Comparison to our Competition PDF Print E-mail

Secure Telehealth competes with specialized video conferencing equipment from Polycom, Tandberg (Cisco), and Lifesize (Logitech).

 

Here is how Secure Telehealth compares:

 

polycom

 

 

 

Non-geek version:

  1. Both Secure Telehealth and our competitors provide a great product.   Secure Telehealth delivers our product to you in a fundamentally different way than our competitors do.  Secure Telehealth delivers our product to you via Cloud Computing.   With Cloud computing, all the heavy lifting is done transparently on our end.  Our customers do not have to maintain any servers, firewalls, bridges, or new specialized equipment.   They just download an applet onto their Windows PC Our competitors (Polycom, Tandberg, and Lifesize) deliver their product to you via specialized hardware which you must learn and manage before using it.
  2. Secure Telehealth is better at connecting telehealth endpoints across organizational lines (where the remote physician is presenting from a facility in a different organization, or from home).   This is because Secure Telehealth requires no firewall changes or IT configuration at either site. 
  3. Secure Telehealth is more mobile than our competitors.  Connections can be quickly made wherever broadband Internet access is available, without IT configuration.  Ad hoc endpoints may be added and deleted as business needs dictate.  A new endpoint may be added without any IT involvement, simply by sending an email with a link and a password to enter the secure conference to the new participant. 
  4. Secure Telehealth is particularly useful for on-call situations or consults where physicians provide telehealth coverage from multiple locations (for example, from their professional office or from their home).
  5. Quality:  Both Secure Telehealth and our competitors provide high-quality video (including High Definition) and audio.  Details are below, but we suggest a live demonstration where you can evaluate the quality for yourself.
  6. Security:  Both Secure Telehealth and our competitors provide the highest level of security embedded in our product.

 

Geek Version

  1. Secure Telehealth uses the computing power already available in your Windows PC's.   Upgrading your PC's also upgrades your video conferencing capability for free.  Our competitiors' video conferencing equipment consists of specialized hardware which must be upgraded independently of PC's.
  2. Secure Telehealth uses cloud computing.  The only components Secure Telehealth installs at the customer location are webcams, microphones, and a simple Windows applet on your PC.  Cloud computing allows customers to implement reliable, high-quality video conferencing without involving IT professionals in the process.  Our competitors use specialized equipment (endpoints, servers and bridges) installed and maintained at the customer's premise by the customers' IT department (instead of cloud computing).
  3. Secure Telehealth traverses firewalls in its native form.  This means our customers may conduct video conference sessions with any facility without making firewall changes at that facility.  Our competitors must open holes in firewalls at all facilities or add servers and client software to encapsulate video conferencing traffic to get it to go through a firewall.  Either of these competitor options requires professional IT assistance at each facility (and the purchase and installation of specialized hardware) before any connection can be made.
  4. Both Secure Telehealth and our competitors offer High Definition (1080p at 60 frames/second).  Our competitors emphasize this but we do not.  We do not emphasize HD because we don't think it is necessary for telepsychiatry.  We think HD results in unnecessary bandwidth consumption with no increase in effectiveness.   We do not present ourselves as an authority on this subject.  We are happy to demonstrate both HD and non-HD and let our clients make their own decision.  There is no extra charge for HD other than the increased bandwidth requirement.  HD is invoked in Secure Telehealth by clicking on a menu option.
  5. Both Secure Telehealth and our competitors offer cameras with remote-control Pan/Tilt/Zoom capability.  Our competitors allow the remote control to be held and controlled by the remote physician, we do not.  With Secure Telehealth, the nurse presenting with the client must control the remote if a PTZ camera is used.  This works effectively because the nurse sees the same image as the physician sees and can respond to physician requests to point and zoom the camera.
  6. Both Secure Telehealth and our competitors use equally high-level embedded encryption to protect confidentiality.   See our security white paper.
  7. Secure Telehealth allows multiparty conferences without requiring MCU Bridges.  Our competitors require their customers to purchase MCU bridges to support multiparty conferences.  These bridges are expensive and require IT resources to manage. 
  8. Secure Telehealth includes unlimited technical support for all endpoints as part of our monthly fee.  We use our multi-party conference capability to join conferences for training purposes upon request.  We will sign HIPAA Business Associate Agreements with our clients to facilitate this.  Our customers may use this feature as often as they like, as our tech-support and training are offered as an "all-you-can-eat" service -  without limits.
  9. Unlike our competitors, Secure Telehealth provides webinar-style data sharing for powerpoints, etc.
  10. Secure Telehealth conferences may be initiated and joined from any Windows PC as simply as visiting a website.  This allows physicians to conduct telehealth from any location, including their home, without the need for any IT resources.

 

Please contact us to conduct a live demonstration!  Don't depend on our description of audio and video quality - Test the quality for yourself!

syncron_eurostyle_1x3 

Contact Jim Mountain at Secure Telehealth:

Phone: 412 837 9320

This e-mail address is being protected from spambots. You need JavaScript enabled to view it

Last Updated on Friday, 04 January 2013 08:45