Franck Calcavecchia, Information Security Officer of HUG

Given the multitude of sites to be protected, we need to be able to take into account different factors and adapt the security layer according to the needs of each one. For example, for sites that are accessible from a personal device, the protocol to be implemented is different than if it is “simply” the hospital intranet