SlideShare a Scribd company logo
1 of 6
Unisys Stealth Solution for Network


Solution Guide
Relative to the 2.4 Release
Sample Use Case…
Healthcare Organization
Protecting PHI Data in Motion
Problem:
Ensuring sensitive information is secured while data is in
motion across private and public networks
Information sharing is necessary to provide effective healthcare services.
Health Information Exchanges (HIE) will raise the bar on the need to provide
information to consumers and to share information across many different
types of networks, providers and jurisdictional borders while protecting       Solution:
patient privacy. Solutions that are deployed in HIEs must address the data
protection requirements of HIPAA/HITECH and other data protection              • Using military grade encryption and unique
regulations and statutes.                                                        message shredding technology, Stealth
                                                                                 ensures that data cannot be stolen and/or
                                                                                 decoded by unauthorized users as it moves
Solution:                                                                        across networks.
                                                                               • Stealth creates Communities of Interest,
Unisys Stealth Solution for Secure Virtual Terminal                              based on user credentials and not device
                                                                                 location or physical topology, which control
                                                                                 the ability to decode Stealth formatted
                                                                                 messages.
                                                                               • Adding or removing users to COIs or
                          Network                                                changing access rights of COI members
                                                                                 can be accomplished in minutes with
                                                                                 Stealth.

                                   Patient PHI Secure



                                                                               © 2012 Unisys Corporation. All rights reserved.   2
Sample Use Case…
  Healthcare Organization
  Save Costs while Increasing Security

  Problem:
  Saving money on IT while restricting access to sensitive data
  HIPAA compliance requires secure controlled access to sensitive data to
  ensure patient privacy. The traditional approach of separate physical
  networks for different departments to control access to information is
  expensive and complex, and increases management overheard. Flattening                           Solution:
  the network is clearly more cost efficient, but protecting access to private
  resources with passwords is a breach waiting to happen.                                         • Stealth enables physical networks to be
                                                                                                    collapsed and VLANs to be reduced
                                                                                                    resulting  in   significant CapEx/OpEx
                                                                                                    savings.
Solution: Unisys Stealth Solution for Network
                                                                                                  • Easy to manage user groups provide
                             Dept Server                                                            cryptographic   separation,     providing
                   Dept                                                                             increased data security and facilitating
                   Network                                                                          compliance while simplifying the security
Medical Records                               Medical Records                                       management.
                                                                                    Data Center
                              Dept Server                          Common Network
                   Dept
                                                                                                  • Servers and applications can be accessed
                   Network                                                                          only by users with corresponding
                                                                                                    “Community of Interest” (COI) keys. Non-
Registration                                     Registration                                       COI members cannot even see the
                              Dept Server                                                           systems they are not authorized to access.
                   Dept
                   Network




 Finance                                         Finance

                                                                                                  © 2012 Unisys Corporation. All rights reserved.   3
Sample Use Case…
Healthcare Organization
SSVT Solves Leading Cause of HIPAA Data Breaches

Problem:
#1 Cause of HIPAA data breaches is theft of laptops
Using HIPAA-compliant practice management or Electronic Health Record
software packages with robust core IT systems is meaningless if someone
leaves a laptop where it can be lost or stolen. Over half of HIPAA security
breaches are behavior-driven, not technology driven. Laptops are used by      Solution:
senior clinical and business personnel who access a huge number of patient
records.                                                                      • SSVT allows users to securely work
                                                                                anywhere without storing patient personal
                                                                                health information on laptops, desktops or
                                                                                portable media, while remaining invisible
Solution:                                                                       even on the open internet.
                                                                              • SSVT safeguards patient data by
Unisys Stealth Solution for Secure Virtual Terminal                             neutralizing existing infections and
                                                                                malware, and protecting the data as it is
                                                                                moving through the network.
                                                                              • SSVT leaves no trace of user activity on
                           Network                                              the system and is configured to eliminate
                                                                                data loss at the end user’s PC/laptop.
                                                                              • If the SSVT is lost or stolen there is no risk
                                                                                of a third party getting access to your data,
                                Patient Data Secure                             as the SSVT device destroys its contents if
                                                                                someone attempts to take it apart.


                                                                              © 2012 Unisys Corporation. All rights reserved.   4
Sample Use Case…
      Healthcare Organization
      Emergency Preparedness

      Problem:
      When disaster strikes, medical personnel must still access
      patient data
      Your hospital data center has a disaster recovery “failover” plan, but if
      medical personnel cannot get to a facility, patient outcomes could suffer.
      Physicians must be able to triage remotely to advise on-site staff. Viewing             Solution:
      patient test results and diagnoses over the Internet is not secure and may
      violate privacy regulations.                                                            • SSVT allows users to securely work
                                                                                                anywhere, while remaining invisible even
                                                                                                on the open internet.
                                                                                              • SSVT safeguards patient data by not
      Solution:                                                                                 storing any information on the device
                                                                                                “hosting” the SSVT device, as well as
      Unisys Stealth Solution for Secure Virtual Terminal                                       protecting the data as it is moving through
                                                                                                the network.
                                                                                              • SSVT is password-protected and requires
                                                                                                user credentials to open a Stealth
                                                                                  Web           connection, hence there is no fear of
                                                       Hospital PC             Applications
                   Internet           Hospital                                                  misuse even in case of loss or theft.
                                      Network
Physician Laptop

                                               Patient Data Virtual Infrastructure




                                                                                              © 2012 Unisys Corporation. All rights reserved.   5
Sample Use Case…
Healthcare Organization
More Secure Telemedicine than Traditional VPN
Problem:
Privacy and confidentiality requirements in the medical realm
are not different in telemedicine
As with conventional medicine, a telemedicine clinician has the same duty to
safeguard a patient’s medical records and keep treatments confidential.
Transmitting sensitive information over communication lines lends itself to    Solution:
hacking attacks such as “man in the middle” eavesdropping and “phishing”
attempts whereby hackers masquerade as trusted partners. Organizations         •     Stealth creates a communications tunnel
must ensure that patient privacy is maintained, as well as ensuring the              invisible to everyone except those who
integrity of any data or images transmitted.                                         are pre-identified as part of the
                                                                                     “Community of Interest “(COI).
                                                                               •     Stealth is more secure than VPNs;
Solution:                                                                            Stealth formatted messages are not
                                                                                     decodable by any software other than a
Unisys Stealth Solution for Network                                                  Stealth endpoint with matching COI keys.
                                                                               •     Stealth is not vulnerable to “man in the
                                                                                     middle” attacks because Stealth secure
                                                                                     tunnels eliminate a hacker from inserting
                                                                                     himself between Stealth endpoints.
                           Network
                                                                               •     Stealth prevents phishing attempts
                                                                                     because all Stealth traffic flows between
                                                                                     endpoints that share the same COI keys.
                                                                                     Lacking the specific COI key material,
                           Patient Medical Records Secure                            there is no opportunity for any traffic to
                                                                                     be maliciously redirected.

                                                                               © 2012 Unisys Corporation. All rights reserved.   6

More Related Content

What's hot

Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical FacilitiesSE_NAM_Training
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middlewareLeonardo Bruni
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsInfosys Finacle
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systemskhairulanuarhasan
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesRichard Cole
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 

What's hot (20)

Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical Facilities
 
A survey about context-aware middleware
A survey about context-aware middlewareA survey about context-aware middleware
A survey about context-aware middleware
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking Applications
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
6.1 concepts of information systems
6.1 concepts of information systems6.1 concepts of information systems
6.1 concepts of information systems
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
76 s201913
76 s20191376 s201913
76 s201913
 
Regulatory Compliance Financial Institution
Regulatory Compliance Financial InstitutionRegulatory Compliance Financial Institution
Regulatory Compliance Financial Institution
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas Companies
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 

Viewers also liked

Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrialSherid444
 
Unisys Security Insights Infografico: Colombia
Unisys Security Insights Infografico: ColombiaUnisys Security Insights Infografico: Colombia
Unisys Security Insights Infografico: ColombiaUnisys Corporation
 
Unisys Security Insights Infografico: Brasil
Unisys Security Insights Infografico: BrasilUnisys Security Insights Infografico: Brasil
Unisys Security Insights Infografico: BrasilUnisys Corporation
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure InfographicUnisys Corporation
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Corporation
 
Unisys PowerPoint Templates Redesign
Unisys PowerPoint Templates RedesignUnisys PowerPoint Templates Redesign
Unisys PowerPoint Templates RedesignPhonesavanh Viseth
 
Pitch for thriller opening
Pitch for thriller openingPitch for thriller opening
Pitch for thriller openinggroup41set9
 
Surat lamaran
Surat lamaranSurat lamaran
Surat lamaranevalugina
 
Del Presidente y del Vicepresidente de la República
Del Presidente y del Vicepresidente de la RepúblicaDel Presidente y del Vicepresidente de la República
Del Presidente y del Vicepresidente de la RepúblicaSergio Lagos Avella
 
Pitch for thriller opening
Pitch for thriller openingPitch for thriller opening
Pitch for thriller openinggroup41set9
 
Мастер-класс GMC: Работа над ошибками, 19 декабря 2012, РАНХиГС
Мастер-класс GMC: Работа над ошибками, 19 декабря 2012, РАНХиГСМастер-класс GMC: Работа над ошибками, 19 декабря 2012, РАНХиГС
Мастер-класс GMC: Работа над ошибками, 19 декабря 2012, РАНХиГСАлександр Иванилов
 
Денис Каминский, Управление карьерой, РАНХиГС 30.01.2013
Денис Каминский, Управление карьерой, РАНХиГС 30.01.2013Денис Каминский, Управление карьерой, РАНХиГС 30.01.2013
Денис Каминский, Управление карьерой, РАНХиГС 30.01.2013Александр Иванилов
 
1797 chapter ii
1797 chapter ii1797 chapter ii
1797 chapter iibaadsah
 
Candace Klein - Presentation Venture Capital Conference and Workshop
Candace Klein - Presentation Venture Capital Conference and WorkshopCandace Klein - Presentation Venture Capital Conference and Workshop
Candace Klein - Presentation Venture Capital Conference and WorkshopWomenTechCouncil
 
Question 3 evaluation
Question 3 evaluationQuestion 3 evaluation
Question 3 evaluationgroup41set9
 
Poverty is the worst form of violence
Poverty  is the worst form of violencePoverty  is the worst form of violence
Poverty is the worst form of violencesruthiarjun
 
Digital citizenship kids and teenagers
Digital citizenship kids and teenagersDigital citizenship kids and teenagers
Digital citizenship kids and teenagersFabiana Gutierrez
 

Viewers also liked (20)

Gettozero stealth industrial
Gettozero stealth industrialGettozero stealth industrial
Gettozero stealth industrial
 
Unisys Security Insights Infografico: Colombia
Unisys Security Insights Infografico: ColombiaUnisys Security Insights Infografico: Colombia
Unisys Security Insights Infografico: Colombia
 
Unisys Security Insights Infografico: Brasil
Unisys Security Insights Infografico: BrasilUnisys Security Insights Infografico: Brasil
Unisys Security Insights Infografico: Brasil
 
​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic​​Unisys Stealth(cloud)™ for Azure Infographic
​​Unisys Stealth(cloud)™ for Azure Infographic
 
Unisys Stealth Industries Infographic
Unisys Stealth Industries InfographicUnisys Stealth Industries Infographic
Unisys Stealth Industries Infographic
 
Unisys PowerPoint Templates Redesign
Unisys PowerPoint Templates RedesignUnisys PowerPoint Templates Redesign
Unisys PowerPoint Templates Redesign
 
Unisys Mobility Solutions
Unisys Mobility SolutionsUnisys Mobility Solutions
Unisys Mobility Solutions
 
Pitch for thriller opening
Pitch for thriller openingPitch for thriller opening
Pitch for thriller opening
 
Surat lamaran
Surat lamaranSurat lamaran
Surat lamaran
 
Del Presidente y del Vicepresidente de la República
Del Presidente y del Vicepresidente de la RepúblicaDel Presidente y del Vicepresidente de la República
Del Presidente y del Vicepresidente de la República
 
Pitch for thriller opening
Pitch for thriller openingPitch for thriller opening
Pitch for thriller opening
 
Изоляция для МедиаЛаб
Изоляция для МедиаЛабИзоляция для МедиаЛаб
Изоляция для МедиаЛаб
 
Мастер-класс GMC: Работа над ошибками, 19 декабря 2012, РАНХиГС
Мастер-класс GMC: Работа над ошибками, 19 декабря 2012, РАНХиГСМастер-класс GMC: Работа над ошибками, 19 декабря 2012, РАНХиГС
Мастер-класс GMC: Работа над ошибками, 19 декабря 2012, РАНХиГС
 
Денис Каминский, Управление карьерой, РАНХиГС 30.01.2013
Денис Каминский, Управление карьерой, РАНХиГС 30.01.2013Денис Каминский, Управление карьерой, РАНХиГС 30.01.2013
Денис Каминский, Управление карьерой, РАНХиГС 30.01.2013
 
1797 chapter ii
1797 chapter ii1797 chapter ii
1797 chapter ii
 
Candace Klein - Presentation Venture Capital Conference and Workshop
Candace Klein - Presentation Venture Capital Conference and WorkshopCandace Klein - Presentation Venture Capital Conference and Workshop
Candace Klein - Presentation Venture Capital Conference and Workshop
 
Question 3 evaluation
Question 3 evaluationQuestion 3 evaluation
Question 3 evaluation
 
Poverty is the worst form of violence
Poverty  is the worst form of violencePoverty  is the worst form of violence
Poverty is the worst form of violence
 
Global Management Challenge Russia Briefing
Global Management Challenge Russia BriefingGlobal Management Challenge Russia Briefing
Global Management Challenge Russia Briefing
 
Digital citizenship kids and teenagers
Digital citizenship kids and teenagersDigital citizenship kids and teenagers
Digital citizenship kids and teenagers
 

Similar to Stealth solution for healthcare

Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Unisys Corporation
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet yonifine
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...IEEEFINALYEARSTUDENTSPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...IEEEFINALSEMSTUDENTPROJECTS
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security vSYYULIANISKOMMT
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...elisasson
 
Hitachi ID Solutions Supporting HIPAA Compliance
Hitachi ID Solutions Supporting HIPAA ComplianceHitachi ID Solutions Supporting HIPAA Compliance
Hitachi ID Solutions Supporting HIPAA ComplianceHitachi ID Systems, Inc.
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Isuru Vincent
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?Mario Drobics
 
ENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT Technologies
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 

Similar to Stealth solution for healthcare (20)

CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
 
Hitachi ID Solutions Supporting HIPAA Compliance
Hitachi ID Solutions Supporting HIPAA ComplianceHitachi ID Solutions Supporting HIPAA Compliance
Hitachi ID Solutions Supporting HIPAA Compliance
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
ENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-Benefits
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 

Stealth solution for healthcare

  • 1. Unisys Stealth Solution for Network Solution Guide Relative to the 2.4 Release
  • 2. Sample Use Case… Healthcare Organization Protecting PHI Data in Motion Problem: Ensuring sensitive information is secured while data is in motion across private and public networks Information sharing is necessary to provide effective healthcare services. Health Information Exchanges (HIE) will raise the bar on the need to provide information to consumers and to share information across many different types of networks, providers and jurisdictional borders while protecting Solution: patient privacy. Solutions that are deployed in HIEs must address the data protection requirements of HIPAA/HITECH and other data protection • Using military grade encryption and unique regulations and statutes. message shredding technology, Stealth ensures that data cannot be stolen and/or decoded by unauthorized users as it moves Solution: across networks. • Stealth creates Communities of Interest, Unisys Stealth Solution for Secure Virtual Terminal based on user credentials and not device location or physical topology, which control the ability to decode Stealth formatted messages. • Adding or removing users to COIs or Network changing access rights of COI members can be accomplished in minutes with Stealth. Patient PHI Secure © 2012 Unisys Corporation. All rights reserved. 2
  • 3. Sample Use Case… Healthcare Organization Save Costs while Increasing Security Problem: Saving money on IT while restricting access to sensitive data HIPAA compliance requires secure controlled access to sensitive data to ensure patient privacy. The traditional approach of separate physical networks for different departments to control access to information is expensive and complex, and increases management overheard. Flattening Solution: the network is clearly more cost efficient, but protecting access to private resources with passwords is a breach waiting to happen. • Stealth enables physical networks to be collapsed and VLANs to be reduced resulting in significant CapEx/OpEx savings. Solution: Unisys Stealth Solution for Network • Easy to manage user groups provide Dept Server cryptographic separation, providing Dept increased data security and facilitating Network compliance while simplifying the security Medical Records Medical Records management. Data Center Dept Server Common Network Dept • Servers and applications can be accessed Network only by users with corresponding “Community of Interest” (COI) keys. Non- Registration Registration COI members cannot even see the Dept Server systems they are not authorized to access. Dept Network Finance Finance © 2012 Unisys Corporation. All rights reserved. 3
  • 4. Sample Use Case… Healthcare Organization SSVT Solves Leading Cause of HIPAA Data Breaches Problem: #1 Cause of HIPAA data breaches is theft of laptops Using HIPAA-compliant practice management or Electronic Health Record software packages with robust core IT systems is meaningless if someone leaves a laptop where it can be lost or stolen. Over half of HIPAA security breaches are behavior-driven, not technology driven. Laptops are used by Solution: senior clinical and business personnel who access a huge number of patient records. • SSVT allows users to securely work anywhere without storing patient personal health information on laptops, desktops or portable media, while remaining invisible Solution: even on the open internet. • SSVT safeguards patient data by Unisys Stealth Solution for Secure Virtual Terminal neutralizing existing infections and malware, and protecting the data as it is moving through the network. • SSVT leaves no trace of user activity on Network the system and is configured to eliminate data loss at the end user’s PC/laptop. • If the SSVT is lost or stolen there is no risk of a third party getting access to your data, Patient Data Secure as the SSVT device destroys its contents if someone attempts to take it apart. © 2012 Unisys Corporation. All rights reserved. 4
  • 5. Sample Use Case… Healthcare Organization Emergency Preparedness Problem: When disaster strikes, medical personnel must still access patient data Your hospital data center has a disaster recovery “failover” plan, but if medical personnel cannot get to a facility, patient outcomes could suffer. Physicians must be able to triage remotely to advise on-site staff. Viewing Solution: patient test results and diagnoses over the Internet is not secure and may violate privacy regulations. • SSVT allows users to securely work anywhere, while remaining invisible even on the open internet. • SSVT safeguards patient data by not Solution: storing any information on the device “hosting” the SSVT device, as well as Unisys Stealth Solution for Secure Virtual Terminal protecting the data as it is moving through the network. • SSVT is password-protected and requires user credentials to open a Stealth Web connection, hence there is no fear of Hospital PC Applications Internet Hospital misuse even in case of loss or theft. Network Physician Laptop Patient Data Virtual Infrastructure © 2012 Unisys Corporation. All rights reserved. 5
  • 6. Sample Use Case… Healthcare Organization More Secure Telemedicine than Traditional VPN Problem: Privacy and confidentiality requirements in the medical realm are not different in telemedicine As with conventional medicine, a telemedicine clinician has the same duty to safeguard a patient’s medical records and keep treatments confidential. Transmitting sensitive information over communication lines lends itself to Solution: hacking attacks such as “man in the middle” eavesdropping and “phishing” attempts whereby hackers masquerade as trusted partners. Organizations • Stealth creates a communications tunnel must ensure that patient privacy is maintained, as well as ensuring the invisible to everyone except those who integrity of any data or images transmitted. are pre-identified as part of the “Community of Interest “(COI). • Stealth is more secure than VPNs; Solution: Stealth formatted messages are not decodable by any software other than a Unisys Stealth Solution for Network Stealth endpoint with matching COI keys. • Stealth is not vulnerable to “man in the middle” attacks because Stealth secure tunnels eliminate a hacker from inserting himself between Stealth endpoints. Network • Stealth prevents phishing attempts because all Stealth traffic flows between endpoints that share the same COI keys. Lacking the specific COI key material, Patient Medical Records Secure there is no opportunity for any traffic to be maliciously redirected. © 2012 Unisys Corporation. All rights reserved. 6