Patient ProtectPatient Protect

Platform features

Every feature is connected. That's the point.

Most compliance platforms give you tools. Patient Protect gives you a system that runs itself. There is a difference — and it shows up the day you need to prove you were compliant, not just that you bought software.

5 systems·20 workflows·Built on Zero Trust·Starting at $39/mo

The operating system

Five systems. One operating layer.

System, Defense, Operations, Network, Intelligence — each layer works independently. Together, they close every gap in your compliance standing automatically.

System

Defense

Operations

Network

Intelligence

Your risk intelligence feeds your compliance engine. Your engine gates your network. Your network generates your audit trail. Everything connects.

Security architecture

The security is the foundation.

Every architectural decision was made for practices that can't afford to get it wrong.

Intrusion-Aware by Design

Invalid input is treated as evidence of malicious intent — detected, rejected, logged, and escalated. AppSensor detection feeds directly into Fail2Ban enforcement. Attack once, get watched. Attack twice, get banned.

Only Patient Protect

On-Premises AI. Zero PHI Exposure.

The only HIPAA compliance platform with a locally-running AI assistant. Your data never touches a cloud model — no API calls, no training exposure, no third-party processing.

AES-256-GCM Authenticated Encryption

The same standard used for classified government data. Not just ‘we encrypt your data’ — authenticated encryption that proves data hasn’t been tampered with in session. TLS 1.3 in transit. No legacy fallbacks.

Session Hijack Detection

Every request validates that the person using the session is the person who started it. Browser fingerprint, IP, device — any mismatch means immediate termination. Critical for shared-device clinical environments.

Parameterized Database Access

Every database query uses PostgreSQL prepared statements. SQL injection isn’t prevented by filtering — it’s architecturally impossible. No ORM shortcuts, no string concatenation.

Nightly Breach Intelligence

HHS OCR breach data ingested every night. Your dashboard reflects the live threat landscape — not last quarter’s.

Defense at Every Layer

Browser fingerprinting, per-tab tracking, lockout cascades, and IP banning — enforced before requests reach the application layer.

OWASP and NIST, Applied

Built against OWASP Top 10 and NIST Cybersecurity Framework — applied as architecture by a former government CTO, enforced at every endpoint.

Zero Trust isn't a marketing term here. It's how every endpoint is built.

Platform flow

See your exposure. Close the gaps. Keep it controlled.

Compliance Operations

Patient Protect
Patient Protect risk visibility — Sankey diagram showing attack flow by source, vector, entity type, and severity

Risk visibility

See your exposure. Close the gaps. Keep it controlled.

Live breach intelligence from HHS OCR — mapped by state, trended over time, and contextualized for your practice type.

Three-category compliance scoring with trend indicators

Know if you’re improving or slipping at a glance

Compliance scores update the moment a risk closes

Patient Protect
Patient Protect compliance queue showing auto-generated tasks with priority and status

Compliance queue

Break large compliance work into tasks that can actually get done.

A self-replenishing compliance queue that checks its own conditions. Some items close themselves when requirements are met.

Auto-generated from your risk profile

Prioritized by severity and deadline

Completion creates audit evidence automatically

Patient Protect
Patient Protect office scoring dashboard showing real-time compliance percentage

Real-time standing

Your compliance score reflects where you are right now.

Real-time compliance visibility across every module. Current to this moment, updated as you work.

Score updates as you complete tasks

Every module contributes to the composite score

Evidence generated automatically

Access & Workforce

Patient Protect
Patient Protect role assignment modal showing nine defined workforce roles

Nine defined roles

Keep sensitive workflows, staff roles, and evidence in the same system.

Nine defined roles, from administrator to patient. Every endpoint enforces permissions — no exceptions.

Role hierarchy: Ninja through Patient (0–999)

Every endpoint checks role before serving content

Unexpected input rejected silently — AppSensor on every endpoint

Patient Protect
Patient Protect workforce management showing device access controls per staff member

Workforce compliance

Training delivered. Completion documented. Audit trail automatic.

HIPAA training delivered and tracked inside the platform. Every completion becomes documented, audit-ready evidence.

Policy acknowledgment tracked per staff member

Training completion timestamped

OCR-ready workforce records at all times

Data & Records

Patient Protect
Patient Protect BAA-gated communication modal showing active business associate agreement

BAA-gated communication

Encrypted communication, automatically gated by your compliance status.

Six-state BAA lifecycle — from staging through digital signature to active status — with automatic gating of secure messaging until BAA is active. Non-BAA offices have message content masked. Patient sends hard-blocked without active agreement.

Six-state lifecycle: staging → pending → signed → active → expiring → terminated

BAA status controls messaging access automatically — no manual intervention

Full audit trail on every exchange and every state transition

Patient Protect
Patient Protect ePHI audit log showing per-personnel access records with timestamps

Audit readiness

Track who accessed health data, when, and from where.

Audit-ready by default. Every access logged, every action timestamped, every anomaly flagged.

Immutable access logs

Per-session, per-tab tracking

Export-ready for OCR requests

Intelligence & Alerts

Patient Protect
Patient Protect security threats geographic map showing nationwide breach incident data from HHS OCR

Nightly HHS OCR data

Connect internal readiness with external breach context.

HHS OCR breach data ingested every night. Your dashboard reflects the live threat landscape, not last quarter’s.

National breach map by state

Sector and vector trending

CSV export for board reporting

Patient Protect
Patient Protect live status signal showing fraudulent login attempt rejected with IP and location details

Live status signals

Know the moment something changes.

Security alerts anchor urgency in specific workflow risk. Compliance scores update the moment a risk closes. Your standing is always current.

Security alerts tied to specific compliance gaps

Real-time score adjustments

Prioritization based on current threat landscape

What stays connected

The strongest feature is the system itself.

Most platforms give you twenty separate tools. Patient Protect gives you one operating system that tightens itself.

Complete your SRA and the Autonomous Compliance Engine populates your task queue automatically — no manual task creation.

Until a BAA is active and vendor risk is evaluated, message content is masked for non-compliant offices.

Every staff signature on every policy version is timestamped and stored as OCR-ready, replayable evidence.

Nightly breach intelligence recalculates your penalty exposure model against current enforcement trends.

PHI flow paths feed directly into breach modeling — so you can see exactly where your exposure concentrates.

No module is an island. That's what makes it a system.

The platform connects with live healthcare threat intelligence. Browse the latest in HIPAA Pulse. Or read our research on the platform deficit—why documentation-only compliance fails.

FAQ

What people ask before they switch.

What features does Patient Protect include?

Twenty integrated modules across five layers — System, Defense, Operations, Network, and Intelligence. Core includes 14 modules at $39/month. Pro unlocks all 20 with unlimited AI and expanded training at $99/month.

Does Patient Protect include a HIPAA risk assessment tool?

Yes. The SRA wizard covers every requirement of §164.308(a)(1), generates scores across three categories, and auto-populates your compliance task queue.

Is Patient Protect’s AI assistant HIPAA compliant?

Yes. The only HIPAA compliance platform with an on-premises AI assistant. Zero PHI exposure by architecture, not by policy.

How does Patient Protect handle BAA management?

Full lifecycle: create, send for e-signature, track status, renewal alerts. BAA status gates Secure Messaging automatically.

What security standards does Patient Protect follow?

Built against OWASP Top 10 and NIST CSF. AES-256-GCM encryption, TLS 1.3, browser fingerprinting, AppSensor on every endpoint.

Next step

Hackers don't wait. Neither should you.

No contracts. No consultants. Starting at $39/month.