BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Unified Vulnerability Management for Healthcare

Posted April 20, 2011    Morey Haber

Today’s businesses are facing greater regulatory demands, increasing vulnerabilities, a rapid shift to digital business processes, and flat budgets.  The healthcare industry is no different and shares the same problems as almost every other vertical; how to keep sensitive data secure. Regardless of patient information, billing and payment data, and historical medical information, protecting an individual’s rights and securing the transmission of data (paper and electronic) is one of the fundamental principles for HIPAA (Health Insurance Portability and Accountability Act of 1996). How industry manages these problems is based on the fundamental characteristics all business use to store and process large quantities of data; computers. Almost every vertical has some form of government (or private like PCI) regulation that has been enacted in the last 20 years to safe guard consumers and businesses from loose processes and malicious intent. They all share a common theme for managing vulnerabilities and controlling risk. For information technology, this is defined as Unified Vulnerability Management and all regulatory initiatives can be distilled down to the common information technology processes for managing the security of user and business data.

Meeting HIPAA requirements, according to an eEye study, takes as much as 50% of your workweek. And as if compliance itself wasn’t challenging enough, you now also need to protect against highly sophisticated attacks on healthcare organizations. eEye enables the healthcare sector to keep up with the growing and complex issues of vulnerability management by providing a solution that has been tailored specifically to the needs the industry requires. Retina addresses the security and privacy of health data through vulnerability assessment and endpoint protection by providing Administrative and Technical Safeguard Controls (HIPAA Section 508) and documenting risk analysis and management programs.

By using eEye’s Unified Vulnerability Management solution, Retina can identify the asset, associated risks, and vulnerabilities, and allow a complete review of the data in the proper context all the way through the remediation stage and final verification of fixes.   eEye complete solution incorporates a sophisticated events management system to manage the entire process and minimize resources needed to undertake this critical security initiative.

In the following five steps, a user can meet healthcare regulations and obtain compliance with business objectives using Retina:

  1. Identify all network assets regardless of function and connectivity (wired and wireless)
  2. Report security risks by vulnerabilities, regulatory compliance (HIPAA), and improper configurations.
  3. Mitigate and remediate vulnerability and security risks.
  4. Reassess and confirm mitigation steps are correct and processes are working within guidelines.
  5. Provide trending and reporting to document long term process requirements.

And, most importantly start at step one again on a periodic basis (normally monthly) to ensure the process is ongoing and maintained.

For more information on how eEye can assist your healthcare business, please click here. Unified Vulnerability Management from eEye has been designed to streamline your processes and provide you the toolsets to make regulatory compliance for healthcare a simple process to follow.

Leave a Reply

Additional articles

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Posted July 24, 2014    Morey Haber

There is a reason all BeyondTrust Privileged Account Management (PAM) solutions share the PowerBroker name: They all inherently enable you to reduce user-based risk and can be integrated under a centralized IT risk management platform. Here’s one common use case that demonstrates how this integration changes the playing field. Consider the challenge of privileged access:…

Tags:
, , , , ,
PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,