Patient ProtectPatient Protect

Security & Trust

We built Patient Protect like attackers were already inside.

Security is not a feature we added. It is the architecture we started with. Patient Protect was designed from the ground up by combining military-grade security infrastructure with clinical compliance expertise — an architecture assembled by our founder to solve a problem no single discipline could address alone.

Zero Trust·AES-256-CBC·TLS 1.3·AppSensor IDS·AWS

Security architecture

Eight layers between an attacker and your patient data.

Most compliance platforms encrypt data and call it secure. Patient Protect implements defense-in-depth — multiple independent security layers so that compromising one does not expose the system.

AES-256-CBC Encryption

All data encrypted at rest using AES-256-CBC with authenticated encryption. ePHI is never stored in plaintext — not in the database, not in logs, not in backups.

NIST-approved, same standard used by U.S. government classified systems.

TLS 1.3 in Transit

Every connection uses TLS 1.3 with forward secrecy. Downgrade attacks are blocked at the protocol level. No legacy cipher suites permitted.

HSTS enforced. Certificate transparency monitored.

Zero Trust Architecture

No implicit trust. Every request is authenticated, authorized, and validated regardless of network origin. Session tokens are cryptographically bound to device fingerprints.

Defense-in-depth — compromise of one layer does not expose the system.

AppSensor Intrusion Detection

Real-time behavioral analysis detects anomalous access patterns — brute force, credential stuffing, session hijacking, and privilege escalation — before damage occurs.

Automated response pipeline: AppSensor → rate limiting → Fail2Ban → IP block.

Role-Based Access Controls

Nine defined user roles with granular permissions. No shared accounts. Unique authentication per user with multi-factor enforcement. Session timeouts after inactivity.

Principle of least privilege enforced at every access point.

Hardened Infrastructure

AWS-hosted with dedicated VPC, private subnets, and no public-facing database endpoints. PostgreSQL with parameterized queries — SQL injection is architecturally impossible.

Nginx reverse proxy with request filtering. No direct application exposure.

Immutable Audit Logging

Every access, modification, and administrative action is logged with timestamp, user identity, IP address, and action detail. Logs cannot be modified or deleted by any user, including administrators.

Audit trails retained for 6+ years per HIPAA requirements.

Breach Simulation & Testing

Regular vulnerability scanning with zero Critical, High, or Medium findings. Attack surface continuously monitored. Breach simulation models real-world attack scenarios against your practice profile.

Independent security assessment — not self-reported.

Independent assessment

Zero Critical, High, or Medium findings.

Patient Protect is independently scanned for network vulnerabilities, application security flaws, and configuration weaknesses. Our most recent assessment returned zero findings at Critical, High, or Medium severity levels.

This is not self-reported. Independent security assessment means an external party evaluates the system without our influence on the methodology or findings.

0

Critical, High, or Medium vulnerabilities

Latest independent security assessment

Who built this

One architect. Two domains of expertise. One platform.

Alexander Perrin

Alexander Perrin

CEO & Platform Architect

  • Designed the overall security + compliance architecture
  • 15 years enterprise technology
  • Assembled the clinical + security team and product vision
Joseph A. Perrin

Joseph A. Perrin

Chief Technology Officer

  • Former government CTO
  • Military-grade security architecture
  • Federal-level secure infrastructure design
Angie Perrin, RDH

Angie Perrin, RDH

Chief Security Officer

  • Certified HIPAA Privacy Consultant (CHPC)
  • 10+ years clinical healthcare experience
  • Registered Dental Hygienist

Our own compliance

We hold ourselves to the same standard we set for your practice.

Patient Protect is a HIPAA business associate. We execute a BAA with every customer and maintain our own compliance program — not as a marketing exercise, but as an operational requirement.

  • Business Associate Agreement executed with every customer before data processing begins
  • Annual Security Risk Assessment conducted on our own infrastructure
  • Workforce security training completed by all team members annually
  • Incident response plan tested and updated quarterly
  • Vendor BAAs maintained with all third-party service providers
  • Data retention and disposal policies enforced programmatically

Ready?

Security you can verify. Compliance you can prove.

Patient Protect gives your practice the same security architecture that protects federal systems — at a price a five-person dental office can afford.

14-day free trial · No charge until trial ends