SlideShare a Scribd company logo
1 of 3
Download to read offline
Gateway Secures Web 2.0 Initiative




Concerned about malware and other security issues, Health First settled on a
solution that allows IT to set granular, flexible Internet usage policies for devices, as
well as specific users and groups.


Ref.: http://www.healthmgttech.com/features/2009_october/1009_gateway.aspx


Leaders at Health First, a Florida-based not-for-profit healthcare organization, thought that
Web 2.0 had the potential to offer new ways to communicate with patients, employees and
potential new patients. Protecting sensitive patient data and the integrity of the organization,
however, was a paramount consideration and staff worried that opening access without the
right security, policies and planning could be disastrous – because Web 2.0 sites are a top
target of cybercriminals and a major source of data loss if not managed properly.
        “In order to let our employees visit these (social networking) sites, we needed a
       Web security gateway solution that sits inline in the network stream and is able to
                       look at the specific content on the page in real time.”

Just a few years ago, IT managers at healthcare organizations could simply use Web security
and filtering solutions to set strict policies blocking employees from nearly all outside Internet
access. The risks posed by the Web – such as an employee accidentally introducing malware or
a virus onto the corporate network or viewing inappropriate information – were greater than
the benefits of allowing Internet access. Today, however, with the introduction of Web 2.0
technologies like cloud-based services, social networking sites, and new collaboration and
communication tools, the closed environment can be unrealistic and can hinder business
process.
"Web 2.0 can help our organization stay ahead of the technology curve, but jumping in without
a plan in place was not an option," says Christi Rushnell, Health First vice president,
information technology and strategic services. "Protecting patient and personally identifiable
information – both because it’s our corporate responsibility and also to meet compliance
regulation standards like HIPAA and the HITECH Act – is our first priority, and so having the
right security in place was our number one concern before opening access to Web 2.0."
Health First IT and security management teams were approached by different groups
throughout the organization about enabling access to tools like social networking sites to
extend their communication on a real-time basis as a cost-effective marketing tool.
Additionally, Health First was running out of room in its data center and so staff began to move
systems traditionally managed onsite to the cloud, such as transcription services and
enterprise-wide patient scheduling.
The Health First network includes three hospitals, the county’s only trauma center, fitness
centers and an aging institute, among other services. With more than 6,000 Internet-
connected devices throughout the organization and thousands of employees with different
roles, one of the most critical challenges to opening access to Web 2.0 was to find a security
solution that would allow IT to set granular, flexible Internet usage policies for devices, as well


                                               1 Of 3
as specific users and groups within the organization. Health First wanted to set policies that
could, based on an employee’s role, control how much access that person had to Web 2.0
sites, how much time they could spend on those sites, what level of access they could have to
sensitive corporate information and even what they could do with that information.


Flexibility for Different Needs
"We needed a flexible solution that would provide our marketing team, for example, with
access to YouTube to create and promote videos on new services we provide and to access our
Facebook fan page, or allow our nurses and doctors to access the cloud-based patient care
applications we use," says Rushnell. "But we also needed the flexibility to ensure that a
machine in an openly accessible area was secured from allowing people to go to places on the
Web that would violate policies or put the organization at risk."
Another problem Health First faced was that Web 2.0 sites present an emerging vector for
malware and other data-stealing attacks. Cybercriminals are increasingly infecting sites that
enable user-generated content such as blogs and Twitter, with malicious content. Recent
research also shows that 57 percent of data-stealing attacks are coming over the Web. Health
First found that traditional security solutions were not up to the task of protecting against Web
2.0 attacks and inappropriate content.
"Web 2.0 has quickly diminished the effectiveness of traditional security solutions like
signature-based antivirus and traditional URL filtering, because it’s dynamic and constantly
changing," says Frank Waszmer, Heath First information security architect. "Reputation-based
security is also not enough, as Web 2.0 sites generally have a "good" reputation.
"Places like news sites, Google and social networking sites have great reputations but, today,
it’s often these legitimate sites that are targeted. In order to let our employees visit these
sites, we needed a Web security gateway solution that sits inline in the network stream, is able
to look at the specific content on the page and then prevent the malicious elements from being
accessed."
Another requirement was the ability to look at encrypted secure socket layer (SSL) streams.
Waszmer noticed an increased amount of malicious traffic set up through SSL sessions.
Without being able to see into the traffic streams, Waszmer worried that data-stealing malware
could make its way into the network.
Health First selected Websense Web Security Gateway as a tool to enable employees to safely
access Web 2.0. Waszmer designed a deployment strategy to help minimize installation time.
To redirect HTTP and HTTPS Web traffic to the gateway, he deployed the system in what is
called a "transparent proxy," utilizing the WCCP protocol. The majority of time spent on this
project has been around fine-tuning Web-use policies and working with the different
departments to provide greater control and feedback.


Policies Drive Compliance
Health First currently has five global policies that govern where and how people can use and
interact with the Internet and Waszmer has created more than 20 specialized policies around
Web use to provide greater protection for key areas.
"Today, we are able to set Web-use policies around users, groups and devices," Waszmer
notes. "Because of the flexibility of the secure Web gateway and the reporting and policy
infrastructure we have created, we have been able to roll out access to different Web 2.0 sites
to the groups and specific people that need it.
"Additionally, one of the unique benefits about the solution is that it classifies specific content
on Web sites in real time. So, if it classifies a Web page that has some business benefits but
also contains some content that violates a policy, the solution will block just that one portion of
the page."
Health First uses the gateway as part of a layered security approach that involves technology,
investigation, and awareness and education. "With our strategy and technology in place, I’m


                                              2 Of 3
able to run reports on Web use, see malicious or inappropriate sites employees have
attempted to access, and use the reports to better educate Web users and gain a greater
understanding of how Web 2.0 sites can be used throughout the organization," says Waszmer.
"Additionally, the reports allow my team to quickly respond to security events. With visibility
into the systems, we’re able to stay ahead of the threats before they become a problem."
"Today, healthcare IT managers and CIOs need to be an active part of the solution to balance
the business needs of Web 2.0 adoption with security," says Rushnell. "Web 2.0 is here and
only going to become a larger part of our business, so my greatest advice to other healthcare
organizations thinking about enabling Web 2.0 is that they need to anticipate the changes in
the business and adjust, actively taking steps to secure Web 2.0 use."


From the catalog
According to www.websense.com : Websense Web Security Gateway allows organizations to
secure Web traffic effectively while still enabling the latest in Web 2.0 tools and applications.
Through a real-time content-classification engine, the gateway analyzes Web traffic on the fly,
instantly categorizing new sites and dynamic content, proactively discovering security risks,
and blocking dangerous malware. Backed by Websense ThreatSeeker Network technologies,
Web Security Gateway provides advanced analytics – including rules, signatures, heuristics and
application behaviors– to detect and block proxy avoidance, hacking sites, adult content,
botnets, keyloggers, phishing attacks, spyware and many other types of unsafe content.


For more information on
Websense solutions:
www.rsleads.com/910ht-201




                                             3 Of 3

More Related Content

Viewers also liked

Tendencias de la industria: la evolución de la gestión del conocimiento (KM 1...
Tendencias de la industria: la evolución de la gestión del conocimiento (KM 1...Tendencias de la industria: la evolución de la gestión del conocimiento (KM 1...
Tendencias de la industria: la evolución de la gestión del conocimiento (KM 1...Radar Información y Conocimiento
 
Motor Qualities 1º ESO Secciones
Motor Qualities 1º ESO SeccionesMotor Qualities 1º ESO Secciones
Motor Qualities 1º ESO SeccionesCiclos Formativos
 
Brave New World: Trends in the Landscape Irrigation IICC (02-115-2-2011)
Brave New World: Trends in the Landscape Irrigation IICC (02-115-2-2011)Brave New World: Trends in the Landscape Irrigation IICC (02-115-2-2011)
Brave New World: Trends in the Landscape Irrigation IICC (02-115-2-2011)Tom Barrett
 
Guidelines For Secure Use Social Media
Guidelines For Secure Use Social MediaGuidelines For Secure Use Social Media
Guidelines For Secure Use Social MediaKim Jensen
 
Irrigation Association State Affairs Indiana Presentation(02 15-2011)
Irrigation Association State Affairs Indiana Presentation(02 15-2011)Irrigation Association State Affairs Indiana Presentation(02 15-2011)
Irrigation Association State Affairs Indiana Presentation(02 15-2011)Tom Barrett
 
Как сделать интернет-сайт на SharePoint и не передумать на полпути
Как сделать интернет-сайт на SharePoint и не передумать на полпутиКак сделать интернет-сайт на SharePoint и не передумать на полпути
Как сделать интернет-сайт на SharePoint и не передумать на полпутиAndrew Mayorov
 
Rain Garden Construction from Frazee Gardens (April 23, 2011)
Rain Garden Construction from Frazee Gardens (April 23, 2011)Rain Garden Construction from Frazee Gardens (April 23, 2011)
Rain Garden Construction from Frazee Gardens (April 23, 2011)Tom Barrett
 
Why a Website? Why not Camel? I would Walk a Mile for Camel.
Why a Website? Why not Camel? I would Walk a Mile for Camel.Why a Website? Why not Camel? I would Walk a Mile for Camel.
Why a Website? Why not Camel? I would Walk a Mile for Camel.Tom Barrett
 
Web Security Denmark Juli-August 2009
Web Security Denmark Juli-August 2009Web Security Denmark Juli-August 2009
Web Security Denmark Juli-August 2009Kim Jensen
 
Genes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast CancerGenes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast CancerSamanthaAnderson
 
Escape Garden Design Tranquility Corner - A Garden to Awake the Senses
Escape Garden Design Tranquility Corner - A Garden to Awake the SensesEscape Garden Design Tranquility Corner - A Garden to Awake the Senses
Escape Garden Design Tranquility Corner - A Garden to Awake the SensesTom Barrett
 
Roman Zdebskiy - Client vs. Browser
Roman Zdebskiy - Client vs. BrowserRoman Zdebskiy - Client vs. Browser
Roman Zdebskiy - Client vs. BrowserAndrew Mayorov
 
Cómo se puede aumentar la productividad en torno a los documentos empresariales
Cómo se puede aumentar la productividad en torno a los documentos empresarialesCómo se puede aumentar la productividad en torno a los documentos empresariales
Cómo se puede aumentar la productividad en torno a los documentos empresarialesRadar Información y Conocimiento
 
Vsevolod Leonov "Delphi XE2. Visual tools for cross-platform development"
Vsevolod Leonov "Delphi XE2. Visual tools for cross-platform development"Vsevolod Leonov "Delphi XE2. Visual tools for cross-platform development"
Vsevolod Leonov "Delphi XE2. Visual tools for cross-platform development"Andrew Mayorov
 
Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?
Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?
Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?Radar Información y Conocimiento
 
Handball "Vocabulary" 1º ESO Secciones
Handball "Vocabulary" 1º ESO SeccionesHandball "Vocabulary" 1º ESO Secciones
Handball "Vocabulary" 1º ESO SeccionesCiclos Formativos
 
Синяя Борода. История одного проекта.
Синяя Борода. История одного проекта.Синяя Борода. История одного проекта.
Синяя Борода. История одного проекта.Andrew Mayorov
 
Alexander Dolgarev "Comparizon of AMQP and Zero MQ"
Alexander Dolgarev  "Comparizon of AMQP and Zero MQ"Alexander Dolgarev  "Comparizon of AMQP and Zero MQ"
Alexander Dolgarev "Comparizon of AMQP and Zero MQ"Andrew Mayorov
 

Viewers also liked (18)

Tendencias de la industria: la evolución de la gestión del conocimiento (KM 1...
Tendencias de la industria: la evolución de la gestión del conocimiento (KM 1...Tendencias de la industria: la evolución de la gestión del conocimiento (KM 1...
Tendencias de la industria: la evolución de la gestión del conocimiento (KM 1...
 
Motor Qualities 1º ESO Secciones
Motor Qualities 1º ESO SeccionesMotor Qualities 1º ESO Secciones
Motor Qualities 1º ESO Secciones
 
Brave New World: Trends in the Landscape Irrigation IICC (02-115-2-2011)
Brave New World: Trends in the Landscape Irrigation IICC (02-115-2-2011)Brave New World: Trends in the Landscape Irrigation IICC (02-115-2-2011)
Brave New World: Trends in the Landscape Irrigation IICC (02-115-2-2011)
 
Guidelines For Secure Use Social Media
Guidelines For Secure Use Social MediaGuidelines For Secure Use Social Media
Guidelines For Secure Use Social Media
 
Irrigation Association State Affairs Indiana Presentation(02 15-2011)
Irrigation Association State Affairs Indiana Presentation(02 15-2011)Irrigation Association State Affairs Indiana Presentation(02 15-2011)
Irrigation Association State Affairs Indiana Presentation(02 15-2011)
 
Как сделать интернет-сайт на SharePoint и не передумать на полпути
Как сделать интернет-сайт на SharePoint и не передумать на полпутиКак сделать интернет-сайт на SharePoint и не передумать на полпути
Как сделать интернет-сайт на SharePoint и не передумать на полпути
 
Rain Garden Construction from Frazee Gardens (April 23, 2011)
Rain Garden Construction from Frazee Gardens (April 23, 2011)Rain Garden Construction from Frazee Gardens (April 23, 2011)
Rain Garden Construction from Frazee Gardens (April 23, 2011)
 
Why a Website? Why not Camel? I would Walk a Mile for Camel.
Why a Website? Why not Camel? I would Walk a Mile for Camel.Why a Website? Why not Camel? I would Walk a Mile for Camel.
Why a Website? Why not Camel? I would Walk a Mile for Camel.
 
Web Security Denmark Juli-August 2009
Web Security Denmark Juli-August 2009Web Security Denmark Juli-August 2009
Web Security Denmark Juli-August 2009
 
Genes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast CancerGenes Linked To Spread Of Breast Cancer
Genes Linked To Spread Of Breast Cancer
 
Escape Garden Design Tranquility Corner - A Garden to Awake the Senses
Escape Garden Design Tranquility Corner - A Garden to Awake the SensesEscape Garden Design Tranquility Corner - A Garden to Awake the Senses
Escape Garden Design Tranquility Corner - A Garden to Awake the Senses
 
Roman Zdebskiy - Client vs. Browser
Roman Zdebskiy - Client vs. BrowserRoman Zdebskiy - Client vs. Browser
Roman Zdebskiy - Client vs. Browser
 
Cómo se puede aumentar la productividad en torno a los documentos empresariales
Cómo se puede aumentar la productividad en torno a los documentos empresarialesCómo se puede aumentar la productividad en torno a los documentos empresariales
Cómo se puede aumentar la productividad en torno a los documentos empresariales
 
Vsevolod Leonov "Delphi XE2. Visual tools for cross-platform development"
Vsevolod Leonov "Delphi XE2. Visual tools for cross-platform development"Vsevolod Leonov "Delphi XE2. Visual tools for cross-platform development"
Vsevolod Leonov "Delphi XE2. Visual tools for cross-platform development"
 
Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?
Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?
Checklist gestión de registros en el gobierno. cómo hacerlo bien en 12 pasos?
 
Handball "Vocabulary" 1º ESO Secciones
Handball "Vocabulary" 1º ESO SeccionesHandball "Vocabulary" 1º ESO Secciones
Handball "Vocabulary" 1º ESO Secciones
 
Синяя Борода. История одного проекта.
Синяя Борода. История одного проекта.Синяя Борода. История одного проекта.
Синяя Борода. История одного проекта.
 
Alexander Dolgarev "Comparizon of AMQP and Zero MQ"
Alexander Dolgarev  "Comparizon of AMQP and Zero MQ"Alexander Dolgarev  "Comparizon of AMQP and Zero MQ"
Alexander Dolgarev "Comparizon of AMQP and Zero MQ"
 

More from Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 

More from Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
5 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 20035 things needed to know migrating Windows Server 2003
5 things needed to know migrating Windows Server 2003
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Health Care and Web Security

  • 1. Gateway Secures Web 2.0 Initiative Concerned about malware and other security issues, Health First settled on a solution that allows IT to set granular, flexible Internet usage policies for devices, as well as specific users and groups. Ref.: http://www.healthmgttech.com/features/2009_october/1009_gateway.aspx Leaders at Health First, a Florida-based not-for-profit healthcare organization, thought that Web 2.0 had the potential to offer new ways to communicate with patients, employees and potential new patients. Protecting sensitive patient data and the integrity of the organization, however, was a paramount consideration and staff worried that opening access without the right security, policies and planning could be disastrous – because Web 2.0 sites are a top target of cybercriminals and a major source of data loss if not managed properly. “In order to let our employees visit these (social networking) sites, we needed a Web security gateway solution that sits inline in the network stream and is able to look at the specific content on the page in real time.” Just a few years ago, IT managers at healthcare organizations could simply use Web security and filtering solutions to set strict policies blocking employees from nearly all outside Internet access. The risks posed by the Web – such as an employee accidentally introducing malware or a virus onto the corporate network or viewing inappropriate information – were greater than the benefits of allowing Internet access. Today, however, with the introduction of Web 2.0 technologies like cloud-based services, social networking sites, and new collaboration and communication tools, the closed environment can be unrealistic and can hinder business process. "Web 2.0 can help our organization stay ahead of the technology curve, but jumping in without a plan in place was not an option," says Christi Rushnell, Health First vice president, information technology and strategic services. "Protecting patient and personally identifiable information – both because it’s our corporate responsibility and also to meet compliance regulation standards like HIPAA and the HITECH Act – is our first priority, and so having the right security in place was our number one concern before opening access to Web 2.0." Health First IT and security management teams were approached by different groups throughout the organization about enabling access to tools like social networking sites to extend their communication on a real-time basis as a cost-effective marketing tool. Additionally, Health First was running out of room in its data center and so staff began to move systems traditionally managed onsite to the cloud, such as transcription services and enterprise-wide patient scheduling. The Health First network includes three hospitals, the county’s only trauma center, fitness centers and an aging institute, among other services. With more than 6,000 Internet- connected devices throughout the organization and thousands of employees with different roles, one of the most critical challenges to opening access to Web 2.0 was to find a security solution that would allow IT to set granular, flexible Internet usage policies for devices, as well 1 Of 3
  • 2. as specific users and groups within the organization. Health First wanted to set policies that could, based on an employee’s role, control how much access that person had to Web 2.0 sites, how much time they could spend on those sites, what level of access they could have to sensitive corporate information and even what they could do with that information. Flexibility for Different Needs "We needed a flexible solution that would provide our marketing team, for example, with access to YouTube to create and promote videos on new services we provide and to access our Facebook fan page, or allow our nurses and doctors to access the cloud-based patient care applications we use," says Rushnell. "But we also needed the flexibility to ensure that a machine in an openly accessible area was secured from allowing people to go to places on the Web that would violate policies or put the organization at risk." Another problem Health First faced was that Web 2.0 sites present an emerging vector for malware and other data-stealing attacks. Cybercriminals are increasingly infecting sites that enable user-generated content such as blogs and Twitter, with malicious content. Recent research also shows that 57 percent of data-stealing attacks are coming over the Web. Health First found that traditional security solutions were not up to the task of protecting against Web 2.0 attacks and inappropriate content. "Web 2.0 has quickly diminished the effectiveness of traditional security solutions like signature-based antivirus and traditional URL filtering, because it’s dynamic and constantly changing," says Frank Waszmer, Heath First information security architect. "Reputation-based security is also not enough, as Web 2.0 sites generally have a "good" reputation. "Places like news sites, Google and social networking sites have great reputations but, today, it’s often these legitimate sites that are targeted. In order to let our employees visit these sites, we needed a Web security gateway solution that sits inline in the network stream, is able to look at the specific content on the page and then prevent the malicious elements from being accessed." Another requirement was the ability to look at encrypted secure socket layer (SSL) streams. Waszmer noticed an increased amount of malicious traffic set up through SSL sessions. Without being able to see into the traffic streams, Waszmer worried that data-stealing malware could make its way into the network. Health First selected Websense Web Security Gateway as a tool to enable employees to safely access Web 2.0. Waszmer designed a deployment strategy to help minimize installation time. To redirect HTTP and HTTPS Web traffic to the gateway, he deployed the system in what is called a "transparent proxy," utilizing the WCCP protocol. The majority of time spent on this project has been around fine-tuning Web-use policies and working with the different departments to provide greater control and feedback. Policies Drive Compliance Health First currently has five global policies that govern where and how people can use and interact with the Internet and Waszmer has created more than 20 specialized policies around Web use to provide greater protection for key areas. "Today, we are able to set Web-use policies around users, groups and devices," Waszmer notes. "Because of the flexibility of the secure Web gateway and the reporting and policy infrastructure we have created, we have been able to roll out access to different Web 2.0 sites to the groups and specific people that need it. "Additionally, one of the unique benefits about the solution is that it classifies specific content on Web sites in real time. So, if it classifies a Web page that has some business benefits but also contains some content that violates a policy, the solution will block just that one portion of the page." Health First uses the gateway as part of a layered security approach that involves technology, investigation, and awareness and education. "With our strategy and technology in place, I’m 2 Of 3
  • 3. able to run reports on Web use, see malicious or inappropriate sites employees have attempted to access, and use the reports to better educate Web users and gain a greater understanding of how Web 2.0 sites can be used throughout the organization," says Waszmer. "Additionally, the reports allow my team to quickly respond to security events. With visibility into the systems, we’re able to stay ahead of the threats before they become a problem." "Today, healthcare IT managers and CIOs need to be an active part of the solution to balance the business needs of Web 2.0 adoption with security," says Rushnell. "Web 2.0 is here and only going to become a larger part of our business, so my greatest advice to other healthcare organizations thinking about enabling Web 2.0 is that they need to anticipate the changes in the business and adjust, actively taking steps to secure Web 2.0 use." From the catalog According to www.websense.com : Websense Web Security Gateway allows organizations to secure Web traffic effectively while still enabling the latest in Web 2.0 tools and applications. Through a real-time content-classification engine, the gateway analyzes Web traffic on the fly, instantly categorizing new sites and dynamic content, proactively discovering security risks, and blocking dangerous malware. Backed by Websense ThreatSeeker Network technologies, Web Security Gateway provides advanced analytics – including rules, signatures, heuristics and application behaviors– to detect and block proxy avoidance, hacking sites, adult content, botnets, keyloggers, phishing attacks, spyware and many other types of unsafe content. For more information on Websense solutions: www.rsleads.com/910ht-201 3 Of 3