More Related Content
Similar to Stealth solution for healthcare
Similar to Stealth solution for healthcare (20)
Stealth solution for healthcare
- 2. Sample Use Case…
Healthcare Organization
Protecting PHI Data in Motion
Problem:
Ensuring sensitive information is secured while data is in
motion across private and public networks
Information sharing is necessary to provide effective healthcare services.
Health Information Exchanges (HIE) will raise the bar on the need to provide
information to consumers and to share information across many different
types of networks, providers and jurisdictional borders while protecting Solution:
patient privacy. Solutions that are deployed in HIEs must address the data
protection requirements of HIPAA/HITECH and other data protection • Using military grade encryption and unique
regulations and statutes. message shredding technology, Stealth
ensures that data cannot be stolen and/or
decoded by unauthorized users as it moves
Solution: across networks.
• Stealth creates Communities of Interest,
Unisys Stealth Solution for Secure Virtual Terminal based on user credentials and not device
location or physical topology, which control
the ability to decode Stealth formatted
messages.
• Adding or removing users to COIs or
Network changing access rights of COI members
can be accomplished in minutes with
Stealth.
Patient PHI Secure
© 2012 Unisys Corporation. All rights reserved. 2
- 3. Sample Use Case…
Healthcare Organization
Save Costs while Increasing Security
Problem:
Saving money on IT while restricting access to sensitive data
HIPAA compliance requires secure controlled access to sensitive data to
ensure patient privacy. The traditional approach of separate physical
networks for different departments to control access to information is
expensive and complex, and increases management overheard. Flattening Solution:
the network is clearly more cost efficient, but protecting access to private
resources with passwords is a breach waiting to happen. • Stealth enables physical networks to be
collapsed and VLANs to be reduced
resulting in significant CapEx/OpEx
savings.
Solution: Unisys Stealth Solution for Network
• Easy to manage user groups provide
Dept Server cryptographic separation, providing
Dept increased data security and facilitating
Network compliance while simplifying the security
Medical Records Medical Records management.
Data Center
Dept Server Common Network
Dept
• Servers and applications can be accessed
Network only by users with corresponding
“Community of Interest” (COI) keys. Non-
Registration Registration COI members cannot even see the
Dept Server systems they are not authorized to access.
Dept
Network
Finance Finance
© 2012 Unisys Corporation. All rights reserved. 3
- 4. Sample Use Case…
Healthcare Organization
SSVT Solves Leading Cause of HIPAA Data Breaches
Problem:
#1 Cause of HIPAA data breaches is theft of laptops
Using HIPAA-compliant practice management or Electronic Health Record
software packages with robust core IT systems is meaningless if someone
leaves a laptop where it can be lost or stolen. Over half of HIPAA security
breaches are behavior-driven, not technology driven. Laptops are used by Solution:
senior clinical and business personnel who access a huge number of patient
records. • SSVT allows users to securely work
anywhere without storing patient personal
health information on laptops, desktops or
portable media, while remaining invisible
Solution: even on the open internet.
• SSVT safeguards patient data by
Unisys Stealth Solution for Secure Virtual Terminal neutralizing existing infections and
malware, and protecting the data as it is
moving through the network.
• SSVT leaves no trace of user activity on
Network the system and is configured to eliminate
data loss at the end user’s PC/laptop.
• If the SSVT is lost or stolen there is no risk
of a third party getting access to your data,
Patient Data Secure as the SSVT device destroys its contents if
someone attempts to take it apart.
© 2012 Unisys Corporation. All rights reserved. 4
- 5. Sample Use Case…
Healthcare Organization
Emergency Preparedness
Problem:
When disaster strikes, medical personnel must still access
patient data
Your hospital data center has a disaster recovery “failover” plan, but if
medical personnel cannot get to a facility, patient outcomes could suffer.
Physicians must be able to triage remotely to advise on-site staff. Viewing Solution:
patient test results and diagnoses over the Internet is not secure and may
violate privacy regulations. • SSVT allows users to securely work
anywhere, while remaining invisible even
on the open internet.
• SSVT safeguards patient data by not
Solution: storing any information on the device
“hosting” the SSVT device, as well as
Unisys Stealth Solution for Secure Virtual Terminal protecting the data as it is moving through
the network.
• SSVT is password-protected and requires
user credentials to open a Stealth
Web connection, hence there is no fear of
Hospital PC Applications
Internet Hospital misuse even in case of loss or theft.
Network
Physician Laptop
Patient Data Virtual Infrastructure
© 2012 Unisys Corporation. All rights reserved. 5
- 6. Sample Use Case…
Healthcare Organization
More Secure Telemedicine than Traditional VPN
Problem:
Privacy and confidentiality requirements in the medical realm
are not different in telemedicine
As with conventional medicine, a telemedicine clinician has the same duty to
safeguard a patient’s medical records and keep treatments confidential.
Transmitting sensitive information over communication lines lends itself to Solution:
hacking attacks such as “man in the middle” eavesdropping and “phishing”
attempts whereby hackers masquerade as trusted partners. Organizations • Stealth creates a communications tunnel
must ensure that patient privacy is maintained, as well as ensuring the invisible to everyone except those who
integrity of any data or images transmitted. are pre-identified as part of the
“Community of Interest “(COI).
• Stealth is more secure than VPNs;
Solution: Stealth formatted messages are not
decodable by any software other than a
Unisys Stealth Solution for Network Stealth endpoint with matching COI keys.
• Stealth is not vulnerable to “man in the
middle” attacks because Stealth secure
tunnels eliminate a hacker from inserting
himself between Stealth endpoints.
Network
• Stealth prevents phishing attempts
because all Stealth traffic flows between
endpoints that share the same COI keys.
Lacking the specific COI key material,
Patient Medical Records Secure there is no opportunity for any traffic to
be maliciously redirected.
© 2012 Unisys Corporation. All rights reserved. 6