Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Unified Vulnerability Management for Healthcare

Posted April 20, 2011    Morey Haber

Today’s businesses are facing greater regulatory demands, increasing vulnerabilities, a rapid shift to digital business processes, and flat budgets.  The healthcare industry is no different and shares the same problems as almost every other vertical; how to keep sensitive data secure. Regardless of patient information, billing and payment data, and historical medical information, protecting an individual’s rights and securing the transmission of data (paper and electronic) is one of the fundamental principles for HIPAA (Health Insurance Portability and Accountability Act of 1996). How industry manages these problems is based on the fundamental characteristics all business use to store and process large quantities of data; computers. Almost every vertical has some form of government (or private like PCI) regulation that has been enacted in the last 20 years to safe guard consumers and businesses from loose processes and malicious intent. They all share a common theme for managing vulnerabilities and controlling risk. For information technology, this is defined as Unified Vulnerability Management and all regulatory initiatives can be distilled down to the common information technology processes for managing the security of user and business data.

Meeting HIPAA requirements, according to an eEye study, takes as much as 50% of your workweek. And as if compliance itself wasn’t challenging enough, you now also need to protect against highly sophisticated attacks on healthcare organizations. eEye enables the healthcare sector to keep up with the growing and complex issues of vulnerability management by providing a solution that has been tailored specifically to the needs the industry requires. Retina addresses the security and privacy of health data through vulnerability assessment and endpoint protection by providing Administrative and Technical Safeguard Controls (HIPAA Section 508) and documenting risk analysis and management programs.

By using eEye’s Unified Vulnerability Management solution, Retina can identify the asset, associated risks, and vulnerabilities, and allow a complete review of the data in the proper context all the way through the remediation stage and final verification of fixes.   eEye complete solution incorporates a sophisticated events management system to manage the entire process and minimize resources needed to undertake this critical security initiative.

In the following five steps, a user can meet healthcare regulations and obtain compliance with business objectives using Retina:

  1. Identify all network assets regardless of function and connectivity (wired and wireless)
  2. Report security risks by vulnerabilities, regulatory compliance (HIPAA), and improper configurations.
  3. Mitigate and remediate vulnerability and security risks.
  4. Reassess and confirm mitigation steps are correct and processes are working within guidelines.
  5. Provide trending and reporting to document long term process requirements.

And, most importantly start at step one again on a periodic basis (normally monthly) to ensure the process is ongoing and maintained.

For more information on how eEye can assist your healthcare business, please click here. Unified Vulnerability Management from eEye has been designed to streamline your processes and provide you the toolsets to make regulatory compliance for healthcare a simple process to follow.

Leave a Reply

Additional articles


Answering the age-old question, ‘What’s plugged into my network?’

Posted October 9, 2015    Alejandro DaCosta

“What’s plugged into my network?” is a question I hear frequently from security administrators. And, really, it’s no surprise why. No longer do we have to account just for the physical servers in our datacenters, workstations and a few network devices. Now we need to keep track of roaming laptops, dynamic virtual systems, off-site cloud deployments and BYOD.


Closing the Vulnerability Gap

Posted October 7, 2015    Brian Chappell

Managing vulnerabilities is a significant challenge for many organizations. The main difficulties with managing this manifest in two key areas. The first is that the list isn’t static. The second is priority.


Scottrade Breach: Identified by Federal Officials

Posted October 5, 2015    Morey Haber

Late afternoon on October 2nd, news leaked out of another large security breach, now at Scottrade. The identity count of records, in the millions again (4.6 million is the latest). This breach comes on the second day of national CyberSecurity month, the first being Experian/T-Mobile breach.