Proactive IT Risk Management Mary Washington Healthcare embraces phased risk management approach

Size: px
Start display at page:

Download "Proactive IT Risk Management Mary Washington Healthcare embraces phased risk management approach"

Transcription

1 Mary WAShington Healthcare CASE STUDY BY Proactive IT Risk Management embraces phased risk management approach Mike Vida (left), Sr. Security Analyst, Security Program Office, Joyce Hanscome (center), SVP and CIO, and David Bailey (right), Manager, Security Program Office, Physicians at were frustrated with the support they were receiving from IT. Their requirements weren t being translated into IT solutions. As a result, in late 2009, the healthcare provider recruited Joyce Hanscome to the role of director of Physician Services with the charter to restore physician-it relationships by creating technology solutions to meet their most pressing requirements. One of the most noteworthy projects that she spearheaded was an electronic medical record system. She also led an effort to form a physician advisory council for IT. When the previous CIO at Mary Washington Healthcare left in early 2011, Hanscome was asked to serve as interim CIO. She was named permanent senior vice president and CIO in early Hanscome inherited an IT group that was lacking strategic direction and standard operating procedures. The most pressing requirement was the development of a strategic plan. She engaged an external consultant for guidance in developing it and a new governance model. These elements were essential building blocks if Hanscome was to transform the IT department from a service provider to a strategic healthcare enabler. Yet success wasn t far away; she and her team were able to get both the strategic plan and governance model into place by mid-summer. As an organization, we have a great strategic planning process, Hanscome notes. For the IT strategic plan, we simply tied it into that larger process and aligned with its critical objectives. In addition to facilitating interaction between IT and the rest of the organization, including physicians, Hanscome worked to embed IT into four subcommittees tasked with developing Mary Washington Healthcare s annual financial plan. This is helping to streamline and facilitate communications between 46 CIO Digest January 2013

2 IT and business owners and physicians. Forming a Security Program Office Security was another area Hanscome and her team sought to tackle. In early 2010, determined that it needed a dedicated Security Program Office and recruited David Bailey as its manager. The organization understood the importance of regulatory compliance and the critical nature of protecting our IT infrastructure and patient information, Hanscome explains. David had a breadth of risk management experience and was most certainly the right person for the job. The maturation of the IT organization also brought about the need for a formal risk management governance model with associated measurements. Bailey led efforts to build out a committee in that area as well. has an IT governance board that meets every quarter as well as an enterprise risk committee. I sit on the enterprise risk committee and report to the IT governance board, Bailey notes. Good IT governance is something every healthcare entity must ensure. For Mary Washington Healthcare, this initiative translated into security standards and risk management measurements. HIPAA and PCI compliance are at the top of the list, Bailey says. But our risk management efforts are much broader than just that. The launch of the electronic medical record system required that we meet certain compliance indicators. Meaningful use is a critical concern here. If we cannot satisfy those indicators, then federal funding is put at risk, and we are not doing what we believe is the right course of action for patient care. Hanscome adds: The need to exchange patient data, as stipulated by the Patient Protection and Affordable Care Act, increases risk, and we sought to ensure that we had the right tools and processes in place based on pre-determined policies and standards. Secure the endpoint Upon arriving, Bailey found that a solid commitment to information security existed. It starts with the endpoint, he says. Senior Security Analysts Michael Vida and Douglas Hanback, members of Bailey s team, oversaw the upgrade to Symantec Endpoint Protection from Symantec AntiVirus several years ago. We were able to consolidate our different endpoint security infrastructure components into one toolset, Vida says. This gave us substantial cost savings while helping us to improve the productivity of our IT staff. In 2011, the Mary Washington Healthcare team started their upgrade to Endpoint Protection 12. We get better performance on our virtual data center servers as a result of the new SONAR scan engine and an improved risk posture through the reputationbased security approach, Vida says. will be using nearly all Endpoint Protection functionality from antivirus and antispyware, to network access control and intrusion prevention, to application and device control. Our Endpoint Protection deployment has scaled with the proliferation of endpoints, including the introduction of more and more IP-enabled biomedical devices, Bailey adds. All of these must be protected. In total, Mary Meaningful use is a critical concern here. If we cannot satisfy those indicators, then federal funding is put at risk. David Bailey, Manager, Security Program Office, Washington Healthcare protects over 4,000 endpoints. Most of Mary Washington Healthcare s data center is virtualized using VMware vsphere. Endpoint Protection has done a great job helping protect virtual servers Video and integrates seamlessly with our VMware investment, Vida says. As part of the team s larger risk management approach, Bailey is in Proactive risk management is a strategic the process of migrating data center endpoint security over to Symantec initiative for Mary Washington Healthcare at go.symantec.com/ Critical System Protection. We will be able to marywashington-video. define endpoint security policies and track those using Symantec Control Compliance Suite, he says. Tight integration between Critical System Protection and VMware is another factor. It will give us a more proactive approach Mary Washington Healthcare Location: Fredericksburg, Virginia Founded: Late 1800s Facilities: 2 hospitals (Mary Washington and Stafford Hospital) and 28 additional facilities Employees: 3,600 Website: symantec.com/ciodigest 47

3 CASE STUDY Mary WAShington Healthcare From the Lab to CIO Joyce Hanscome began her career at Central Maine Healthcare as a medical technologist. She worked in the medical laboratory for a number of years, eventually being named assistant director. Looking to gain a broader background in healthcare, Hanscome completed a master s in healthcare administration and took on a new role overseeing the physician practice. This afforded me with a great opportunity, Hanscome says. I was able to get to know physicians and their habits what they like and don t like. When I started, I covered just the internal medicine and family practice about 10 doctors. The assignment had expanded to about 200 physicians when I left. I had a chance to gain experience across a breadth of different functions from acquisitions to patient services to HR to finance. In 2010, Mary Washington Healthcare, looking to transform the working relationship between IT and physicians, recruited Hanscome as director of Physician Services. She was named SVP and CIO in early 2012 when the former CIO left the organization. to managing and monitoring endpoint security in our data center environment. Proactive threat management As part of their larger phased risk management strategy, Bailey and his team wanted to create a proactive security awareness and prevention program. With this in mind, they worked in-house to implement standard dashboards that would identify and track threats and security events. But shortly after doing so, we found that this was extremely time consuming and virtually impossible for my staff of three and me to do on an ongoing basis, Bailey says. As a result, Bailey, in concert with Hanscome, determined that a managed security service would be a better option. Mary Washington Healthcare looked at several different solutions and ultimately chose Symantec Managed Security Services. We are able to focus on maturing our security and compliance strategies instead of worrying about threat detection and prevention, Bailey says. Managed Security Services allows us to focus on building out our threat management posture while delivering proactive protection of our IT environment. It has been a win-win scenario for us. Bailey and his team generate daily threat reports using Symantec DeepSight Security Intelligence that are sent to Hanscome. They also create weekly and monthly reports that are given to the IS Governance Board. But this is just the first phase of the risk management program that is putting into place. The next step is to begin tracking and reporting compliance with established security standards. We re still in the process of building out all of our security standards, Hanscome reports. HIPAA and PCI are most certainly areas we ll need to address. But there are some other standards that we will be adding as we prepare to roll out our compliance initiative. Bailey s team will use Symantec Control Compliance Suite to build out compliance policies and then proactively report on them. As part of this process, we ll use the Standards Manager and Policy Manager in Control Compliance Suite to identify and create policies that map to our compliance requirements, Bailey says. Risk Manager will enable us to provide regular risk management updates to our executive management team. Once Control Compliance Suite is in place, the Mary Washington Healthcare team plans to turn their attention to data loss prevention. We re currently performing a data loss prevention assessment and will give the results to our executive management team, Bailey states. The tight integration between our current Symantec investments and Symantec Data Loss Prevention will help us move to the third phase of our risk management transformation. The broader investment in Symantec technologies will create additional value for s investment in Managed Security Services at the same time. Integration between Managed Security Services and our Endpoint Protection deployment provides deeper views into our endpoint security posture, Bailey says. And we ll gain even further risk management insights as additional Symantec solutions such as Critical System Protection are deployed. Risk management to executive leadership Raising risk management to the executive level was one of the objectives Hanscome and Bailey established. It came out of a discussion that I had with our CEO, Fred Rankin, who noted that he really wanted to get a better understanding of the organization s strategic technology providers, Hanscome relates. Since 48 CIO Digest January 2013

4 The need to exchange patient data, as stipulated by the Patient Protection and Affordable Care Act, increases risk. Joyce Hanscome, SVP and CIO, we consider Symantec as one of our strategic technology providers, we decided to begin with Symantec. The Symantec account team worked with Hanscome and Bailey to set up a two-hour event in the boardroom involving the entire executive leadership team. We pinpointed different areas of risk and quantified the potential risk associated with each one, Bailey says. The session raised the risk awareness of our executive leadership team and provided them with a foundation for making strategic decisions. It was very well received. User authentication User authentication is another area that the Mary Washington Healthcare team addressed. Previously, Mary Washington Healthcare maintained two remote access methods that were inefficient to manage. It was an adaptive authentication approach that granted access to inpatient systems and our physician portal to physicians, Bailey explains. Another SSL-based VPN solution was used to provide access to associates and vendors. The former had two-factor authentication but was a hard-token solution. It was expensive and difficult to manage, he adds. On the flip side, the SSLbased VPN solution did not have two-factor authentication and posed other risks. Seeking to consolidate onto one identity protection toolset, Bailey and his team examined several different solutions. After evaluating each one, they selected Symantec Validation and ID Protection (VIP) Service in late 2012 and are on track to have it fully implemented in early Symantec VIP Service proved to be extremely cost effective while providing us with additional functionality, Bailey notes. It also affords us with different multifactor options for the second form of authentication with software-based tokens available for desktop, laptop, and mobile devices. Early phases of the prescription While they have moved quickly, Hanscome, Bailey, and the rest of the IT team have much left to do in Joyce Hanscome, SVP and CIO, administering their IT prescription. Mobility is something we will be tackling early next year, Hanscome notes. Our physicians and caregivers want to use mobile devices to access information and services, including when meeting with patients. This presents a number of different security and compliance challenges, one that is accentuated since Mary Washington Healthcare plans Podcast to enable a bring your own device Portions of the interview with Joyce Hanscome and David (BYOD) policy. We Bailey are available as an are evaluating Executive Spotlight Podcast Symantec App Center at go.symantec.com/ marywashington-podcast. on the basis that we can create virtual containers on personal devices and manage information and services securely on them without any impact on personal applications and services they also contain, Bailey explains. symantec.com/ciodigest 49

5 CASE STUDY Mary WAShington Healthcare FROM THE PENTAGON TO HEALTHCARE While an undergraduate in college, David Bailey joined the United States Air Force ROTC program and was commissioned in He spent almost nine years in the Air Force, serving in a variety of different functions as a communications and information officer. Ordinary is not a David Bailey Manager, Security Program Office, Mary Washington Healthcare word that one would use to describe his time in the Air Force. His initial assignment was at the Pentagon. My team provided networking services as well as desktop, database, and phone support, all of the typical things you would do at an Air Force base, he recounts. The only difference is that it was at the Pentagon. After several years, he got involved as a systems analyst and then in tactical communications. He deployed to Saudi Arabia, traveling around southwest Asia conducting force protection vulnerability assessments, which included examination of communications systems. This experience helped pave the way for my security career, he relates. He returned to support the Air Force and United States Space Command as a director of Information Operations Testing. In this role he conducted vulnerability and risk assessments of mission-critical space systems. When Bailey left the Air Force, he leveraged his background and experience in security and IT risk management, serving as a consultant with classified clearance to various Federal government entities, including the Pentagon. In early 2010, his career took a completely different turn when Mary Washington Healthcare recruited him to build the Security Program Office and institute a risk management strategy from the ground up. From the standpoint of security standards, there are similarities, Bailey reflects. For example, both the Federal government and healthcare use National Institute of Standards and Technology (NIST) standards. But there are certainly differences at the same time. Bailey is thoroughly enjoying the challenges of healthcare. On average, we have 6,000 or 7,000 users accessing our systems every day, often for life-critical services. While the challenges may differ, the end result is just as critical. We were able to consolidate our different endpoint security infrastructure components into one toolset. Mike Vida, Sr. Security Analyst, Security Program Office, But that is just one of many initiatives that are planned. With the first phase of our risk management strategy complete, we are rapidly moving into the second and third phases, Hanscome states. Compliance with meaningful use is at the forefront of what we re working to accomplish. Each of the steps that we ve taken and are taking will help ensure that we achieve meaningful use and thus meet both the challenges and opportunities of our rapidly evolving world of 21 st - century healthcare. Adds Bailey: And with technology partners like Symantec, we have the tools and services to help ensure that we are successful. n Patrick E. Spencer (Ph.D.) is the editor in chief and publisher for CIO Digest. Managing Risk with Symantec > Symantec Endpoint Protection > Symantec Critical System Protection > Symantec Managed Security Services > Symantec Validation and ID Protection (VIP) Service > Symantec DeepSight Security Intelligence > Symantec Data Loss Prevention > Symantec Control Compliance Suite (planned implementation) 50 CIO Digest January 2013

Getting Smart with Identity Protection

Getting Smart with Identity Protection FEATURE PROTECTING IDENTITIES BY MARK MULLINS Getting Smart with Identity Protection 3 strategies to help seal the door from threats In the spoof 1960s TV series Get Smart and its subsequent movie adaptations,

More information

Practical Enterprise Mobility

Practical Enterprise Mobility Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

Strategic Planning. Key Initiative Overview

Strategic Planning. Key Initiative Overview David Aron Research Vice President This overview provides a high-level description of the Strategic Planning Key Initiative. IT leaders can use it to create strategies that help the business win, and change

More information

The Healthcare Cloud:

The Healthcare Cloud: The Healthcare Cloud: Building a Blueprint for Success With cloud computing offering many advantages over more traditional computing paradigms, businesses across industries are embracing this emerging

More information

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief The RSA Solution for Cloud Security and Compliance A GRC foundation for VMware infrastructure security and compliance Solution Brief The RSA Solution for Cloud Security and Compliance enables end-user

More information

Strategies for Protecting Virtual Servers and Desktops

Strategies for Protecting Virtual Servers and Desktops Strategies for Protecting Virtual Servers and Desktops by Jonathan Tait, Product Marketing Manager Virtualization Today Over the past few years, virtualization technology has transformed the data center.

More information

Assessing the Opportunities Presented by the Modern Enterprise Archive

Assessing the Opportunities Presented by the Modern Enterprise Archive Assessing the Opportunities Presented by the Modern Enterprise Archive Published: November 2015 Analysts: James Haight, Research Analyst; David Houlihan, Principal Analyst Report Number: A0193 Share This

More information

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. A Brief History of IT Security Once upon a time, IT security was simple. Viruses were written to attack any system they came in contact with. As a result,

More information

VMware Solutions for an Epic Environment

VMware Solutions for an Epic Environment Transforming Healthcare IT with an Electronic Medical Records Solution and VMware vcloud for Healthcare technical White paper Table of Contents Executive Summary............................................................

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose

Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose SPONSORED BY WhatWorks is a user-to-user program in which security managers who have implemented effective Internet security

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Rx for mthreats in Today s Healthcare Institutions. Daniel W. Berger, President and CEO, Redspin, Inc. P: 805.576.7158 E: dberger@redspin.

Rx for mthreats in Today s Healthcare Institutions. Daniel W. Berger, President and CEO, Redspin, Inc. P: 805.576.7158 E: dberger@redspin. Rx for mthreats in Today s Healthcare Institutions Daniel W. Berger, President and CEO, Redspin, Inc. P: 805.576.7158 E: dberger@redspin.com Meaningful Healthcare IT Security Technical Expertise Penetration

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

Avoiding the Top 5 Vulnerability Management Mistakes

Avoiding the Top 5 Vulnerability Management Mistakes WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability

More information

Secure Your Mobile Device Access with Cisco BYOD Solutions

Secure Your Mobile Device Access with Cisco BYOD Solutions Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple

More information

Contact Center Security: Moving to the Cloud

Contact Center Security: Moving to the Cloud white paper Contact Center Security: Moving to the Cloud Table of Contents Executive Overview 2 A Critical Attribute of a Cloud Provider: Proven Security 2 How Do Well-established Companies Chose a Cloud

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

How Cisco IT Reduced Costs Through PC Asset Management

How Cisco IT Reduced Costs Through PC Asset Management How Cisco IT Reduced Costs Through PC Asset Management Centralized network-based PC management program keeps employee desktops current and reduces costs. Cisco IT Case Study / IT Services Expense Management

More information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement

More information

End-to-end Secure Cloud Services a Pertino whitepaper

End-to-end Secure Cloud Services a Pertino whitepaper a Pertino whitepaper Executive summary Whether companies use the cloud as a conduit to connect remote locations and mobile users or use cloud-based applications, corporations have found that they can reduce

More information

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education Before the U.S. House Oversight and Government Reform Committee Hearing on Agency Compliance with the Federal Information

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Microsoft Windows 7 and Office. Key Initiative Overview

Microsoft Windows 7 and Office. Key Initiative Overview Michael Silver Research Vice President and Distinguished Analyst IT leaders have questions and concerns about issues associated with Microsoft Windows 7 and Office 2010 migrations. This overview points

More information

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology

More information

Top 5 Reasons to Choose User-Friendly Strong Authentication

Top 5 Reasons to Choose User-Friendly Strong Authentication SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts

More information

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2 WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with

More information

Contact Center Security: Moving to the True Cloud

Contact Center Security: Moving to the True Cloud White Paper Contact Center Security: Moving to the True Cloud Today, Cloud is one of the most talked about trends in the IT industry. It s a paradigm many believe will have a widespread business impact.

More information

FIVE WAYS WIRE DATA ANALYTICS ENABLES REAL-TIME HEALTHCARE SYSTEMS

FIVE WAYS WIRE DATA ANALYTICS ENABLES REAL-TIME HEALTHCARE SYSTEMS WHITE PAPER FIVE WAYS WIRE DATA ANALYTICS ENABLES REAL-TIME HEALTHCARE SYSTEMS Abstract Healthcare organizations face a transformational shift with the rise of what Gartner has dubbed the realtime healthcare

More information

Whitepaper: 7 Steps to Developing a Cloud Security Plan

Whitepaper: 7 Steps to Developing a Cloud Security Plan Whitepaper: 7 Steps to Developing a Cloud Security Plan Executive Summary: 7 Steps to Developing a Cloud Security Plan Designing and implementing an enterprise security plan can be a daunting task for

More information

The Challenge of Securing and Managing Data While Meeting Compliance

The Challenge of Securing and Managing Data While Meeting Compliance ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst

More information

Navigating the NIST Cybersecurity Framework

Navigating the NIST Cybersecurity Framework Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity

More information

Managing the Growing Appification of Business

Managing the Growing Appification of Business Managing the Growing Appification of Business Since the iphone mobile device burst onto the scene in 2007, companies have spent a lot of time, money and attention developing apps that enable them to engage

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile

More information

The Fortinet Secure Health Architecture

The Fortinet Secure Health Architecture The Fortinet Secure Health Architecture Providing End-to-End Security for Modern Healthcare Organizations Introduction Healthcare providers are migrating from large, independent stand alone organizations

More information

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper Vulnerability Audit: Why a Vulnerability Scan Isn t Enough White Paper May 10, 2005 TABLE OF CONTENTS Introduction: How Secure Are My Systems?... 3 Vulnerability: The Modern Meaning Of A Muddled Word...

More information

Migrating to a Managed Service Model through Automation

Migrating to a Managed Service Model through Automation Migrating to a Managed Service Model through Automation The IT landscape is constantly changing, impacted by many factors from innovations by technology vendors, to a more disparate and global workforce

More information

Leveraging the Cloud for Your Business

Leveraging the Cloud for Your Business Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and

More information

Enforcing IT Change Management Policy

Enforcing IT Change Management Policy WHITE paper Everything flows, nothing stands still. Heraclitus page 2 page 2 page 3 page 5 page 6 page 8 Introduction How High-performing Organizations Manage Change Maturing IT Processes Enforcing Change

More information

Security Administration R77

Security Administration R77 Security Administration R77 Validate your skills on the GAiA operating system Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check

More information

Achieving Stage One of Meaningful Use: Critical Success Factors and Lessons Learned. Customer Insights

Achieving Stage One of Meaningful Use: Critical Success Factors and Lessons Learned. Customer Insights Customer Insights A continuing series in which customers discuss their experiences with CareTech Solutions products and services Crittenton Hospital Medical Center, Detroit Medical Center, Holy Family

More information

Metro Health Giving Time Back to Its Care Providers with VMware Horizon View

Metro Health Giving Time Back to Its Care Providers with VMware Horizon View IDC ExpertROI Spotlight Metro Health Giving Time Back to Its Care Providers with VMware Horizon View Sponsored by: VMware Matthew Marden January 2014 Randy Perry Overview Metro Health is an integrated

More information

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration

STATEMENT OF. Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration STATEMENT OF Dr. David McClure Associate Administrator Office of Citizen Services and Innovative Technologies General Services Administration BEFORE THE HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE SUBCOMMITTEE

More information

Want a Quality EHR? Ask Doctors What They Want.

Want a Quality EHR? Ask Doctors What They Want. Want a Quality EHR? Ask Doctors What They Want. Sponsored Material It is difficult to imagine a company creating a product without asking consumers what they want or need. However, that is exactly what

More information

Data Security and Healthcare

Data Security and Healthcare Data Security and Healthcare Complex data flows Millions of electronic medical records across many systems New and emerging business relationships Changing and maturing compliance frameworks Diverse population

More information

2012 Endpoint Security Best Practices Survey

2012 Endpoint Security Best Practices Survey WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners

More information

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security... WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive

More information

Give us an example of how you enforce your compliance program. After all, you re a utility, so you ve got lots of compliance to worry about.

Give us an example of how you enforce your compliance program. After all, you re a utility, so you ve got lots of compliance to worry about. The leading resource on corporate compliance and governance for U.S. public companies. Duke Energy Modernizes Its Compliance Program By Christine Dunn April 22, 2008 In the latest of our conversations

More information

7 things to ask when upgrading your ERP solution

7 things to ask when upgrading your ERP solution Industrial Manufacturing 7 things to ask when upgrading your ERP solution The capabilities gap between older versions of ERP designs and current designs can create a problem that many organizations are

More information

What are your firm s plans to adopt x86 server virtualization? Not interested

What are your firm s plans to adopt x86 server virtualization? Not interested The benefits of server virtualization are widely accepted and the majority of organizations have deployed virtualization technologies. Organizations are virtualizing mission-critical workloads but must

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care

EMC PERSPECTIVE. The Private Cloud for Healthcare Enables Coordinated Patient Care EMC PERSPECTIVE The Private Cloud for Healthcare Enables Coordinated Patient Care Table of Contents A paradigm shift for Healthcare IT...................................................... 3 Cloud computing

More information

Shaping the Cloud for the Healthcare Industry

Shaping the Cloud for the Healthcare Industry Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

AdvancedHosting SM Solutions from SunGard Availability Services

AdvancedHosting SM Solutions from SunGard Availability Services AdvancedHosting SM Solutions from SunGard Availability Services A SINGLE POINT OF CONTACT A COMPLETE MANAGED SERVICES SOLUTION Higher levels of availability Continuous investment in people, technology

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

Desktop Solutions SolutioWhitepaper

Desktop Solutions SolutioWhitepaper Author: Mike Herrmann With organizations looking for new ways to cut costs and increase productivity, the use of cloud computing has grown. The most common form of cloud computing is for vendors making

More information

TELEHEALTH TECHNOLOGY SUPPORT SERVICES

TELEHEALTH TECHNOLOGY SUPPORT SERVICES CDW HEALTHCARE WE GET IT HOW WE DO IT. TELEHEALTH TECHNOLOGY SUPPORT SERVICES CDW Healthcare s services can help you get the most from telehealth technology to improve collaboration and quality of care

More information

Best Practices Brochure. Best Practices for Optimizing Social CRM Maximizing the Value of Customer Relationships. Customer Care

Best Practices Brochure. Best Practices for Optimizing Social CRM Maximizing the Value of Customer Relationships. Customer Care Best Practices Brochure Best Practices for Optimizing Social CRM Maximizing the Value of Customer Relationships Customer Care Social CRM Companies must do more than participate in today s social environment.

More information

SOC & HIPAA Compliance

SOC & HIPAA Compliance 2014 All Rights Reserved ecfirst An ecfirst Case Study: SOC & HIPAA Compliance An ecfirst Case Study: Lunarline & HIPAA Compliance TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 SECURITY OPERATIONS CENTER (SOC)...

More information

I D C M A R K E T S P O T L I G H T. T h e I m p a c t of the Consumerization of IT

I D C M A R K E T S P O T L I G H T. T h e I m p a c t of the Consumerization of IT I D C M A R K E T S P O T L I G H T M o bile Enterprise Management and Security: T h e I m p a c t of the Consumerization of IT January 2013 Adapted from Worldwide Mobile Enterprise Management Software

More information

MIPRO s Business Intelligence Manifesto: Six Requirements for an Effective BI Deployment

MIPRO s Business Intelligence Manifesto: Six Requirements for an Effective BI Deployment MIPRO s Business Intelligence Manifesto: Six Requirements for an Effective BI Deployment Contents Executive Summary Requirement #1: Execute Dashboards Effectively Requirement #2: Understand the BI Maturity

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital

Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital Best Practices: Single Sign-On Drives Productivity, Security, and Adoption When Used with EHR at The Johns Hopkins Hospital IDC Health Insights: Healthcare Provider IT Strategies BEST PRACTICES #HI238582

More information

Reducing Cost, Complexity and Achieving Compliance for Healthcare Providers

Reducing Cost, Complexity and Achieving Compliance for Healthcare Providers Reducing Cost, Complexity and Achieving Compliance for Healthcare Providers CONTENTS 1. Impact for Healthcare Providers 2. The Mimecast Solution 3. Profitable Solutions and Services Accelerating Healthcare

More information

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability

More information

2014 HIMSS Analytics Cloud Survey

2014 HIMSS Analytics Cloud Survey 2014 HIMSS Analytics Cloud Survey June 2014 2 Introduction Cloud services have been touted as a viable approach to reduce operating expenses for healthcare organizations. Yet, engage in any conversation

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Preventive Treatment for the Provider s Back-office

Preventive Treatment for the Provider s Back-office Preventive Treatment for the Provider s Back-office A Closer Look at Administrative Simplification and the Key Strategies Healthcare Providers Can Take to Prepare By some estimates, nearly a third of every

More information

SITUATION SOLUTION BENEFITS SUPPORT PRODUCTS

SITUATION SOLUTION BENEFITS SUPPORT PRODUCTS VIGILANCE WHEN YOU NEED IT SITUATION SOLUTION BENEFITS SUPPORT PRODUCTS CLOUD-BASED SECURITY OVERVIEW / SITUATION THE TOOLS YOU NEED TO TAKE SECURITY TO NEW HEIGHTS SECURE TODAY. VULNERABLE TOMORROW. Your

More information

Integration for your Health Information System

Integration for your Health Information System Integration for your Health Information System Achieve comprehensive healthcare IT integration that leverages your existing IT investments and helps you meet the growing demands of Meaningful Use, HIE,

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.935.4445 F.508.988.7881 www.idc-hi.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.935.4445 F.508.988.7881 www.idc-hi.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.935.4445 F.508.988.7881 www.idc-hi.com L e v e raging Big Data to Build a F o undation f o r Accountable Healthcare C U S T O M I N D

More information

Audit of the Board s Information Security Program

Audit of the Board s Information Security Program Board of Governors of the Federal Reserve System Audit of the Board s Information Security Program Office of Inspector General November 2011 November 14, 2011 Board of Governors of the Federal Reserve

More information

2013 North American Unified Communications Server Virtualization Product Leadership Award

2013 North American Unified Communications Server Virtualization Product Leadership Award 2013 North American Unified Communications Server Virtualization Product Leadership Award 2013 Product Leadership Award Unified Communications (UC) Server Virtualization North America, 2013 Frost & Sullivan

More information

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better

More information

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value. SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,

More information

Own, launch, grow and support your cloud backup and recovery offering

Own, launch, grow and support your cloud backup and recovery offering Asigra Hybrid Partner Program Own, launch, grow and support your cloud backup and recovery offering Recovery is Everything Get powered by Asigra. Deliver your own backup service, be a data recovery specialist,

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Eric Hess, CEO, KeyPoint Government Solutions OPM Data Breach: Part II House Committee on Oversight and Government Reform June 24, 2015

Eric Hess, CEO, KeyPoint Government Solutions OPM Data Breach: Part II House Committee on Oversight and Government Reform June 24, 2015 Eric Hess, CEO, KeyPoint Government Solutions OPM Data Breach: Part II House Committee on Oversight and Government Reform June 24, 2015 Chairman Chaffetz, Ranking Member Cummings, and Members of the Committee,

More information

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns

More information

Meaningful Use and Engaging Patients: Beyond Checking the Box

Meaningful Use and Engaging Patients: Beyond Checking the Box RelayHealth Clinical Solutions Executive Brief Meaningful Use and Engaging Patients: Beyond Checking the Box Contents Contents Introduction The term patient engagement has become entrenched in the healthcare

More information

Understanding the Total Cost of Ownership for Endpoint Security Solutions. A TCO White Paper

Understanding the Total Cost of Ownership for Endpoint Security Solutions. A TCO White Paper Understanding the Total Cost of Ownership for Endpoint Security Solutions A TCO White Paper Author: Kara Casten Hobson & Company March 2009 Executive Summary Organizations considering moving to an endpoint

More information

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security Russ Dietz Vice President & Chief Technology Officer Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security By Russ Dietz Vice President & Chief

More information

The Business Case for Migrating from Oracle to the SharePoint Platform: The Cost Advantages

The Business Case for Migrating from Oracle to the SharePoint Platform: The Cost Advantages The Business Case for Migrating from Oracle to the SharePoint Platform: The Cost Advantages JULY 2011 Visit www.piquesolutions.com to learn more about our market research and consulting services. 795 Folsom

More information

Virtualization Essentials

Virtualization Essentials Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically

More information

Company Overview. Enterprise Cloud Solutions

Company Overview. Enterprise Cloud Solutions 2016 Company Overview Enterprise Cloud Solutions ENTERPRISE CLOUD SOLUTIONS Unitas Global utilizes leading cloud technologies to optimize enterprise IT environments. By designing, deploying, and managing

More information

7 Habits for Effectively Leading Healthcare Interoperability Initiatives

7 Habits for Effectively Leading Healthcare Interoperability Initiatives Available at: http://www.corepointhealth.com/whitepapers/7-habits-effectively-leading-healthcare-interoperability-initiatives 7 Habits for Effectively Leading Healthcare Interoperability Initiatives What

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage

Leveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage Leveraging mobility in your organisation Building an effective enterprise mobility environment that delivers competitive advantage Creating an environment that provides employees with freedom in where

More information

How Our Cloud Backup Solution Protects Your Network

How Our Cloud Backup Solution Protects Your Network How Our Cloud Backup Solution Protects Your Network Cloud Backup for Healthcare Key Cloud Backup Features Protection for your Whole Network The 3 Levels of Backup Intelligence 2 Our backup solution powered

More information

University of Strathclyde: Information Services Directorate Operational Plan for 2014/15

University of Strathclyde: Information Services Directorate Operational Plan for 2014/15 University of Strathclyde: Information Services Directorate Operational Plan for 2014/15 Enabling the future: transforming our information systems and technology 2014/15 2014/2015 CONTENTS 1 DRIVERS, STRATEGIC

More information

Professional Services Overview

Professional Services Overview Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded

More information