product Partnerships / Certifications with leading software vendors and developers such as Siebel, Microsoft, Cognos, Cisco, Oracle, SAP and ATG Dynamo
- Strong Senior Management Team, Technical Management and Project Managers
- End-To-end Solutions with fast implementation and economical cost
Software Bloc is a premier E-Business solutions provider, delivering innovative and creative Internet business solutions. We provide end-to-end solutions, including strategy, technology selection, architecture, design, development and support. Today’s industry calls for innovation, creativity, flexibility and faster implementation with reduced development costs as key attributes. We understand the components, technologies and solutions that are needed to get started with E-Business today, and remain flexible as business changes.
Software Bloc expertise is in developing enterprise architecture and strategies for clients, managing large-scale systems integration and application development projects. This experience makes Software Bloc the right choice for an E-Business solution provider. By using cross-functional and cross trained teams in a variety of technologies, and partnerships, Ramsoft brings its clients E-Business solutions effectively.
Software Bloc helps clients use IT to build powerful, sustainable new business capabilities. Working with top leadership, we apply our considerable imagination, expertise and strategic thinking to the creation of the company’s future in E-Business. Software Bloc understands how to combine business and technology to get the optimal results for your organization. We can show you how E-Business can streamline business processes, create competitive advantage, increase market share, and ensure the alignment of business and technology initiatives. Our skilled technologists have extensive experience in building and deploying business-to-business and business-to-consumer solutions to meet your needs. If you are looking for innovative ideas that will unleash the power of E-Business in the real world, we are the people to see.
Software Bloc offers the following e-business development capabilities:
Software Bloc end-to-end, best-practice CRM solutions integrate people, processes, and technology to achieve next-level customer and supplier relationships through—
- Lead generation
- Account management
- Customer retention
- Campaign management
- Call center interactions
- Customer value metrics
Focus is customer-centric. Resource pool is project managers, financial consultants, business analysts and technical consultants. Technology may be SAP, Oracle-Siebel, Peoplesoft, Clarify, or other as needed to meet client application development and implementation objectives. High return on investment solutions include—
- Benchmarking, score carding
- Data warehousing
- Data architecture
- Business intelligence
Enterprise Resource Planning, Supply Chain Management
Two decades of MRP, MRP11, BPR and other trends culminated in ERP solutions that cross-integrate any company’s systems across functional and systems lines regardless of system type or age, and incorporate true SCM in a seamless operation. With RSI, ERP solutions are operations focused, cooperative with leading software system suppliers SAP, Oracle, PeopleSoft, SSA-Baan, and others, and are either turnkey implementations or participation on a support-assistance basis.
Software Bloc works with the client decision team from conceptualization through finalization. Typical implementations include
Project Preparation – Management commitment – Assembly of the project team – Level 1 training
Simulation – Level II training – Initial target system configuration – Project team configuration review
Validation – Level III training – Final system configuration – Scenario validation
Final Preparation – Final system testing – End user training – Data conversions
Going Live – Launch of production system – Measurement of systems benefits
RSI plans and implements today’s ERP systems to yield rapid and substantial return on investment. Modular packages allow for the gradual upgrade of legacy systems across the enterprise with minimum upheaval. Skilled programmers and business process experts guarantee the most effectively customized implementation possible.
EAI is the combining of processes, software, standards, and hardware to achieve seamless integration of two or more existing enterprise systems. Formerly distinct applications and hardware configurations now operate as one.
EAI involves integration at the following levels:
- Business Process
- Application Integration
- Components and Data
- And Platform
Software Bloc A core RSI competency, EAI solutions are advanced, business logic based systems that totally utilize existing applications and databases and fully exploit the Internet. Return on investment driven like all Software Bloc solutions, they utilize IT industry best practices and meet or exceed every applicable quality assurance standard.
We look after:
- Needs Assessment
- Designing EAI solutions
- Custom development of connectors
- Business Logic based Assessments
Constant learning is essential for high productivity and employee morale yet its cost prohibitive!
To enable cost effective learning, we have developed an on-line / on-demand interactive multimedia real time effect (video, audio) instructor presentation with a personal touch. This process helps to be flexible and accommodates multiple learning styles for effective learning/skill enhancements.
We have successfully helped clients in e-Learning, ranging from large automotive OEM’s to small firms.
- It will save overall training costs
- Saves registration and coordination of training process
- Reusability of instructor presentations
- Attendance / waitlist management
- Scheduling instructors
- Travel related expenses and opportunity costs
- Facilitates multiples learning strengths and behaviors
- Helps a learner be highly engages in the process
- Helps to reference material online
- The presentations has a sense of personal touch
Wherever repeatable presentations for multiples are necessary this approach provides great cost cutting opportunity with ease of use broader reach and operational efficiency.
Application Development and Methodology
Software Bloc Uses development methodologies that best suit the clients objectives for cost-effective turnkey solutions and ongoing user support. Developers specialized in design, implementation, and quality assurance apply methods and processes that ensure successful due-diligence, steady-state optimization. Dedicated project communication systems eliminate time barriers and assure operational flexibility.
Global model service delivery teams collaborate with client staff to define requirements and establish project priorities, quality standards, and acceptance criteria. Onsite engagement managers are totally client accountable in areas including resources, productivity, and milestones.
Flexibility can only be achieved with defined and implemented methodologies and process as a backbone for the service offerings. Software Bloc considers its methodologies to be a core competency, the methods and process that we have set up, ensure a successful “due diligence”, transition, steady state and optimization. Our methodologies define communications between remote locations and between our clients.
Our delivery team works in a highly collaborative manner with the client as it relates to understanding project priorities, defining requirements, establishing quality standards and acceptance criteria. This is a critical success factor in our service delivery mechanism. Our dedicated on-site engagement manager and the on-site team will be responsible and accountable for delivery of Software Bloc commitments to your organization. This team is responsible for managing all aspects of the global model—resources, productivity and milestones—so that your organization’s project objectives can be met on time and within budget..
Quality & Customer Satisfaction
With a reputation for standing by our commitments and for going the extra mile, Software Bloc approach to client satisfaction is simple— We guarantee it…
Software Bloc customizes every solution to client requirements and optimizes for function, cost, and deployment of resources. Business process needs guide the architects, developers, programmers and managers who implement the project comprehensively. Solution teams mobilize deep skills in a broad spectrum of scale able technologies over the full range of requirements to deliver global reach without sacrificing local presence.
Industries served: healthcare and pharmaceutical, automotive, financial, telecom and media, insurance, energy and utilities, manufacturing, retail, biotechnology, and government.
Data warehousing is a business concept. It is a combination of hardware and software components that analyze the large amounts of data that companies are accumulating to make better and faster business decisions.
Companies today have massive amounts of data that represents a wealth of knowledge, which is probably not being used to its fullest potential. Data warehousing can help you take advantage of the knowledge base you have created over time.
Leveraging your enterprise data to receive a significant return on investment can set your company apart from your competitors in today’s marketplace. Whether it is identifying purchasing trends, profitable business, leveraging current client relationships or viewing consolidated corporate data, it can lead to faster and more intelligent business decisions.
Software Bloc Business Intelligence, Data warehouse Design and Development capabilities:
- ETL extraction transformation-load for multiple source reformat and cleansing
- Knowledge integrity management and enhancement
- Metadata management
- OLAP online analytical processing for shared multidimensional information fast analysis
- Data mining as knowledge recovery
- Real time personalization, e.g. active customer profiling and fulfillment
- Enterprise reporting and ad hoc query implementation
- Data warehousing administration and management
- BI-DW security components
Now you can unleash the hidden potential of your data houses with our Data Warehousing and Mining Services and tackle business challenges with better knowledge and greater confidence
Software Bloc has the ability to deliver information security solutions on a fixed cost or a time and materials basis. Expertise includes –
- Public key infrastructure – PKI
- eCommerce Security – SEAcurity, CheckPoint orNetegrity
- Network, firewall and VPN Security
- Encryption – Certification
- Token and smart card ID
Our Security Services Include:
- Initial Study
- Transaction and Gap Analysis
- Security Framework Design
- Application Development
- Integration and firewall Testing
- Quality assurance review
- Intrusion Detection implementation
- Policies and Procedures training
- Audits and Redesign
Software Bloc has developed a single sign-on, dual authentication security product called SEAcurity (Secure Enterprise Authentication). SEAcurity provides integrated corporate security against internal threats and is an activity monitoring system with single sign-on benefithas developed a single sign-on, dual authentication security product called SEAcurity (Secure Enterprise Authentication). SEAcurity provides integrated corporate security against internal threats and is an activity monitoring system with single sign-on benefit
Modules of SEAcurity include:
SEAsso and SEAAccess: With single sign-on (SSO), the password is simplicity. Software Bloc developed a suite of applications that authenticate users and allow them access to applications they are authorized to use. The need to remember multiple user names and passwords can be completely eliminated with the SEAcurity solution. SEAaccess allows the user two level authentication by have something and knowing something. What they have is a token (or smart card) and what they know is a password.
SEAtrack: Administration/management enterprise-wide activity tracking provides user-friendly reports on applications accessed, URL’s visited, print jobs, and information copied to fixed or portable storage media.
.SEAcrypt: Enables users to encrypt and decrypt files, folders and drives. Standard algorithms protect data.
SEAtime: Seamlessly integrates attendance time stamping, task tracking, and task assignment. .
SEAdoor: Tracks door access.
Software Bloc’s experience delivering client-server solutions dates from 1993. Sectors served include financial, manufacturing, academic, government, utilities and transportation. Expertise includes C, C+, MS Visual C++ and Visual Basic, Borland C++, Oracle, Oracle Developer/2000, MS SQL Server, MS Access, Sybase, IBM Informix, Novell, and Unix applications UHP-UX, Solaris, and AIX.
RSI’s experience delivering mainframe solutions dates from 1993. Sectors served include financial, manufacturing, academic, government, utilities and transportation. Integration of legacy systems is an important core competency.
Software Bloc provides solutions covering Technology Infrastructure Design, Development and Maintenance. Network Design, Development and Maintenance Infrastructure & Network Auditing Services. Security Solutions – both Internal & External .
- Technology infrastructure design, development and maintenance
- Firewalls ,Intrusion Detection
- Security Procedures & Policies
- Business Continuity Services
- Disaster Recovery
- Authentication Solutions, Infrastructure and network auditing services and
- Network design, development and maintenance
- Single – Sign On Solutions
- Security Auditing
With HIPAA legislation being passed into law no other authority has affected the health care industry in such a manner in over 30 years. All organizations involved in healthcare; from providers to insurance payers; including private entities and government agencies have been mandated to comply with the regulations.
HIPAA will have varying degrees of implications in the market as each affected organizations will have its own specific circumstances which will dictate the measures needed to become compliant. Overall, the aggregated impact of HIPAA to the health care industry is at least equivalent with that of the Y2K impact, and may be considerably more significant in many cases. Unlike Y2K, HIPAA requires not only significant information technology modifications but also, enforces equally and in some cases more significant, procedural and policy transformations.
HIPAA security standards require changes in the healthcare industry’s information security procedures and practices. This white paper will focus on authentication requirements of access control to electronic medical information and provide a summary about HIPAA security requirements, industry implications, and the measures that will be need to be implemented. We will discuss how employing some fundamental security measures will satisfy HIPAA regulations and create a tangible Return On Investment.
Applicability and Scope
The Security regulations apply to all uniquely identifiable health information that is in electronic form, regardless if it is being stored or transmitted. This includes all administrative and financial healthcare transactions covered by the HIPAA Transactions Standards Rule, including internal transmissions, reviews, and access. All healthcare entities that handle this information, including providers, health plans, and clearinghouses that electronically store or transmit individual health information will be required to comply.
The Security Regulations apply to both external and internal security threats and vulnerabilities. Threats from “outsiders” include breaking through network firewalls, e-mail attacks through interception or viruses, compromise of passwords, posing as organization “insiders,” computer viruses, and modem number prefix scanning. These activities can result in denial of service, such as the disruption of information flow by “crashing” or overloading critical computer servers. The outsider may steal and misuse proprietary information, including individual health information. Attacks can also affect the integrity of information, by corrupting data that is being transmitted.
Internal threats are of equal concern, and in many cases a greater concern, they are far more likely to occur according to industry security experts and statistically they prove to exist a great harm and destruction potential. Organizations must protect against careless staff or others who are unaware of security issues, and probing or malicious insiders who deliberately take advantage of system vulnerabilities to access and misuse personal health information.
This category of security standards is focused on preventing unauthorized individuals from gaining access to electronic information.
Five areas of physical safeguards include:
1. Assigned Security Responsibility – officially assigning responsibility for information security.
2. Media Controls – setting up formal procedures for controlling and tracking the handling of hardware and software, and for data backup, storage and disposal.
3. Physical Access Controls – developing a facility security plan, and setting up disaster recovery, emergency modes, and other access and handling controls.
4. Work Station Use – policies and procedures to prevent unauthorized access to protected information on workstations and terminals.
5. Security Awareness Training – awareness training for all employees and others with physical access to protected health information.
Technical Security Services
Technology security services are often governed by the particular technologies and data systems in use. Covered entities are expected to balance the need for timely access to needed health information with the need to protect its confidentiality and integrity. The Rule provides for five areas of technical security services:
1. Access Control – providing controls limiting access to health information to those with valid needs and authorization.
2. Audit Controls – setting up system mechanisms that record and monitor activity
3. Authorization Control -obtaining and tracking the consents of patients for use and disclosure of their health information.
4. Data Authentication – ensuring that data is not altered, destroyed or inappropriately processed
5. Entity Authentication – employing mechanisms such as automatic logoff, passwords, PINs and biometrics, which identify authorized users and deny access to, unauthorized users.
The core requirements are as follows:
|Chain of trust partner agreement||Physical access controls|
|Contingency plan||Policy guideline on work station use Secure work station location|
|Formal mechanism for processing records||Security awareness training|
|Information access control||Access control (context based)|
|Internal audit||Audit controls|
|Security configuration management||Authorization control|
|Security incident procedures||Cryptography|
|Termination procedures||Unique user identification|
|Training||Communication network controls|
|Assigned security responsibilities||Digital signature|
For the Requirements listed below, one or more of the given Implementation features must be in place in order to provide appropriate security for electronic health information. Which feature(s) will provide the most appropriate level of security, confidentiality and privacy must be determined by
(1) the management of the individual enterprise housing the information and
(2) the trading partners exchanging the information, and will be dependent upon the level of risk deemed acceptable by that enterprise or trading partnership.
|Authentication (one or more of the listed implementation features must be implemented)||Automatic log off|
|Authorization control (one or more of the listed implementation features must be implemented)||Role-based access / User-based access|
|Cryptography (If cryptology is employed, one or more of the listed implementation features must be implemented)||Confidentiality protection using encryption|
|Integrity protection/Mandatory access controls (MAC)|
|Implications of the Security Standards for the Healthcare Industry|
Being the largest producer of GDP in the United States the healthcare industry has been the slowest to implement technology processes to manage day-to-day processes. With the current deployed technology it has also lacked in addressing information security in a comprehensive manner. Most healthcare organizations have security features in their information systems but those features are outdated, not followed, and/or disregarded. They further typically do not have written policies or procedures for their employees that are authorized to access the information, such as policies on disclosure of sensitive information or personnel policies dictating the types of personnel actions that will be taken if staff members violate the policies.
Automated medical information also highlights concerns about information availability, particularly as more clinical information is stored electronically. Ensuring information availability through appropriate access and data integrity (i.e., knowing that the information in an organization’s systems has not been inappropriately or inadvertently changed and that it is not at risk of being lost if the system fails) may be as important as confidentiality. Part of the Administrative Simplification provisions’ stated purpose is “encouraging the development of a health information system.” Such a system is intended to support access to critical health information when and where it is needed. Information systems can only ensure availability if the systems are working and the information is not easily changed.
HCFA’s proposed standards imply that healthcare organizations will develop security programs that include technological solutions, but recognize that the persistent risk, regardless of the level of technical security, is through the people who have authorized access rather than “hackers”. Consequently a number of the standards address personnel and physical site access, e.g., personnel security, training, termination procedures for both physical and system access and physical access controls.
HCFA, at present, is not planning to require either encryption or digital signature under the security standards for non-Medicare information. Therefore the most significant technical requirements may be the audit controls and the “accountability (tracking) mechanism. At present HCFA is not planning to stipulate the extent of the audit requirement, again relying on the organization’s determination regarding the level of appropriate auditing. Certain types of information may warrant 100% audit trail, for instance, organizations may want to closely monitor access to AIDS or substance abuse information.
Technical Security Services to Guard Data Integrity Confidentiality, and Availability
(If communications or networking is employed, the following four implementation features must be implemented:• Alarm, event reporting, and
• Entity authentication
• Integrity controls
• Message authentication)
|Alarm, event reporting, and audit trail|
|Digital signature (If digital signature is employed, the following four implementation features must be implemented:• Message integrity|
• User authenticationOther implementation features are optional)
|Ability to add attributes|
|Continuity of signature capability|
Technical Security Services to Guard Data Integrity, Confidentiality and Availability
|Access control||Access control|
|The following implementation feature must be implemented: Procedure for emergency access. In addition, at least one of the following three-implementation features must be implemented: Context-based access, Role-based access, User-based access. The use of Encryption is optional.||• Context-based access• Encryption• Procedure for emergency access• Role-based access• User-based access|
|Audit Control / Data Authentication||Audit Control / Data Authentication|
|Authorization control – At least one of the listed implementation features must be implemented.||• Role-based access• User-based access|
|Data Authentication||Data Authentication|
|Entity authentication – The following implementation features must be implemented: Automatic logoff, Unique user identification. In addition, at least one of the other listed implementation features must be implemented.||• Automatic logoff• Token• Password• PIN• Unique user identification• Biometric|