SlideShare a Scribd company logo
1 of 3
Download to read offline
© 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 1 of 3
Customer Case Study
EXECUTIVE SUMMARY
TEXAS HEART INSTITUTE
● Healthcare
● Houston, Texas USA
● More than 700 network users: 300-400
employ ees, plus fellows, monitors, and visitors
BUSINESS CHALLENGE
● Need f or data security
● Content f iltering to comply with HIPAA
● Employ ee access to applications without
capability to send files outside organization
NETWORK SOLUTION
● Cisco ASA 5585-XAdaptive Security
Appliance with Next-Generation Firewall
Serv ices
● Cisco Nexus Switches (Nexus 7010)
● Cisco Switches (4500)
● Mobile Cisco Routers (C819) (Mobile MRI)
● Cisco ISA Routers (C570W) (Mobile MRI)
BUSINESS RESULTS
● Prov ides moregranular security allowing
users to more easily do their jobs
● Enables access to web applications, suchas
Dropbox and Facebook, with restrictions that
prov ide legal constraints, while still allowing
employ ees to be productive
● Restricts access toport and protocol-hopping
applications, microapplications
Leveraging Context-Aware Security to Safeguard
Patient Data
Texas Heart Institute controls network access to meet regulatory compliance needs
for its locations located in the world’s largest medical complex.
Business Challenge
The Texas Heart Institute (w ww.texasheart.org), founded in 1962, is
a nonprofit organization dedicated to innovative and progressive
programs in research, education, and improved patient care for
cardiovascular health. Together w ith its clinical partner, St. Luke’s
Episcopal Hospital, it has been ranked among the top 10
cardiovascular centers in the United States by U.S. News & World
Report’s annual guide to “America’s Best Hospitals” every year since
the rankings began in 1991. Both are part of Texas Medical Center
(http://texasmedicalcenter.org/facts-and-figures/), the
w orld’s largest medical complex.
The Texas Heart Institute (THI) also is affiliated w ith The University
of Texas Health Science (UT) System, w hich promotes collaboration
in cardiovascular research and education among faculty at the Texas
Heart Institute and other UT facilities, as w ell as Baylor, University of
Houston, and Rice.
The research institute netw ork serves 700 people, including 300 to
400 employees and hundreds of fellow s, residents, auditors,
monitors, and volunteers. Data security is paramount; the institute
creates considerable intellectual property (IP), and it is a core lab for
several other institutes in the medical center. It also is responsible for
all data as it comes through its netw ork. Health Insurance Portability
and Accountability Act (HIPAA) and Health Information Technology
for Economic and Clinical Health (HITECH) Act regulations constitute
© 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 2 of 3
key protections as w ellas institute and medical center standards.
The Institute also is in the midst of a study of 10,000 middle school and high school students to learn more about
sudden cardiac death in young people. The program helps assess hard-to-detect heart anomalies that can lead to
sudden death. The resulting patient data, including MRI (magnetic resonance imaging) results, needs to be
protected as it is transmitted back to the Institute.
Additionally, the institute w anted to allow users access to previously
blocked applications that now are important to their jobs, such as
Dropbox and Facebook, w hile blocking the features that might
jeopardize security or regulations.
Solution
The institute implemented Cisco
®
ASA 5585 Adaptive Security
Appliance(s) w ith ASA 5585-X Adaptive Security Appliance w ith
Next-Generation Firew all Services, w hich allow s for an
unprecedented level of visibility into netw ork traffic flow —including
observing the users connecting to the netw ork, the devices used,
and the applications and w ebsites accessed—in order to make more
informed decisions regarding access.
The institute now can allow users access to Facebook and Dropbox
to receive files and information but not to send them, so protected data stays w ithin the institute. Cisco ASA Next-
Generation Firew all(s) also filter port and protocol applications such as BitTorrent, w hich can fall aw ry of the
organization’s legal guidelines.
In concert w ith the ASA Next-Generation Firew all(s), THI also runs Cisco AnyConnect
®
and AnyConnect Mobile,
and it utilizes the SSL VPN function of the ASA. The institute decided to return to Cisco for local sw itches and
w ireless, as w ellas ASA Next-Generation Firew all(s), after a half decade w ith an alternative provider that lacked
strong support.
Business Results
Using the Cisco ASA Next-Generation Firew all, THI augments its efforts to protect against liabilities by limiting
unw arranted and unw anted netw ork access.
“We still have to monitor, but w e can immediately block everything— from BitTorrent, to adult sites, to foreign
sites—w hile providing specific filtering rules for online access to other w ebsites,” says LaBleu.
“It’s easy to configure rules based on IP addresses,” he adds. “At the ASA, you can determine w hat goes through
the Next-Generation Firew all Services. The on-board PRSM management system makes configuration extremely
simple. The off-box PRSM allow s you to integrate ASA objects w ith the CX to simplify access polices and rules.
Above all, if there is an issue, I only have to w orkw ith one company: Cisco.”
PRODUCT LIST
SECURITYAND CONNECTIVITY
● Cisco ASA 5585-XAdaptive Security
Appliance with these Next-Generation Firewall
Serv ices:
Application Visibility and Control
Web Security Essentials
● Cisco Prime Security Manager
● C isco AnyConnect
SWITCHING AND ROUTING
● Cisco Nexus switches (Nexus 7010)
● Cisco Switches (4500)
● Mobile Cisco Routers (C819) (Mobile MRI)
● Cisco ISA Routers (C570W) (Mobile MRI)
“In my opinion, Cisco sets a high standard in both vendor support and
compatibility.”
— Chris LaBleu, Director of Information Technology, Texas Heart Institute
© 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 3 of 3
According to LaBleu, using a hardw are solution also allow ed for easier configuration and setup instead of multiple
server requirements for softw are.
THI uses the Cisco Prime Security Manager dashboard for administration, w hich the organization finds critically
important to maintaining overarching control and visibility into its security environment.
“With a single glance to our screen, w e can see w hat’s going on at all times,” says LaBleu. “The fact that PRSM
operates in real time is key for us versus other dashboards that are statically set to refresh every 15 minutes. With
real time, you can see a spike happening and counter it before it becomes a big problem.”
The Prime Security Manager dashboard also allow s administrators to drill dow n into the reporting structure easily,
to see w hat’s going on.
“The Next-General Firew all Services absolutely helps THI to achieve its goals and objectives,” says LaBleu. “It
plays a big role in w hat w e’re trying to achieve. It gives us extra-granular security that w e didn’t have. Previously,
w e w ere only able to conduct basic filtering. For example, users either w ere or w eren’t allow ed to log on to
Facebook or Dropbox.”
“Now , w e are not restricting w hat our users need to do, but w e are restricting w hat w e don’t w ant them to do.”
With Cisco, THI increasingly is leveraging technology to help serve healthcare in improved w ays, as one of the
tools that help them to be compliant w ith patient privacy law s. LaBleu points to the site-to-site connections w ith
THI’s mobile MRI trailer. The encrypted VPN tunnel connects daily to transmit patient data from middle schools
around Houston w here students receive free MRIs.
By maximizing granular access, facilitating the w ays in w hich THI can meet regulatory compliance to maintain
privacy controls, and protecting data, THI’s netw ork team can free up time needed by the organization’s scientists
and physicians to continue their important w orkin healthcare for future generations.
For More Information
To find out more about Cisco Adaptive Security Appliances go to
http://w w w.cisco.com/en/US/products/ps5708/Products_Sub_Category_Home.html
Printed in USA CXX-XXXXXX-XX 10/11

More Related Content

What's hot

Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving servicesCloudMask inc.
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industryCloudMask inc.
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...hemanthbbc
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityAccenture
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft SolutionHarriet Schneider
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyat MicroFocus Italy ❖✔
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection Pablo Junco
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital businessUlf Mattsson
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Community
 
Tasmanian data linkage unit
Tasmanian data linkage unitTasmanian data linkage unit
Tasmanian data linkage unitARDC
 
Oracle 11g security - 2014
Oracle 11g security - 2014Oracle 11g security - 2014
Oracle 11g security - 2014Connor McDonald
 

What's hot (20)

Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
Project 3
Project 3Project 3
Project 3
 
2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_security
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economy
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
 
Tasmanian data linkage unit
Tasmanian data linkage unitTasmanian data linkage unit
Tasmanian data linkage unit
 
Oracle 11g security - 2014
Oracle 11g security - 2014Oracle 11g security - 2014
Oracle 11g security - 2014
 

Viewers also liked

Workshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La SapienzaWorkshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La SapienzaSaverio Massaro
 
Taylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipRita_E
 
E metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalE metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalFLUZO
 
2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova2012 colloque mobilecréation-nova
2012 colloque mobilecréation-novaMobileCreation
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Lan presentation ed tech 541
Lan presentation ed tech 541Lan presentation ed tech 541
Lan presentation ed tech 541amybass
 
Presentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San PedroPresentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San Pedrowww.tumarketing.co
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
 
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...Saverio Massaro
 
Interni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàSaverio Massaro
 
Taylor rita
Taylor ritaTaylor rita
Taylor ritaRita_E
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Customer support 1
Customer support 1Customer support 1
Customer support 1Arya Ningrat
 
Ida ketik pengaruh tv terhadap anak
Ida ketik  pengaruh tv terhadap anakIda ketik  pengaruh tv terhadap anak
Ida ketik pengaruh tv terhadap anakArya Ningrat
 

Viewers also liked (20)

Workshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La SapienzaWorkshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La Sapienza
 
Hipertensi 2
Hipertensi 2Hipertensi 2
Hipertensi 2
 
Taylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zip
 
E metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalE metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols final
 
2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Lan presentation ed tech 541
Lan presentation ed tech 541Lan presentation ed tech 541
Lan presentation ed tech 541
 
Presentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San PedroPresentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San Pedro
 
Bab 1 nifas 2
Bab 1 nifas 2Bab 1 nifas 2
Bab 1 nifas 2
 
Intannnnn5555
Intannnnn5555Intannnnn5555
Intannnnn5555
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
 
Interni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolarità
 
Taylor rita
Taylor ritaTaylor rita
Taylor rita
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Customer support 1
Customer support 1Customer support 1
Customer support 1
 
Teori 2
Teori 2Teori 2
Teori 2
 
affizan eady
affizan eadyaffizan eady
affizan eady
 
Ida ketik pengaruh tv terhadap anak
Ida ketik  pengaruh tv terhadap anakIda ketik  pengaruh tv terhadap anak
Ida ketik pengaruh tv terhadap anak
 
Bunga lanka
Bunga lankaBunga lanka
Bunga lanka
 

Similar to Leveraging Context-Aware Security to Safeguard Patient Data

Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigANIL247048
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...NAUMAN MUSHTAQ
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...IJSRED
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountabilityNagaraj Naidu
 
Citrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health SystemCitrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health SystemCitrix
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...IRJET Journal
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02Partha Sarathi Kar
 
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxRunning Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxglendar3
 
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxRunning Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxtodd581
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...Clifton M. Hasegawa & Associates, LLC
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloudieeepondy
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
 
cloud-security
cloud-securitycloud-security
cloud-securityAsun Sada
 

Similar to Leveraging Context-Aware Security to Safeguard Patient Data (20)

Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
 
The Polytechnic of Namibia
The Polytechnic of NamibiaThe Polytechnic of Namibia
The Polytechnic of Namibia
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
New Charter Housing Trust
New Charter Housing TrustNew Charter Housing Trust
New Charter Housing Trust
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountability
 
Citrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health SystemCitrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health System
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 
University of Granada
University of GranadaUniversity of Granada
University of Granada
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
 
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxRunning Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
 
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxRunning Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloud
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
cloud-security
cloud-securitycloud-security
cloud-security
 
Sapna ppt
Sapna pptSapna ppt
Sapna ppt
 

More from Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 

More from Cisco Security (20)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Leveraging Context-Aware Security to Safeguard Patient Data

  • 1. © 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 1 of 3 Customer Case Study EXECUTIVE SUMMARY TEXAS HEART INSTITUTE ● Healthcare ● Houston, Texas USA ● More than 700 network users: 300-400 employ ees, plus fellows, monitors, and visitors BUSINESS CHALLENGE ● Need f or data security ● Content f iltering to comply with HIPAA ● Employ ee access to applications without capability to send files outside organization NETWORK SOLUTION ● Cisco ASA 5585-XAdaptive Security Appliance with Next-Generation Firewall Serv ices ● Cisco Nexus Switches (Nexus 7010) ● Cisco Switches (4500) ● Mobile Cisco Routers (C819) (Mobile MRI) ● Cisco ISA Routers (C570W) (Mobile MRI) BUSINESS RESULTS ● Prov ides moregranular security allowing users to more easily do their jobs ● Enables access to web applications, suchas Dropbox and Facebook, with restrictions that prov ide legal constraints, while still allowing employ ees to be productive ● Restricts access toport and protocol-hopping applications, microapplications Leveraging Context-Aware Security to Safeguard Patient Data Texas Heart Institute controls network access to meet regulatory compliance needs for its locations located in the world’s largest medical complex. Business Challenge The Texas Heart Institute (w ww.texasheart.org), founded in 1962, is a nonprofit organization dedicated to innovative and progressive programs in research, education, and improved patient care for cardiovascular health. Together w ith its clinical partner, St. Luke’s Episcopal Hospital, it has been ranked among the top 10 cardiovascular centers in the United States by U.S. News & World Report’s annual guide to “America’s Best Hospitals” every year since the rankings began in 1991. Both are part of Texas Medical Center (http://texasmedicalcenter.org/facts-and-figures/), the w orld’s largest medical complex. The Texas Heart Institute (THI) also is affiliated w ith The University of Texas Health Science (UT) System, w hich promotes collaboration in cardiovascular research and education among faculty at the Texas Heart Institute and other UT facilities, as w ell as Baylor, University of Houston, and Rice. The research institute netw ork serves 700 people, including 300 to 400 employees and hundreds of fellow s, residents, auditors, monitors, and volunteers. Data security is paramount; the institute creates considerable intellectual property (IP), and it is a core lab for several other institutes in the medical center. It also is responsible for all data as it comes through its netw ork. Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health (HITECH) Act regulations constitute
  • 2. © 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 2 of 3 key protections as w ellas institute and medical center standards. The Institute also is in the midst of a study of 10,000 middle school and high school students to learn more about sudden cardiac death in young people. The program helps assess hard-to-detect heart anomalies that can lead to sudden death. The resulting patient data, including MRI (magnetic resonance imaging) results, needs to be protected as it is transmitted back to the Institute. Additionally, the institute w anted to allow users access to previously blocked applications that now are important to their jobs, such as Dropbox and Facebook, w hile blocking the features that might jeopardize security or regulations. Solution The institute implemented Cisco ® ASA 5585 Adaptive Security Appliance(s) w ith ASA 5585-X Adaptive Security Appliance w ith Next-Generation Firew all Services, w hich allow s for an unprecedented level of visibility into netw ork traffic flow —including observing the users connecting to the netw ork, the devices used, and the applications and w ebsites accessed—in order to make more informed decisions regarding access. The institute now can allow users access to Facebook and Dropbox to receive files and information but not to send them, so protected data stays w ithin the institute. Cisco ASA Next- Generation Firew all(s) also filter port and protocol applications such as BitTorrent, w hich can fall aw ry of the organization’s legal guidelines. In concert w ith the ASA Next-Generation Firew all(s), THI also runs Cisco AnyConnect ® and AnyConnect Mobile, and it utilizes the SSL VPN function of the ASA. The institute decided to return to Cisco for local sw itches and w ireless, as w ellas ASA Next-Generation Firew all(s), after a half decade w ith an alternative provider that lacked strong support. Business Results Using the Cisco ASA Next-Generation Firew all, THI augments its efforts to protect against liabilities by limiting unw arranted and unw anted netw ork access. “We still have to monitor, but w e can immediately block everything— from BitTorrent, to adult sites, to foreign sites—w hile providing specific filtering rules for online access to other w ebsites,” says LaBleu. “It’s easy to configure rules based on IP addresses,” he adds. “At the ASA, you can determine w hat goes through the Next-Generation Firew all Services. The on-board PRSM management system makes configuration extremely simple. The off-box PRSM allow s you to integrate ASA objects w ith the CX to simplify access polices and rules. Above all, if there is an issue, I only have to w orkw ith one company: Cisco.” PRODUCT LIST SECURITYAND CONNECTIVITY ● Cisco ASA 5585-XAdaptive Security Appliance with these Next-Generation Firewall Serv ices: Application Visibility and Control Web Security Essentials ● Cisco Prime Security Manager ● C isco AnyConnect SWITCHING AND ROUTING ● Cisco Nexus switches (Nexus 7010) ● Cisco Switches (4500) ● Mobile Cisco Routers (C819) (Mobile MRI) ● Cisco ISA Routers (C570W) (Mobile MRI) “In my opinion, Cisco sets a high standard in both vendor support and compatibility.” — Chris LaBleu, Director of Information Technology, Texas Heart Institute
  • 3. © 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 3 of 3 According to LaBleu, using a hardw are solution also allow ed for easier configuration and setup instead of multiple server requirements for softw are. THI uses the Cisco Prime Security Manager dashboard for administration, w hich the organization finds critically important to maintaining overarching control and visibility into its security environment. “With a single glance to our screen, w e can see w hat’s going on at all times,” says LaBleu. “The fact that PRSM operates in real time is key for us versus other dashboards that are statically set to refresh every 15 minutes. With real time, you can see a spike happening and counter it before it becomes a big problem.” The Prime Security Manager dashboard also allow s administrators to drill dow n into the reporting structure easily, to see w hat’s going on. “The Next-General Firew all Services absolutely helps THI to achieve its goals and objectives,” says LaBleu. “It plays a big role in w hat w e’re trying to achieve. It gives us extra-granular security that w e didn’t have. Previously, w e w ere only able to conduct basic filtering. For example, users either w ere or w eren’t allow ed to log on to Facebook or Dropbox.” “Now , w e are not restricting w hat our users need to do, but w e are restricting w hat w e don’t w ant them to do.” With Cisco, THI increasingly is leveraging technology to help serve healthcare in improved w ays, as one of the tools that help them to be compliant w ith patient privacy law s. LaBleu points to the site-to-site connections w ith THI’s mobile MRI trailer. The encrypted VPN tunnel connects daily to transmit patient data from middle schools around Houston w here students receive free MRIs. By maximizing granular access, facilitating the w ays in w hich THI can meet regulatory compliance to maintain privacy controls, and protecting data, THI’s netw ork team can free up time needed by the organization’s scientists and physicians to continue their important w orkin healthcare for future generations. For More Information To find out more about Cisco Adaptive Security Appliances go to http://w w w.cisco.com/en/US/products/ps5708/Products_Sub_Category_Home.html Printed in USA CXX-XXXXXX-XX 10/11