SlideShare a Scribd company logo
1 of 2
Download to read offline
Healthcare System Switches to Agentless
Trend Micro VDI Security
Trend Micro™ Deep Security maximizes the returns on virtualization investments with
virtualization-aware protection and simplicity.
“ Everyone else is at least 18 months behind Trend Micro, as far as securing virtual environments...
 Trend Micro is taking VDI security in the right direction.”
           —Roland J. Anderson, Manager, IT Infrastructure Support Team, Baptist Hospitals of Southeast Texas



                                                   Challenge
EXECUTIVE SUMMARY                                  For more than 50 years, the Baptist Hospitals of Southeast Texas have served the
Customer Name: Baptist Hospitals of                communities of the “Golden Triangle.” In the dynamic world of patient care, the physicians
Southeast Texas                                    and staff at these hospitals have a history of embracing change to drive continual
Industry: Healthcare                               improvements into the delivery of life-impacting services.
Location: Beaumont, Texas                          Last year, the technology team that supports the Baptist Hospitals’ infrastructure
Web site: www.mhbh.org                             convinced management to invest in virtualization solutions that could ultimately drive
Number of Employees: 3,000                         down server and endpoint costs at both sites. Of course, as a healthcare organization,
                                                   compliance with data privacy regulations is a major priority.
CHALLENGE:
• Maximize the consolidation of server and         “Our existing endpoint security solution purportedly supported virtualized environments,
  endpoint hardware                                but when we installed it on our VMware virtual servers, it brought the systems to their
• Minimize the time and cost of managing user      knees,” said Roland Anderson, manager of the IT infrastructure support team at Baptist
  sessions and desktops                            Hospitals of Southeast Texas. “We needed a security solution that could protect the
• Maintain compliance with HIPAA and other         virtual layer and not impact server performance. McAfee’s solution had to be installed on
  healthcare regulations                           each server and the footprint was too big to be practical.”
• Align security with virtualization initiatives
                                                   Solution
SOLUTION:
                                                   Besides virtualizing servers, Baptist Hospitals also wanted to introduce a virtual desktop
• Switch to Trend Micro Deep Security for
  protecting virtual servers and endpoints
                                                   infrastructure (VDI). The IT team turned to INX Inc., its technology consultants, to
                                                   overcome the challenges of securing virtual servers and VDI endpoints. The virtualization
BUSINESS RESULTS:                                  experts at INX recommended a Trend Micro solution.
• Better security on virtual platforms, compared
  to pre-existing endpoint security solution       “Trend Micro is definitely the leader when it comes to securing virtualized environments,”
  (fewer incidents)                                said Michael Brown, senior virtualization consultant at INX. “The Trend Micro management
                                                   consoles are very easy to use—very intuitive. Trend Micro Deep Security is a great
• Excellent server performance, even during
  security scans or updates, with agentless        product, right out of the box.”
  security                                         Deep Security is the only security solution currently available that integrates with
• Automatic extension of security to all new       VMware’s vShield Endpoint Security (EPSEC) APIs. With true agentless virus protection
  virtual machines and user sessions               that is automatically extended to each virtual desktop and server, Baptist Hospitals
• Highly integrated security, leveraging VMware    does not have to compromise on security, performance, or return on investment for its
  vShield APIs                                     virtualization investments.
                                                   By leveraging the threat intelligence of the Trend Micro™ Smart Protection Network™
                                                   infrastructure, Deep Security provides sophisticated cloud-based reputation technologies,
                                                   feedback loops, and the expertise of TrendLabsSM researchers to deliver real-time
                                                   protection from emerging threats.



HEALTHCARE I CASE STUDY                                                                                                              Page 1 of 2
TREND MICRO I BApTIST HoSpITAlS of SoUTHEAST TExAS




“Everyone else is at least 18 months behind Trend Micro, as far as securing virtual           DEPLOYMENT ENVIRONMENT
environments,” said Anderson. “We deployed Deep Security and that was it—it helped            2 sites
solve all of the performance problems we had with McAfee and the Trend Micro solution         100 servers; 2,100 PCs
is easier to manage. Now we can move forward and deploy more VDI endpoints while
                                                                                              1,000 VDI sessions, with plans to virtualize
maintaining compliance with HIPAA and other healthcare-related regulations. Trend
                                                                                              90% of endpoints
Micro is taking VDI security in the right direction.”
                                                                                              VMware ESX servers (Cisco hardware)
Today, Baptist Hospitals has switched to Deep Security for its VMware servers and VMware      VMware View
View VDI environment. In the future, when its previous endpoint security solution licenses
                                                                                              VMware vCenter
are up for renewal, the IT team plans to switch completely to Trend Micro™ Enterprise
                                                                                              Trend Micro Deep Security
Security for an integrated virtual and traditional endpoint security solution.
                                                                                              Customer Profile
Results                                                                                       The Baptist Hospitals of Southeast Texas are
The immediate benefit from Deep Security has been improved security. “Our virtual             not-for-profit, community-owned, health care
environments are now very secure and stable, with no incidents,” said Anderson. “On           facilities with spiritual values, dedicated to
                                                                                              providing high quality health services in a
the McAfee endpoints, there had been three or four security incidents involving viruses,
                                                                                              Christian environment. With hospitals in
malware, or spyware that were not blocked.”                                                   Beaumont and Orange, the Baptist Hospitals
With the critical security issues resolved by introducing Deep Security, Baptist Hospitals’   are affiliates of the Memorial Hermann Heath-
                                                                                              care System. Leading-edge research capabili-
virtualization initiatives are moving forward. Approximately 90% of all applications are
                                                                                              ties and state-of-the-art technology help the
now deployed on virtual servers, and the organization plans to deploy about the same
                                                                                              physicians at Baptist Hospitals provide supe-
percentage of desktops.                                                                       rior patient care and rank the hospitals among
“Our VMware servers and VDI platforms have allowed us to cost-effectively consolidate         the leaders in the healthcare field.
hardware,” said Anderson. “VDI is a good model for us since we have multiple shifts of        Partner Profile
employees that share desktop systems. Eventually we can give each employee access             INX Inc. is a leading U.S. provider of IP
to their desktop from any endpoint. VMware View lets us support a single desktop image,       communications and data center solutions
which greatly simplifies the management of user sessions.”                                    for enterprise organizations. INX offers a suite
                                                                                              of advanced technology solutions focused
Switching to Trend Micro VDI security has also simplified management for security.            around the entire lifecycle of enterprise IP
“Deep Security handles updates on a system level—and a single instance protects all of        network communications and data center
the virtual machines,” said Anderson.                                                         infrastructure. Services are centered on
                                                                                              the design, implementation, and support
Any VDI session or server application immediately benefits from Deep Security protection.     of network infrastructure, including routing
Scans are performed in a serialized fashion, avoiding “AV storms” that would otherwise        and switching, wireless, security, unified
slow all of the virtual machines on the server.                                               communications, and data center solutions
                                                                                              such as storage and server virtualization.
“Baptist Hospitals now has a very cost-effective VDI model in place,” said Brown. “As         Customers include enterprise organizations
the organization converts other departments from traditional PCs to thin clients, they        and federal, state, and local governmental
can reduce long-term desktop hardware costs as well as ongoing cost of ownership for          agencies. Additional information about INX
managing PC system software and security. We are seeing a huge increase in the number         can be found at www.inxi.com.
of organizations of all sizes that are migrating to VMware’s VDI platform—it makes sense
considering the current economy where everyone is looking for ways to reduce costs.”          Trend Micro Security
                                                                                              • Trend Micro Deep Security
                                                                                                http://us.trendmicro.com/us/solutions/
                                                                                                enterprise/security-solutions/virtualization/
“ No one can come close to Trend Micro, in terms of                                             deep-security/index.html

  integration with VMware… Trend Micro Deep Security                                          Trend Micro Enabling Technology

  is a great product, right out of the box.”                                                  • Trend Micro Smart Protection Network
                                                                                                http://us.trendmicro.com/us/trendwatch/
                                                                                                core-technologies/smart-protection-network/
     — Michael Brown, Senior Virtualization Consultant,
       INX Inc. (technology partner, Baptist Hospitals of Southeast Texas)




                                                                                              © 2011 Trend Micro Incorporated. All rights reserved. All Trend Micro
                                                                                              company, product and service names and slogans are trademarks or
                                                                                              registered trademarks of Trend Micro Incorporated. Other names and
                                                                                              marks are the property of their respective owners.
                                                                                              CS_BAPTISTHOSP_DS_VDI_MAY2011

                                                                                              www.trendmicro.com




HEALTHCARE I CASE STUDY                                                                                                                                   Page 2 of 2

More Related Content

What's hot

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Cryptika cybersecurity - company profile
Cryptika cybersecurity - company profileCryptika cybersecurity - company profile
Cryptika cybersecurity - company profileSafwan Talab
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Securitynmullen
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computingBharat Gupta
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 

What's hot (20)

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Cryptika cybersecurity - company profile
Cryptika cybersecurity - company profileCryptika cybersecurity - company profile
Cryptika cybersecurity - company profile
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computing
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 

Similar to [Case Study ~ 2011] Baptist Hospitals of Southest Texas

Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationVMware
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Is Your Distributed Workforce Future Ready?
Is Your Distributed Workforce Future Ready?Is Your Distributed Workforce Future Ready?
Is Your Distributed Workforce Future Ready?Insight
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threatswhite paper
 
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study patmisasi
 
Sunnybrook Health Sciences - Scalar customer case study
Sunnybrook Health Sciences - Scalar customer case studySunnybrook Health Sciences - Scalar customer case study
Sunnybrook Health Sciences - Scalar customer case studyScalar Decisions
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxSonaliG6
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudInsight
 
Trend Micro & VMware Datasheet
Trend Micro & VMware DatasheetTrend Micro & VMware Datasheet
Trend Micro & VMware DatasheetArrow ECS UK
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)VMware
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXColloqueRISQ
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Private Cloud
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9VMware
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemSymantec
 

Similar to [Case Study ~ 2011] Baptist Hospitals of Southest Texas (20)

Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network Virtualization
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 
Meander Medisch Centrum
Meander Medisch CentrumMeander Medisch Centrum
Meander Medisch Centrum
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Is Your Distributed Workforce Future Ready?
Is Your Distributed Workforce Future Ready?Is Your Distributed Workforce Future Ready?
Is Your Distributed Workforce Future Ready?
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
 
Sunnybrook Health Sciences - Scalar customer case study
Sunnybrook Health Sciences - Scalar customer case studySunnybrook Health Sciences - Scalar customer case study
Sunnybrook Health Sciences - Scalar customer case study
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
Trend Micro & VMware Datasheet
Trend Micro & VMware DatasheetTrend Micro & VMware Datasheet
Trend Micro & VMware Datasheet
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 

More from Trend Micro

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesTrend Micro
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeTrend Micro
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Trend Micro
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Trend Micro
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaTrend Micro
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)Trend Micro
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsTrend Micro
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeTrend Micro
 

More from Trend Micro (20)

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, Vulnerabilities
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at Large
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in Asia
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

[Case Study ~ 2011] Baptist Hospitals of Southest Texas

  • 1. Healthcare System Switches to Agentless Trend Micro VDI Security Trend Micro™ Deep Security maximizes the returns on virtualization investments with virtualization-aware protection and simplicity. “ Everyone else is at least 18 months behind Trend Micro, as far as securing virtual environments... Trend Micro is taking VDI security in the right direction.” —Roland J. Anderson, Manager, IT Infrastructure Support Team, Baptist Hospitals of Southeast Texas Challenge EXECUTIVE SUMMARY For more than 50 years, the Baptist Hospitals of Southeast Texas have served the Customer Name: Baptist Hospitals of communities of the “Golden Triangle.” In the dynamic world of patient care, the physicians Southeast Texas and staff at these hospitals have a history of embracing change to drive continual Industry: Healthcare improvements into the delivery of life-impacting services. Location: Beaumont, Texas Last year, the technology team that supports the Baptist Hospitals’ infrastructure Web site: www.mhbh.org convinced management to invest in virtualization solutions that could ultimately drive Number of Employees: 3,000 down server and endpoint costs at both sites. Of course, as a healthcare organization, compliance with data privacy regulations is a major priority. CHALLENGE: • Maximize the consolidation of server and “Our existing endpoint security solution purportedly supported virtualized environments, endpoint hardware but when we installed it on our VMware virtual servers, it brought the systems to their • Minimize the time and cost of managing user knees,” said Roland Anderson, manager of the IT infrastructure support team at Baptist sessions and desktops Hospitals of Southeast Texas. “We needed a security solution that could protect the • Maintain compliance with HIPAA and other virtual layer and not impact server performance. McAfee’s solution had to be installed on healthcare regulations each server and the footprint was too big to be practical.” • Align security with virtualization initiatives Solution SOLUTION: Besides virtualizing servers, Baptist Hospitals also wanted to introduce a virtual desktop • Switch to Trend Micro Deep Security for protecting virtual servers and endpoints infrastructure (VDI). The IT team turned to INX Inc., its technology consultants, to overcome the challenges of securing virtual servers and VDI endpoints. The virtualization BUSINESS RESULTS: experts at INX recommended a Trend Micro solution. • Better security on virtual platforms, compared to pre-existing endpoint security solution “Trend Micro is definitely the leader when it comes to securing virtualized environments,” (fewer incidents) said Michael Brown, senior virtualization consultant at INX. “The Trend Micro management consoles are very easy to use—very intuitive. Trend Micro Deep Security is a great • Excellent server performance, even during security scans or updates, with agentless product, right out of the box.” security Deep Security is the only security solution currently available that integrates with • Automatic extension of security to all new VMware’s vShield Endpoint Security (EPSEC) APIs. With true agentless virus protection virtual machines and user sessions that is automatically extended to each virtual desktop and server, Baptist Hospitals • Highly integrated security, leveraging VMware does not have to compromise on security, performance, or return on investment for its vShield APIs virtualization investments. By leveraging the threat intelligence of the Trend Micro™ Smart Protection Network™ infrastructure, Deep Security provides sophisticated cloud-based reputation technologies, feedback loops, and the expertise of TrendLabsSM researchers to deliver real-time protection from emerging threats. HEALTHCARE I CASE STUDY Page 1 of 2
  • 2. TREND MICRO I BApTIST HoSpITAlS of SoUTHEAST TExAS “Everyone else is at least 18 months behind Trend Micro, as far as securing virtual DEPLOYMENT ENVIRONMENT environments,” said Anderson. “We deployed Deep Security and that was it—it helped 2 sites solve all of the performance problems we had with McAfee and the Trend Micro solution 100 servers; 2,100 PCs is easier to manage. Now we can move forward and deploy more VDI endpoints while 1,000 VDI sessions, with plans to virtualize maintaining compliance with HIPAA and other healthcare-related regulations. Trend 90% of endpoints Micro is taking VDI security in the right direction.” VMware ESX servers (Cisco hardware) Today, Baptist Hospitals has switched to Deep Security for its VMware servers and VMware VMware View View VDI environment. In the future, when its previous endpoint security solution licenses VMware vCenter are up for renewal, the IT team plans to switch completely to Trend Micro™ Enterprise Trend Micro Deep Security Security for an integrated virtual and traditional endpoint security solution. Customer Profile Results The Baptist Hospitals of Southeast Texas are The immediate benefit from Deep Security has been improved security. “Our virtual not-for-profit, community-owned, health care environments are now very secure and stable, with no incidents,” said Anderson. “On facilities with spiritual values, dedicated to providing high quality health services in a the McAfee endpoints, there had been three or four security incidents involving viruses, Christian environment. With hospitals in malware, or spyware that were not blocked.” Beaumont and Orange, the Baptist Hospitals With the critical security issues resolved by introducing Deep Security, Baptist Hospitals’ are affiliates of the Memorial Hermann Heath- care System. Leading-edge research capabili- virtualization initiatives are moving forward. Approximately 90% of all applications are ties and state-of-the-art technology help the now deployed on virtual servers, and the organization plans to deploy about the same physicians at Baptist Hospitals provide supe- percentage of desktops. rior patient care and rank the hospitals among “Our VMware servers and VDI platforms have allowed us to cost-effectively consolidate the leaders in the healthcare field. hardware,” said Anderson. “VDI is a good model for us since we have multiple shifts of Partner Profile employees that share desktop systems. Eventually we can give each employee access INX Inc. is a leading U.S. provider of IP to their desktop from any endpoint. VMware View lets us support a single desktop image, communications and data center solutions which greatly simplifies the management of user sessions.” for enterprise organizations. INX offers a suite of advanced technology solutions focused Switching to Trend Micro VDI security has also simplified management for security. around the entire lifecycle of enterprise IP “Deep Security handles updates on a system level—and a single instance protects all of network communications and data center the virtual machines,” said Anderson. infrastructure. Services are centered on the design, implementation, and support Any VDI session or server application immediately benefits from Deep Security protection. of network infrastructure, including routing Scans are performed in a serialized fashion, avoiding “AV storms” that would otherwise and switching, wireless, security, unified slow all of the virtual machines on the server. communications, and data center solutions such as storage and server virtualization. “Baptist Hospitals now has a very cost-effective VDI model in place,” said Brown. “As Customers include enterprise organizations the organization converts other departments from traditional PCs to thin clients, they and federal, state, and local governmental can reduce long-term desktop hardware costs as well as ongoing cost of ownership for agencies. Additional information about INX managing PC system software and security. We are seeing a huge increase in the number can be found at www.inxi.com. of organizations of all sizes that are migrating to VMware’s VDI platform—it makes sense considering the current economy where everyone is looking for ways to reduce costs.” Trend Micro Security • Trend Micro Deep Security http://us.trendmicro.com/us/solutions/ enterprise/security-solutions/virtualization/ “ No one can come close to Trend Micro, in terms of deep-security/index.html integration with VMware… Trend Micro Deep Security Trend Micro Enabling Technology is a great product, right out of the box.” • Trend Micro Smart Protection Network http://us.trendmicro.com/us/trendwatch/ core-technologies/smart-protection-network/ — Michael Brown, Senior Virtualization Consultant, INX Inc. (technology partner, Baptist Hospitals of Southeast Texas) © 2011 Trend Micro Incorporated. All rights reserved. All Trend Micro company, product and service names and slogans are trademarks or registered trademarks of Trend Micro Incorporated. Other names and marks are the property of their respective owners. CS_BAPTISTHOSP_DS_VDI_MAY2011 www.trendmicro.com HEALTHCARE I CASE STUDY Page 2 of 2