WESTFAX IS THE “RIGHT” FAX ALTERNATIVE!

No more complex licensing and contracts. No more expensive and difficult to manage server farms. WestFax is a 100% cloud based HIPAA compliant fax solution.

COST EFFECTIVE

Over 60% less expensive than traditional Fax server providers.

NO FAX SERVERS

No more expensive and complex servers. 100% cloud-based.

INTEGRATED

We get your integration migrated fast with ZERO downtime.

ANY DEVICE

Fax from your desktop, MFP device, EHR, EMR or phone.

LICENSE FREE

No license required or complex seat management.

ALL INCLUSIVE

No more expensive piecemeal pricing. No more settling.

The WestFax Difference

  • EASY MIGRATION. EAST PORTING
    We have a lot of experience migrating customers from RightFax.
  • NO LONG TERM COMMITMENT
    No more licenses or seats. Enterprise doesn’t mean expensive.
  • 100% CLOUD BASED PLATFORM
    No expensive fax server hardware. All features included by default.
  • DEDICATED IMPLEMENTATION TEAM
    No more tech support roulette. We assign you a dedicated rep.
Download our HIPAA Security Matrix

DOWNLOAD OUR HIPAA SECURITY MATRIX
Download our simple 4 page report that distills the WestFax HIPAA compliance measures into an easy to digest format.

api-info-bar
HIPAA Compliant Logo
  • PRIVACY RULE
    WestFax meets or exceeds the requirements of both the Security Rule and the Privacy rule. As a Business Associate we have the policies and procedures as well as the physical and technical security safeguards that guarantees your compliance.
  • SECURITY RULE
    WestFax addresses each area of concern with cutting edge technology and rock solid systems design. WestFax actively manages and audits its system to provide unsurpassed systems security and incident response. WestFax brings comprehensive compliance support that includes FISMA High / NIST SP 800-53, HIPAA, PCI-DSS Level 1, SOC 2 Type II, and SOC 3.
  • PHYSICAL SECURITY
    WestFax systems are deployed in secure SOC 2 compliant data centers. 24×7 guard staff and Video/DVR surveillance of facility and server cages. ID and Authorization are required to enter building, with extra biometric control of “private cloud” areas. Strictly controlled, logged and audited third party access to the data centers.
  • UNIQUE USER IDENTIFICATION
    WestFax ensures the username is unique, and that each session providing access to data is authenticated. Password complexity policies are enforced to ensure that passwords cannot be guessed or compromised. WestFax user activity logging captures access and activity.
  • AUTOMATIC LOG OFF
    WestFax applications contain an idle timeout feature that will automatically log out users after a specified period of time. User access and permissions are reaffirmed every time the application is reopened. Applications are designed to prevent “remember me” features, removing risk of password compromise.
  • AUTHENTICATION
    Existing user login requires a username and password. Access to secure messages can be further protected by a multi-factor authentication and administrator controlled Access Control List (ACL).
  • TRANSMISSION SECURITY
    The highest level of TLS encryption available for data in transit either through our secure website or secure API interfaces. WestFax supports TLS protected SMTP email with optional REQUIRE TLS extension in accordance with the IETF RFC 3207. FTPS and SFTP with TLS for safe and secure transport of documents to and from your existing servers.
  • ACCESS CONTROL
    ePHI data is isolated to servers and storage system in the WestFax “private cloud” environment. Software and systems require user passwords.
  • DATA INTEGRITY
    WestFax protects the integrity of electronic health information on its secure platform via end-to-end encryption and decryption of messages transferred over the TLS protocol. Signature protocol prevents data tampering while data is enroute. To protect against destruction, all messages are securely archived on a central server after encryption.
  • DATA AVAILABILITY
    WestFax assures data availability by providing an online backup option for all data at rest. Redundant data centers and network paths provide always on data availability.
  • AUDIT CONTROL
    Audit logs of external and internal system users are reviewed in real-time to proactively detect and prevent security issues. ID and Authorization is required to enter building, with extra biometric control of “private cloud” areas. Strictly controlled, logged and audited third party access to the data centers. 24×7 guard staff and Video/DVR surveillance of facility and server cages.
pricing-page-enterprise-solution