INPURSUIT HEALTH
InPursuit Health
All Systems Operational

Security Is Not a Feature.
It’s Our Foundation.

InPursuit Health was built for the most security-sensitive environments on earth. Every byte of your health data is protected by the same defense-grade infrastructure trusted by the Department of Defense and Veterans Affairs.

Compliance & Certifications
HIPAA
✓ Compliant
Full administrative, physical, and technical safeguards for Protected Health Information (PHI).
FedRAMP
✓ Aligned
Federal Risk and Authorization Management Program cloud security standards.
TEFCA
✓ Compliant
Trusted Exchange Framework and Common Agreement for nationwide health data exchange.
FHIR R4
✓ Native
HL7 Fast Healthcare Interoperability Resources for standardized health data exchange.
SOC 2 Type II
✓ Framework
Service Organization Control standards for security, availability, processing integrity, and confidentiality.
HITRUST CSF
✓ Framework
Health Information Trust Alliance Common Security Framework for healthcare risk management.
CARIN Alliance
✓ Member
Creating Access to Real-time Information Now — advancing consumer-directed exchange for health data.
DIMEhealth
✓ Aligned
Digital Medicine Society standards for digital health technology evidence generation and evaluation.

Defense Architecture

Six layers of defense between
your data and everything else.

01
Perimeter Security
Web application firewall, DDoS protection, and real-time threat intelligence. Every external request is authenticated and inspected before it touches our network.
02
Zero Trust Network
No implicit trust. Every user, device, and service must verify identity on every request. Microsegmentation isolates workloads and prevents lateral movement.
03
End-to-End Encryption
AES-256 encryption at rest, TLS 1.3 in transit. Patient data is encrypted from the moment it enters our system until the moment you access it. We cannot read it.
04
AI Oversight Layer
Model-agnostic AI orchestration ensures no algorithm makes a decision without a human safety net. Every AI recommendation is auditable, explainable, and reversible.
05
Immutable Audit Trail
1.8M+ transactions per hour, each cryptographically logged. Every access to your data — who, what, when, where — is permanently recorded and tamper-proof.
06
Patient-Controlled Access
Granular consent management gives you complete control. You decide who sees your data, for how long, and can revoke access instantly with a single tap.

Our Security Principles

Built on zero trust.
Verified at every layer.

Never Trust, Always Verify
Every request is authenticated regardless of origin. Internal and external traffic are treated with equal scrutiny.
Least Privilege Access
Every user and service has the minimum access necessary. Permissions are granted per-session, not permanent.
Continuous Monitoring
24/7/365 automated threat detection with machine learning anomaly detection. We find threats before they find you.
Data Sovereignty
Your data stays in the United States on FISMA-certified infrastructure. We never offshore your health information.
Transparent Reporting
Regular security reports, incident disclosures, and penetration test summaries available to all stakeholders.
Patient Rights First
We will never sell, share, or monetize your health data. Period. Your data is yours — we are custodians, not owners.

Found a vulnerability?
We want to know.

We maintain a responsible disclosure program and welcome security researchers to help us protect our patients. Report potential vulnerabilities to our security team.

Report a Vulnerability →