Dentrix

Last updated
Dentrix
Developer(s) Henry Schein
Stable release
Dentrix G7.5
Operating system Microsoft Windows
Type Practice Management Software
License Proprietary
Website www.dentrix.com

Dentrix was the first dental practice management software for Microsoft Windows when it was launched in 1989 by Dentrix Dental Systems, a firm founded by Larry M. Gibson in 1985 and is based in American Fork, Utah. The Dentrix dental practice management system was designed to automate as many of the functions within the dental office as possible.

Contents

History

In 1997, Henry Schein, Inc. purchased Dentrix Dental Systems, which became Henry Schein Practice Solutions or HSPS and has continued to develop and release new versions and products. The firm at one point provided their own digital imaging software, Dentrix Image. In 2007, the Dentrix Image product was sold to DEXIS, LLC. [1]

Product features

Dentrix products include practice management software for dental offices, imaging software, patient education software, computer-based training software, voice recognition software, and other products designed to enhance the dental office experience.

In 2012, the firm launched the Dentrix Developer Program (DDP), [2] a program allowing third party vendors to access the Dentrix database through APIs. The program has steadily grown since then to include more than 250 vendors from all over the applications spectrum. [3]

Dentrix vulnerabilities

When Dentrix G5 was released to the market, the client and server was vulnerable to packet sniffing. If someone finds the password to their site, then they would know the password to all sites. This was fixed in G5 PP1 HotFix 1. Now the password is randomly generated. [4]

Dentrix G6 uses Data Camouflage. From US-CERT.GOV, "Faircom c-treeACE provides a weak obfuscation algorithm (CWE-327) that may be unobfuscated without knowledge of a key or password. The algorithm was formerly called Faircom Standard Encryption but is now called Data Camouflage." [5]

Dentrix G6 uses Hard Coded Credentials. [6] [7]

Federal Trade Commission Fine

In 2016, The Federal Trade Commission reported that Henry Schein, the provider and distributor of Dentrix, will be forced to pay $250,000 to settle Federal Trade Commission charges it falsely advertised the level of encryption it provided to protect patient data in the software Dentrix G5. [8]

See also

Related Research Articles

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991.

The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.

<span class="mw-page-title-main">Backdoor (computing)</span> Method of bypassing authentication or encryption in a computer

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptosystems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).

<span class="mw-page-title-main">Internet security</span> Branch of computer security

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

LAN Manager is a discontinued network operating system (NOS) available from multiple vendors and developed by Microsoft in cooperation with 3Com Corporation. It was designed to succeed 3Com's 3+Share network server software which ran atop a heavily modified version of MS-DOS.

Medical practice management software (PMS) is a category of healthcare software that deals with the day-to-day operations of a medical practice including veterinarians. Such software frequently allows users to capture patient demographics, schedule appointments, maintain lists of insurance payors, perform billing tasks, and generate reports.

Henry Schein, Inc. is an American distributor of health care products and services with a presence in 32 countries. The company is a Fortune World's Most Admired Company and is ranked number one in its industry for social responsibility by Fortune magazine. Ethisphere named Henry Schein as one of the 2023 World's Most Ethical Companies for the 12th consecutive year.

<span class="mw-page-title-main">CERT Coordination Center</span>

The CERT Coordination Center (CERT/CC) is the coordination center of the computer emergency response team (CERT) for the Software Engineering Institute (SEI), a non-profit United States federally funded research and development center. The CERT/CC researches software bugs that impact software and internet security, publishes research and information on its findings, and works with businesses and the government to improve the security of software and the internet as a whole.

Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. It is used to prevent unauthorized access to data storage.

There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.

<span class="mw-page-title-main">KWallet</span> Password manager

KDE Wallet Manager (KWallet) is free and open-source password management software written in C++ for UNIX-style operating systems. KDE Wallet Manager runs on a Linux-based OS and Its main feature is storing encrypted passwords in KDE Wallets. The main feature of KDE wallet manager (KWallet) is to collect user's credentials such as passwords or IDs and encrypt them through Blowfish symmetric block cipher algorithm or GNU Privacy Guard encryption.

Computers and software have been used in dental medicine since the 1960s. Since then, computers and information technology have spread progressively in dental practice. According to one study, in 2000, 85.1% of all dentists in the United States were using computers.

DexCom, Inc. is a company that develops, manufactures, produces, and distributes continuous glucose monitoring (CGM) systems for diabetes management. It operates internationally with headquarters in San Diego, California, and has manufacturing facilities in Mesa, Arizona and Batu Kawan, Malaysia.

<span class="mw-page-title-main">Patterson Companies</span> Medical multinational company

Patterson Companies Inc is a medical supplies conglomerate primarily in the business of veterinary and dental products. Traditionally a dental company, it diversified its business at the turn of the millennium when it acquired 55-year-old company, JA Webster Inc, a distributor of veterinary products. That business segment currently distributes equipment and medicine. The company operates directly in only the US and Canada.

The following outline is provided as an overview of and topical guide to computer security:

Biometric tokenization is the process of substituting a stored biometric template with a non-sensitive equivalent, called a token, that lacks extrinsic or exploitable meaning or value. The process combines the biometrics with public-key cryptography to enable the use of a stored biometric template for secure or strong authentication to applications or other systems without presenting the template in its original, replicable form.

<span class="mw-page-title-main">KRACK</span> Attack on the Wi-Fi Protected Access protocol

KRACK is a replay attack on the Wi-Fi Protected Access protocol that secures Wi-Fi connections. It was discovered in 2016 by the Belgian researchers Mathy Vanhoef and Frank Piessens of the University of Leuven. Vanhoef's research group published details of the attack in October 2017. By repeatedly resetting the nonce transmitted in the third step of the WPA2 handshake, an attacker can gradually match encrypted packets seen before and learn the full keychain used to encrypt the traffic.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.

References

  1. "Danaher/Dexis/Dentrix Update". 2007-01-10. Retrieved February 6, 2012.
  2. "John Flucke's Dental Technology Blog - Ramblings of Dentistry's Technology Evangelist: HENRY SCHEIN PRACTICE SOLUTIONS LAUNCHES DENTRIX® G5". blog.denticle.com. Retrieved 2016-03-08.
  3. "Dentrix Developer Program - Dentrix". dentrix.com. Retrieved 2016-03-08.
  4. "CERT/CC Vulnerability Note VU#948155".
  5. "CERT/CC Vulnerability Note VU#900031".
  6. "Hard-coded credentials placing dental offices at risk". 19 May 2015.
  7. "Dentrix G7 Integrations Made Easy | Kolla". www.getkolla.com. Retrieved 2023-07-13.
  8. "Dental Practice Software Provider Settles FTC Charges It Misled Customers About Encryption of Patient Data". 5 January 2016.

Capterra reviews for Dentrix: https://www.capterra.com/p/2329/Dentrix/#reviews