Aller au contenu principal
← Use Cases · HEALTHCARE / HDS · DICOM

Medical imaging & hospital networks

AllEyes ResilientAgent PQC-WANGARANCE PKI
01 — Analysis

Problem

Regional Hospital Groups (GHT) exchange massive volumes of medical imaging (MRI, CT, radiology) daily via the DICOM protocol between remote sites. These flows travel in cleartext on WANs, exposing patient data to interception. NIS2 and HDS certification now mandate encryption of these communications.

CryptOps Solution

AllEyes Resilient transparently encrypts DICOM flows without modifying imaging protocols or existing PACS. GARANCE PKI provides mutual site authentication via ML-DSA-87 certificates. The immutable audit trail continuously proves HDS and NIS2 compliance.

Deployment architecture

02 — Performance

Key metrics

Full
NIS2 + GDPR
HDS compliance
<5
us
Added latency
DICOM
Transparent
Protocol
Immutable
ML-DSA-87
Audit trail
03 — ROI

ROI analysis

Item Before With CryptOps Impact
NIS2 non-compliance fine Up to 10M EUR or 2% revenue Proven compliance Risk eliminated
HDS certification Non-compliant encryption ANSSI CSPN certifiable (Q3 2026) PQC encryption Requirement covered
Patient data breach (GDPR) 4% global revenue End-to-end encrypted data Maximum protection
04 — Compliance

Applicable regulation

NIS2 Art. 21
Healthcare network security

Mandatory communications encryption for healthcare institutions classified as essential service operators.

HDS (Health Data Hosting)
HDS certification

Encryption requirements for health data in transit and at rest for certified hosting providers.

GDPR Art. 32
Processing security

Mandatory pseudonymization and encryption of personal health data.

05 — Target clients

Target clients

Regional Hospital Groups (GHT) University Hospital Centers (CHU) HDS-certified hosting providers PACS vendors
06 — Business applications

Data processing on the same appliance

Beyond post-quantum encryption, every AllEyes Resilient appliance hosts your data-processing workloads on its FPGA, CPU and GPU resources — all isolated from the certified crypto core.

Next step

Secure your infrastructure today

Our team will guide you through the deployment tailored to your use case.