Skip to main content
Patient Protect circular logo mark in purple and white used for site navigationPatient Protect

Security & Trust

We built Patient Protect like attackers were already inside.

Security is not a feature we added. It is the architecture we started with. Patient Protect was designed from the ground up by combining security infrastructure designed for clinical and government healthcare environments with clinical compliance expertise — an architecture assembled by our founder to solve a problem no single discipline could address alone.

Zero Trust·AES-256-GCM·TLS 1.3·AppSensor IDS·AWS

Security architecture

Eight layers between an attacker and your patient data.

Encryption is necessary but not sufficient. Patient Protect adds a defense-in-depth security layer — multiple independent controls so that compromising one does not expose the system. This architecture works alongside your existing compliance program or as your complete security foundation.

AES-256-GCM Encryption

All data encrypted at rest using AES-256-GCM with authenticated encryption. ePHI is never stored in plaintext — not in the database, not in logs, not in backups.

NIST-standardized (FIPS 197). The same encryption standard used across federal government systems.

TLS 1.3 in Transit

Every connection uses TLS 1.3 with forward secrecy. Downgrade attacks are blocked at the protocol level. No legacy cipher suites permitted.

HSTS enforced. Certificate transparency monitored.

Zero Trust Architecture

No implicit trust. Every request is authenticated, authorized, and validated regardless of network origin. Session tokens are cryptographically bound to device fingerprints.

Defense-in-depth — compromise of one layer does not expose the system.

AppSensor Intrusion Detection

Real-time behavioral analysis detects anomalous access patterns — brute force, credential stuffing, session hijacking, and privilege escalation — before damage occurs.

Automated response pipeline: AppSensor → rate limiting → Fail2Ban → IP block.

Role-Based Access Controls

Eight defined user roles with granular permissions. No shared accounts. Unique authentication per user with multi-factor enforcement. Session timeouts after inactivity.

Principle of least privilege enforced at every access point.

Hardened Infrastructure

AWS-hosted with dedicated VPC, private subnets, and no public-facing database endpoints. PostgreSQL with parameterized queries — SQL injection is architecturally prevented.

Nginx reverse proxy with request filtering. No direct application exposure.

Immutable Audit Logging

Every access, modification, and administrative action is logged with timestamp, user identity, IP address, and action detail. Logs cannot be modified or deleted by any user, including administrators.

Audit trails retained for 6+ years per HIPAA requirements.

Breach Simulation & Testing

Regular vulnerability scanning with zero Critical, High, or Medium findings. Attack surface continuously monitored. Breach simulation models real-world attack scenarios against your practice profile.

Independent security assessment — not self-reported.

Independent assessment

Zero Critical, High, or Medium findings.

Patient Protect is independently scanned for network vulnerabilities, application security flaws, and configuration weaknesses. Our most recent assessment — conducted by Pentest Tools in April 2026 — returned zero findings at Critical, High, or Medium severity levels.

This is not self-reported. The scan was performed by an external security platform against our live infrastructure using automated deep scanning methodology.

0

Critical, High, or Medium vulnerabilities

Pentest Tools deep scan — April 2026

Who built this

One architect. Two domains of expertise. One platform.

Alexander Perrin

Alexander Perrin

CEO & Platform Architect

  • Designed the overall security + compliance architecture
  • 20 years enterprise technology
  • Assembled the clinical + security team and product vision
Joseph A. Perrin

Joseph A. Perrin

Chief Technology Officer

  • Clinical systems & healthcare infrastructure architect
  • Zero Trust security architecture
  • Clinical and government healthcare infrastructure
Angie Perrin, RDH

Angie Perrin, RDH

Chief Security Officer

  • Certified HIPAA Privacy Consultant (CHPC)
  • 10+ years clinical healthcare experience
  • Registered Dental Hygienist

Our own compliance

We hold ourselves to the same standard we set for your practice.

Patient Protect is a HIPAA business associate. We execute a BAA with every customer and maintain our own compliance program — not as a marketing exercise, but as an operational requirement.

  • Business Associate Agreement executed with every customer before data processing begins
  • Annual Security Risk Assessment conducted on our own infrastructure
  • Workforce security training completed by all team members annually
  • Incident response plan tested and updated quarterly
  • Vendor BAAs maintained with all third-party service providers
  • Data retention and disposal policies enforced programmatically

Ready?

Security you can verify. Compliance you can prove.

Patient Protect gives your practice security architecture built on the same standards used in federal systems — at a price a five-person dental office can afford.

14-day free trial · No charge until trial ends