Our commitment to safeguarding your health data

At Optum, we work tirelessly to protect health information from potential cyber threats. Our healthcare cybersecurity capabilities constantly evolve to respond to new threats, both foreign and domestic.

As a global leader, we partner with information security experts from around the world to deliver industry standard security and comply with local, national and international health regulations. 

 

.

 

Monitor 24x7x365

Our proactive monitoring systems detect and respond to security events and threats in real time, safeguarding both our enterprise and the individuals we serve.

Validate

We regularly validate our environments and procedures to stay ahead of the evolving threat landscape, ensuring we are always prepared for new challenges.

Defend

We continuously update our security protocols to protect our platforms and those of our business partners from potential attacks.

Healthcare cybersecurity for a changing world

At Optum, we constantly evolve our security and privacy efforts by using machine learning, AI, graph databases and other advanced technologies.

We protect data through encryption, tokenization and de-identification. Our hybrid cloud approach supports hosting data in the most relevant location for each task.

Our approach:

  • Own and operate data centers and cloud-hosting processes with a security-first mindset

  • Build APIs to Fast Healthcare Interoperability Resources (FHIR) security standards

  • Use an AI toolkit to enhance operational performance 

  • Augment security controls for real-time decision-making

  • Adopt cyber forensics and incident response capabilities that are frequently tested and hardened 

  • Seek out vulnerabilities through simulated attacks that strengthen threat recognition and response

 

Data and protective analytics

Our teams develop sophisticated algorithms that identify suspicious, unauthorized or fraudulent patterns. These algorithms predict vulnerabilities and continuously improve as they collect more data. 

Data governance in the cloud

Optum protects and governs data across data centers and in multiple cloud environments. Our protocols go far beyond the security levels of public cloud providers. Every engineer receives in-depth security training before they can deploy any data to the cloud.

Mitigating zero-day attacks

Our network-intrusion protection system analyzes daily patterns for unusual activity. We use threat intelligence and other preventive measures to maintain a resilient firewall with up-to-date patches. 

Marketplace updates

Subscribe to The Spark

We're adding new products and services to rapidly expand our marketplace and the potential is huge. Be an early adopter and stay ahead of the trend with our bi-weekly e-updates.

Explore some more

We’re adding new products and services to rapidly expand our marketplace and the potential is huge.