Compass Infrastructure & Security    Strength, Security, Reliability

Available Data
In our experience, there is no such thing as a "standard report", to us a standard report is any report your organization requires.  To this end Compass provides a data mining tool that allows the Hospital staff to have access to any data metric from Compass for use in whatever reporting needs they require.

 

Open Architecture
Compass is a packaged application using a high powered Application Server coupled with a supercharged SQL database.   HOWEVER If the Hospital requires it, Compass can run on ANY J2EE industry standard application server coupled with ANY industry standard SQL database.  Examples of compatible application servers are Oracle, IBM WebSphere, BEA Weblogic, and a host of others.  Examples of compatible databases are Oracle, Microsoft SQL Server, Sybase SQL Anywhere, MySQL, and a host of others.

J2EE
Compass has been built using the very latest in web-based development technology known as Java 2 Enterprise Edition or J2EE for short.  J2EE is an extremely scalable, available, and secure architecture.  J2EE allows us to focus on building very rich and functional web-based applications that are also very stable, durable, and can support thousands of simultaneous users if necessary.  Unlike other platforms, J2EE architecture allows us to deploy Compass on high-powered cost contained server technology; this approach contains costs for the Hospital while providing outstanding performance.

Performance Evaluation and Job Description Development Software with Advanced Metrics Tracking

Compass AWS Infrastructure Certifications

Compatible
Compass is capable of exchanging data with most all HR and ERP systems available on the market today, including PeopleSoft, Lawson, JDEdwards, ADP, SAP, ORACLE, and any other system built with today’s open architecture standards.

Compass Technology    Robust, Open, Leading Edge

World Class Protection in Partnership with Amazon Web Services (AWS)
The Compass AWS cloud infrastructure is housed in AWS's highly secure data centers, which utilize state-of-the art electronic surveillance and multi-factor access control systems. Data centers are staffed 24x7 by trained security guards, and access is authorized strictly on a least privileged basis. All personnel must be screened when leaving areas that contain customer data. Environmental systems in the datacenters are designed to minimize the impact of disruptions to operations, and multiple geographic regions and Availability Zones allow you to remain resilient in the face of most failure modes, including natural disasters or system failures.The AWS infrastructure has been designed to provide optimum availability while ensuring complete customer privacy and segregation. Network traffic between AWS Regions, Availability Zones and individual datacenters travels over private network segments by default. These private network segments are fully isolated from the public Internet and not routable externally. AWS resources can be configured to reside only on isolated AWS network segments and avoid utilizing any public IP addresses or routing over the public Internet. For a complete list of all the security measures built into the AWS cloud infrastructure, platforms, and services, please read our Overview of Security Processes Whitepaper.