Colorado HIE Expands to Western Communities

June 24, 2011
Quality Health Network (QHN), an health information exchange (HIE) based in Grand Junction, Colo., has successfully expanded to include the Western

Quality Health Network (QHN), an health information exchange (HIE) based in Grand Junction, Colo., has successfully expanded to include the Western Colorado communities of Aspen and Montrose.

The HIE, which is powered by Axolotl’s Elysium Exchange platform, will enable more than 20 hospitals and attendant physicians in the 40,000 square miles of Western Colorado to securely share clinical information, improve patient outcomes, and reduce costs, says the company.

Using Elysium Exchange, the independent hospitals and physicians of Aspen and Montrose are now electronically connected to each other and with other independent hospitals and physicians in Grand Junction. The real-time clinical messaging infrastructure allows physicians to share data at the point of care between and among disparate hospital and EMR systems, it touts.

QHN is a non-profit organization founded and sustained by local health care groups to optimize the health of Western Coloradans.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...