IRONKEY CASE STUDIES. Healthcare Solutions



Similar documents
Proactive controls to mitigate IT security risk

Protecting Your Data On The Network, Cloud And Virtual Servers

CONTENTS. Windows To Go: Empower And Secure The Mobile Workforce

Research Information Security Guideline

Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014

Securing Data on Portable Media.

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

IBM Data Security Services for endpoint data protection endpoint encryption solution

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

HIPAA and Cloud IT: What You Need to Know

BYOD BEST PRACTICES GUIDE

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Aegis Padlock for business

Eclypt Secure Data-At-Rest Encrypted Hard Drives and Media Encryptors

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Protecting personally identifiable information: What data is at risk and what you can do about it

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners

BRING YOUR OWN DEVICE. Protecting yourself when employees use their own devices for business

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Deliver Secure, User-Friendly Access to Mobile Business Apps

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

BEST PRACTICE GUIDE TO ENCRYPTION.

WHITE PAPER SPON. Securely Enabling Remote Workers at Lower Cost Than Traditional Approaches. Published January 2014 SPONSORED BY

Enterprise Data Protection

Preemptive security solutions for healthcare

Encrypted Communication Based on BlockChain and PKI Technology.

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

SecureD Technical Overview

Solutions Brief. PC Encryption Regulatory Compliance. Meeting Statutes for Personal Information Privacy. Gerald Hopkins Cam Roberson

Preparing your network for the mobile onslaught

Managing BitLocker With SafeGuard Enterprise

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

Safeguard Protected Health Information With Citrix ShareFile

Removable Media Best Practices

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Your Company Data, Their Personal Device What Could Go Wrong?

Choosing an MDM Platform

Navigating Endpoint Encryption Technologies

Sample Data Security Policies

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

BEST PRACTICES. Encryption.

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The CIO s Guide to HIPAA Compliant Text Messaging

Moving to the Cloud: What Every CIO Should Know

PCI Data Security Standards (DSS)

Did security go out the door with your mobile workforce? Help protect your data and brand, and maintain compliance from the outside

FIBERLINK. Best practices for successfully deploying and managing data encryption on laptops. Delivering Mobility as a Service

Healthcare Compliance Solutions

HIPAA compliance audit: Lessons learned apply to dental practices

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

CHOOSING AN MDM PLATFORM

Overview of the HIPAA Security Rule

10 Top Tips for Data Protection in the New Workplace

What Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros

Virginia Commonwealth University School of Medicine Information Security Standard

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Encryption Buyers Guide

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

Best Practices for Protecting Laptop Data

Achieving Greater TCO Benefits Using a Secure Workspace Solution: Comparing TCO for Three Telework Approaches

Windows Phone 8.1 in the Enterprise

How to use Alertsec to Enable SOX Compliance for Your Customers

Best Practices in Data Protection Survey of U.S. IT & IT Security Practitioners

Kaspersky Lab s Full Disk Encryption Technology

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via .

HIPAA MYTHS: DON T ALWAYS BELIEVE WHAT YOU HEAR. Chris Apgar, CISSP

White Paper. The Importance of Securing s as Critical Best Practice within Financial Services. Executive Summary

Endpoint Virtualization for Healthcare Providers

Comparing Dropbox and Egnyte. White Paper

Achieving HIPAA and HITECH Compliance. with Enterprise Single Sign-On

Why Encryption is Essential to the Safety of Your Business

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

WHITE PAPER: MASSACHUSETTS DATA SECURITY REGULATIONS

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Healthcare Compliance Solutions

External Telehealth Videoconferencing

How To Secure Your Mobile Devices

EXECUTIVE REPORT. Why Healthcare Providers Seek Out New Ways To Manage and Utilize Big Data

Somansa Data Security and Regulatory Compliance for Healthcare

A Guide to Consumerization & Building a BYOD Policy June 2012

Strong Authentication. Securing Identities and Enabling Business

ENCRYPTION. The Perils of Using the Wrong Approach to USB Flash Drive Security. Only Hardware Ensures that Data Stays In and Malware Stays Out

Healthcare Insurance Portability & Accountability Act (HIPAA)

The Essential Security Checklist. for Enterprise Endpoint Backup

WHITE PAPER SPON. The Cost and ROI Advantages of IronKey Workspace W300 for Windows to Go. Published May 2013 SPONSORED BY

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

RFI Template for Enterprise MDM Solutions

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS

Case Study OVERVIEW. Client: Brookings Institution. Industry: Research and Education nonprofit

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

HIPAA Privacy & Security White Paper

Healthcare Buyers Guide: Mobile Device Management

A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK

CA Technologies Healthcare security solutions:

Transcription:

IRONKEY CASE STUDIES Healthcare Solutions

HEALTHCARE Business Problem Healthcare providers, insurers and pharmaceutical companies, have a lengthening list of regulations and standards on protecting confidential patient and healthcare information. Leakage of that information through theft, malware, spyware or just plain carelessness can come with serious consequences. Solution IronKey s family of flash drives and external hard drives lock down patient information and other sensitive data with an on-board, hardware encryption engine that puts a military-grade, AES-256 wall between unauthorized users and the drive s contents. Healthcare providers can also use IronKey s advanced reporting and auditing capabilities to document how, where and when users have accessed, saved or modified confidential data so passing your HIPAA audit doesn t have to be a headache.

SECURE DATA

IRONKEY USE CASE: HEALTHCARE LEADING CALIFORNIA UNIVERSITY HEALTHCARE SYSTEM IVY LEAGUE UNIVERSITY HEALTHCARE ONE OF THE WORLD'S LEADING CROSS-DISCIPLINARY HEALTHCARE PROVIDERS PURSUES ITS MISSION THROUGH THE EDUCATION OF PHYSICIANS, MEDICAL INVESTIGATORS AND OTHER HEALTH CARE PROVIDERS. Leading university healthcare system takes a proactive approach to ensuring they never have to worry about a data breach with their highly sensitive information. Concerns of being audited Many employees have access to highly sensitive medical information and its transported to offices, hospitals and other medical facilities Tamper-proof portable data storage encryption Central and remote device management, monitoring, reporting and termination Ability to lock out other devices Easy to manage and robust Meet HIPAA and other regulatory requirements IronKey Enterprise with cloud-management enables healthcare institution to lock out other storage devices except for IronKey to staff who have access to sensitive patient information. Full control over data use Comply with HIPAA and other regulatory requirements Ability to lock out other devices

IRONKEY USE CASE: HEALTHCARE NORFOLK AND NORWICH UNIVERSITY HOSPITAL NATIONAL ACADEMIC TEACHING HOSPITAL NORFOLK AND NORWICH UNIVERSITY HOSPITALS NHS FOUNDATION DELIVERS ACUTE HOSPITAL CARE TO A COMMUNITY OF MORE THAN 700,000 PEOPLE FROM NORFOLK AND NEIGHBORING COUNTIES. Handed a mandate after several public sector data losses hit the headlines, this healthcare organization knew they needed to ensure that any device removed from the organization must be secure and any stored data protected with the appropriate levels of encryption. Complying with Government ICO legislation and UK Data Protection Act Data breaches in other NHS trust Access to private data for remote staff Securing patient data Strongest possible data encryption Ability to remotely track, manage and destroy devices remotely via the cloud Rugged and reliable It s crucial to have the assurance that if a device was lost or stolen, we could track, record and if necessary remotely destroy it. Given these criteria, IronKey Enterprise was the only option. Ben Everitt Acting Head of IT In addition to FIPS 140-2 Level 3 protection, IronKey solution offered more control and the ability to track and manage devices. The IronKey devices were also found to be far more rugged and reliable than the other options they were evaluating. Demonstrated data protection compliance Greatest security for sensitive patient data Easy to use; no user problems reported

IRONKEY USE CASE: HEALTHCARE NON-PROFIT HEALTHCARE NON-PROFIT HEALTHCARE SYSTEM A NON-PROFIT HEALTH SYSTEM OPERATING HOSPITALS, LONG- TERM CARE FACILITIES AND OTHER HEALTHCARE ORGANIZATIONS TURNED TO IRONKEY AFTER HIPAA VIOLATION. IronKey Enterprise with cloudmanagement was first step this organization took in their DLP strategy. This healthcare organizations took data loss prevention very seriously as a result of a violation. Preventing a high-profile, costly data breach Access to highly sensitive data subject to many regulatory requirements Drives needed to undergo sterilization machines and still work Business continuity around security Had to meet DLP organizational measures Extremely rugged, waterproof IronKey Enterprise passed all of their strict test criteria and was chosen as their only secure storage solution for all employees who have access to confidential information. Management enables them to lock down ports. Ease burden of compliance Full control over data use Integration with DLP strategy Ensure reputation stays in tact

IRONKEY USE CASE: HEALTHCARE DIANN ACKARD, LICENSED PSYCHOLOGIST SPECIALIZED LICENSED PSYCHOLOGIST EVEN BEFORE HIPAA, DIANN ACKARD, A LICENSED PSYCHOLOGIST AND RESEARCHER WAS CONCERNED ABOUT PATIENT CONFIDENTIALITY. Ackard specializes in highly sensitive patient data such as anxiety disturbances and eating disorders, so unauthorized release of her patients metal health records could cause serious damage to a patients public and private life, not to mention the psychologist s reputation. Proven data security for sensitive patient information Maximum portability as the psychologist is constantly on the move Allow for data sharing with authorized staff only HIPAA compliance Meet regulatory requirements Tamper resistant with maximum portability Easy to use The F200 drive makes it very easy for me to cost-effectively save and store my files and be confident they are secure. It s something we as health professionals need to use to protect our patients and our professional integrity. Diann Ackard Licensed Psychologist Ackard chose the IronKey F200 because of its two levels of security password and fingerprint identification. It provided the level of compliance needed with physical reliability. The psychologist can also share data with colleagues since the devices provide administrative controls to manage up to 10 users. Two-factor authentication reassures patients of security An easy-to-use, cost-effective secure storage solution

IRONKEY USE CASE: HEALTHCARE IVY LEAGUE UNIVERSITY HEALTHCARE RENOWNED UNIVERSITY HEALTHCARE SYSTEM WORLD-CLASS MEDICAL SYSTEM COMPROMISING OF MORE THAN A DOZEN INSTITUTIONS WITH MORE THAN 100 MEDICAL SPECIALTIES. University healthcare network system is committed to providing the very best patient-centered service and innovative medical practices that will lead to measurably improved health outcomes. Securely protect highly confidential medical data Due to recent breach, organization internally focused on becoming extremely secure CISO big fan of IronKey for years, but had to prove to others on pricing vs. quality/service level With new policy enhancement, organization had strong focus on security from the network to the USB drives Needed to remotely monitor and track devices to ensure adherence to best practices Ruggedized, waterproof solution to MIL SPEC and self-defending This leading healthcare organization can t just use any USB device, it has to be IronKey. The swap and replace program had staff calling to get their new drives. Their staff was going nuts to receive. Distributed to staff working with healthcare records via a swap and replace program --- turn in old drives and issue new IronKey device. Enforcement of new security policy Compliance with stringent healthcare protocols and standards with military grade FIPS 140-2 Level 3 Cloud management controls that only IronKey devices can be used

SECURE WORKSPACE

WINDOWS TO GO USE CASE: HEALTHCARE BUSINESS CONTINUITY EUROPEAN HEALTHCARE ORGANIZATION THAT PROVIDES SERVICES TO THE ENGLISH AND WALES REGIONS WANTED TO MAINTAIN HIGH HEALTHCARE STANDARDS DURING BUSY OLYMPICS. With more than 600,000 new transit customers filling the tube lines during the 2012 Olympics, this organization worried about their staff getting to work on time, if at all. Provide same standard of patient care and health services from anywhere Access clinical data from outside the hospital Deploy and manage like a conventional PC Minimize hardware costs associated with scaling occasional remote access Easy-to-use: plug in, boot and go on clinician s own computer The Microsoft Windows To Go solution provided a far more cost-effective and seamless solution that not only allowed our staff to successfully work remotely, but also proved very simple to roll out. Deputy CIO The solution performed so well during the summer Olympics in London that this healthcare organization is making the solution available more widely across the company. Full featured desktop for BYOD Delivers real added value to staff at a lower cost Effective back up plan for times of peak medical demand

WINDOWS TO GO USE CASE: HEALTHCARE MULTIPLE USES CASES EXECS, LOB, IT US-BASED HEALTHCARE ORGANIZATION DIVERSIFIED HEALTHCARE COMPANY IN THE US AND A WORLDWIDE LEADER IN HELPING PEOPLE LIVE HEALTHIER LIVES AND HELPING TO MAKE THE HEALTH SYSTEM WORK BETTER FOR EVERYONE. This healthcare organization was looking to modernize their desktop experience while also reducing costs for vendors, contractors, telecommuters, and temporary mobile workers. Solution needed to fit multiple use case scenarios across the organization from Executives to contractors For LOB healthcare providers moving from room to room while delivering care For Execs flexibility between work and home PCs For CorpIT test use cases and vet additional solution options More secure computing environment critical to the healthcare industry Consistent look-and-feel to enhance user uptake We believe through innovative use of technology we can help people live healthier lives and make the health system work better. The Windows 8 operation system is enabling our business to realize this vision with affordable technology solutions taking our productivity to places we could not have realized with any other technology. SVP of Innovation Windows To Go enables the company to provide a streamlined look and feel that enhances the user experience while still meeting the security demands of the organization. Increase in productivity Ability to centrally manage Secure computing environment protects highly confidential patient healthcare data

END