Security

Healthcare's Most Secure RCM

ENTER's Revenue Cycle Management platform and APIs ensure maximum compliance with security and compliance. ENTER is SOC 2 Type 2 certified. See our trust center to learn more.

Risk & Compliance

Automate While Staying Compliant

Our adherence to the strictest security frameworks means peace of mind for both you and your patients.

SOC 2

We have been SOC 2 Type 2 certified since Aug 15, 2022

HIPAA

We are HIPAA compliant and signing a BAA will ensure even stronger data controls.

Secure Storage

100% of data stored at rest is encrypted using the latest encryption standards and products.

Privacy

We have some of the strongest privacy policies in the game. Please review them here.

Product

Best Practices Built-In

We engineer our product with your security needs in mind, both its features and the processes we use to make them.

User Security

ENTER ensures users can configure roles for each organization they may need to manage, including full access, read and write, and read-only for their users.

Uptime

ENTER ensures users can configure roles for each organization they may need to manage, including full access, read and write, and read-only for their users.

Secure Frameworks

ENTER ensures users can configure roles for each organization they may need to manage, including full access, read and write, and read-only for their users.

Continuous Vulnerability Scanning

We employ continuous vulnerability and penetration testing both in-house and outsourced.

Secure Development Lifecycles

Our software development lifecycles include linting, unit tests, integration tests, static analysis, and known vulnerability scans.

Hashing and Encryption

Passwords are one-way hashed and sensitive keys are encrypted using Amazon KMS.

Infrastructure

Encrypted and Secure

Security doesn't start or end with us. That's why we follow strict protocols when working with 3rd parties.

Monitoring

ENTER hosts our application using data centers provided by Amazon Web Services and have many monitoring features enabled to ensure availability and security.

Secure Transport

Enter ensures all data that we handle is encrypted while in transit (allowing only TLS 1.2+ cipher-suites)

Secure Storage

100% of data stored at rest is encrypted using the latest encryption standards and products.

Least Privilege

All IAM and user credentials are scoped to only what is necessary to get the job done for that role.

Network Segregation

Production and sandbox accounts are provisioned within their own network segmented zones.

Data in the Cloud

We don't store data on-premise

Corporate

Compliance is our Culture

Beyond the smartest frameworks, what makes the difference is working with a team that takes security seriously.

Training

All employees and contractors are trained at least annually on latest data security issues as well as HIPAA compliance.

Endpoint Management and Monitoring

All employee and contractor devices deploy with leading endpoint protection.

Access Review

All access granted is continuously reviewed with least privilege philosophy being employed.

VPN

All internal resources must be access via a Virtual Private Network which requires two factor authentication.

Reporting
Reporting
ENTER AIR
ENTER AIR

Ready to Get Started?

Talk to our sales team and see how much ENTER can impact your Revenue Cycle Management today!