SlideShare a Scribd company logo
Defending Health Care Networks
with NetFlow
Jeffrey M. Wells, CCIE, CISSP
Director of Business Development
jwells@lancope.com

© 2013 Lancope, Inc. All rights reserved.

1
The Healthcare IT Problem Space
• Rapidly changing technology and pressure for adoption.
• Expensive stationary and mobile devices.
• High-risk medical equipment (automated pharmacies, medical
robots, etc.)
• Need to provide guest access for patients and their loved ones.
• Need to provide access for transient professionals – visiting
surgeons, etc.
• Need to provide access that’s open to “any device, anywhere”.
• Need to monitor and differentiate access.
• Enormous, complex and murky regulatory environment.
• Patient care aspect of business enormously magnifies risk.
• For Healthcare IT these all boil down to a problem with visibility.
© 2013 Lancope, Inc. All rights reserved.

2
Examples
Monitoring medical devices
•
•
•

Where is my crash cart? Who
used it last? Is it in use now?
What devices on the network are
touching my infusion pumps?
Is my automated pharmacy
secured? Are the network access
policies working?

Differentiated access
•
•
•

Bandwidth management
•

•
•

How can I ensure rapid delivery of
radiology images from my PACS
system across the hospital
internetwork?
How do I know the QoS policies
I’ve implemented are working?
Which clinics are utilizing the
network the most effectively?

© 2013 Lancope, Inc. All rights reserved.

Is patient guest access sufficiently
isolated?
Is that patient’s bored, angry
teenage son trying to hack us?
Can I get the visiting neurosurgeon
with his iPad online rapidly so he can
do the job we’re paying him for?

Regulatory environment
•
•

•

How do I track access to regulated
information?
How can I ensure compliance with
HIPAA, ACA, PCI or other regulatory
requirements for critical systems?
How do I deal with an audit in the
most efficient way possible?

3
The Big Picture

How can I ensure that my IT
operations and underlying
infrastructure positively impact my
patients’ medical outcomes?

© 2013 Lancope, Inc. All rights reserved.

4
Additionally …

We still have to deal with all the “normal” IT issues common to
all business:
• Network monitoring and management
• Security of assets and data
• Advanced threats – detect and respond
• Antivirus
• Et cetera…

It all boils down to a problem of visibility
© 2013 Lancope, Inc. All rights reserved.

5
What would be the ideal visibility situation?
Full packet capture or IDS everywhere…?
3560-X

Internet

Shasta

ASR-1000
Lompoc

3925 ISR

WAN

Cat6k

Cat6k
ASA

Chandler

Cat4k
Datacenter

DMZ

Access

UCS with
Nexus
1000v
3850
Stack(s)
© 2013 Lancope, Inc. All rights reserved.

6
Traditional Monitoring

© 2013 Lancope, Inc. All rights reserved.

7
Introducing NetFlow Technology
telephone bill

NetFlow

© 2013 Lancope, Inc. All rights reserved.

8
End-to-end visibility via flow telemetry …
… your infrastructure is the source:
3560-X

Internet

Shasta

NetFlow

NetFlow
NetFlow

Lompoc
NetFlow

3925 ISR

WAN

NetFlow

ASR-1000
NetFlow

Cat6k

NetFlow

Cat6k

NetFlow

ASA

Chandler
NetFlow

DMZ

NetFlow

Cat4k

NetFlow

Datacenter
NetFlow

UCS with
Nexus
1000v

NetFlow

Access
NetFlow

NetFlow

NetFlow

3850
Stack(s)
© 2013 Lancope, Inc. All rights reserved.

9
StealthWatch
Management
Console

StealthWatch
FlowReplicator

NetFlow,
syslog, SNMP

ID1100

StealthWatch
FlowCollector

StealthWatch
FlowSensor
NetFlow enabled
routers, switches,
firewalls

© 2013 Lancope, Inc. All rights reserved.

vSphere with
StealthWatch
FlowSensor VE

User and Device
Information

10
Typical Use Cases
• Protecting Patient Data
– Enhancing data privacy and security policy enforcement

• Ensuring Regulatory Compliance with industry legislation
– Reduce the risk of data tampering or theft, track user identity and
increase accountability

• Monitoring Data from a range of devices
– Track critical devices on the network including heart pumps, dialysis
machines, drug dispensing machines, etc. View the device, location
and activity to ensure machines are secure and operating within policy

• Securing Hospital Guest Networks
– Maintain a robust BYOD policy to ensure visitors can use the hospital
guest network without accessing confidential data and devices

© 2013 Lancope, Inc. All rights reserved.

11
Typical Use Cases -

• Rapid reaction to network or security issues
– “Network is slow/down”
– “My app isn’t working”

• Network Bandwidth Management
– Ensure devices on the network are correctly configured
– Track data across the network including large electronic images and
files (X-Rays, MRI scans, etc)

• Enhance Network Infrastructure
– Augment investment in existing hardware (switches and routers) by
capturing flow data for full end-to-end visibility across the network
– Monitor RTP infrastructure: VoIP, video, etc.
– Monitor QoS policies

© 2013 Lancope, Inc. All rights reserved.

12
Use case examples

© 2013 Lancope, Inc. All rights reserved.

13
How are my critical links being utilized?

© 2013 Lancope, Inc. All rights reserved.

14
Who talks to my HIPAA hosts?

Legitimate
What’s this??

© 2013 Lancope, Inc. All rights reserved.

15
Monitor complex relationships

© 2013 Lancope, Inc. All rights reserved.

16
Monitor wireless guests

© 2013 Lancope, Inc. All rights reserved.

117
Monitor critical servers or devices

© 2013 Lancope, Inc. All rights reserved.

18
Identity integration

From any report, instantly answer the
question of “who”…

© 2013 Lancope, Inc. All rights reserved.

19
Further learning
• Market Brief (Network & Security Challenges in Healthcare)
• http://www.lancope.com/resource-center/market-briefs/networkchallenges-of-healthcare/
• Webinar: Defending HealthCare Networks: 30th October
http://www.lancope.com/company-overview/webinar/defendinghealthcare-networks-with-netflow

• Featured Case Studies/Success stories
• http://www.lancope.com/resource-center/case-studies/stanford/
• http://www.lancope.com/resource-center/case-studies/psbc-case-study/
• CTD Video
• http://www.lancope.com/resource-center/videos/ctd/
© 2013 Lancope, Inc. All rights reserved.

20
Q&A

© 2013 Lancope, Inc. All rights reserved.

21
Thank You
Jeffrey M. Wells, CCIE, CISSP
Director of Business Development
jwells@lancope.com

www.lancope.com
@Lancope (company)
@netflowninjas (company blog)
https://www.facebook.com/Lancope
http://www.linkedin.com/groups/NetFlow-Ninjas-2261596/about
https://plus.google.com/u/0/103996520487697388791/posts
http://feeds.feedburner.com/NetflowNinjas

© 2013 Lancope, Inc. All rights reserved.

22

More Related Content

What's hot

M ivedix ontrack
M ivedix ontrackM ivedix ontrack
M ivedix ontrack
Ganesh Natarajan
 
Pro Emtech - Promed
Pro Emtech - PromedPro Emtech - Promed
Pro Emtech - Promed
Apollo Hospitals Group and ATNF
 
How to be hipaa compliant
How to be hipaa compliantHow to be hipaa compliant
How to be hipaa compliant
John_mith
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
Seyedmostafa Safavi
 
Critical Water and Wastewater Data Security
Critical Water and Wastewater Data SecurityCritical Water and Wastewater Data Security
Critical Water and Wastewater Data Security
WaterTrax and Linko Technology
 
Lowlands Unite NL 2017 - ATA to Z
Lowlands Unite NL 2017 - ATA to ZLowlands Unite NL 2017 - ATA to Z
Lowlands Unite NL 2017 - ATA to Z
Tim De Keukelaere
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB
 
Mobile Device Detection - Every Device Matters
Mobile Device Detection - Every Device MattersMobile Device Detection - Every Device Matters
Mobile Device Detection - Every Device Matters
Vamsi Koka
 
How to Secure Your Clinical Network
How to Secure Your Clinical NetworkHow to Secure Your Clinical Network
How to Secure Your Clinical Network
Medigate
 
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Intermountain Clinical Instrumentation Society
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
VMware Tanzu
 
Wfh remote access tips
Wfh   remote access tipsWfh   remote access tips
Wfh remote access tips
Kerry Pressnell
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
The Lorenzi Group
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
Medigate
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khai
Security Bootcamp
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
umphreym
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
Innovation Network Technologies: InNet
 
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
warezjoe
 
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
Internet Technology Matters (Internet Society)
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
Guy Vinograd ☁
 

What's hot (20)

M ivedix ontrack
M ivedix ontrackM ivedix ontrack
M ivedix ontrack
 
Pro Emtech - Promed
Pro Emtech - PromedPro Emtech - Promed
Pro Emtech - Promed
 
How to be hipaa compliant
How to be hipaa compliantHow to be hipaa compliant
How to be hipaa compliant
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
 
Critical Water and Wastewater Data Security
Critical Water and Wastewater Data SecurityCritical Water and Wastewater Data Security
Critical Water and Wastewater Data Security
 
Lowlands Unite NL 2017 - ATA to Z
Lowlands Unite NL 2017 - ATA to ZLowlands Unite NL 2017 - ATA to Z
Lowlands Unite NL 2017 - ATA to Z
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
Mobile Device Detection - Every Device Matters
Mobile Device Detection - Every Device MattersMobile Device Detection - Every Device Matters
Mobile Device Detection - Every Device Matters
 
How to Secure Your Clinical Network
How to Secure Your Clinical NetworkHow to Secure Your Clinical Network
How to Secure Your Clinical Network
 
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
 
Wfh remote access tips
Wfh   remote access tipsWfh   remote access tips
Wfh remote access tips
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
 
SCB 2013 DLP, công nghệ, và phương pháp triển khai
SCB 2013  DLP, công nghệ, và phương pháp triển khaiSCB 2013  DLP, công nghệ, và phương pháp triển khai
SCB 2013 DLP, công nghệ, và phương pháp triển khai
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
 
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment DatasheetCylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
 
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
Ccdc 2012 Wireless Data Exfiltration - building and using low cost signal int...
 
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
 

Similar to Defending Healthcare Networks with NetFlow

How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
Great Bay Software
 
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
Ali Youssef
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.
Wheatstone
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
Alessandro Sappia
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEEFINALYEARSTUDENTPROJECTS
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
IEEEFINALSEMSTUDENTPROJECTS
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
IEEEFINALYEARSTUDENTSPROJECTS
 
Techniques for Predictive ModelingGraded Discussion  Techniques.docx
Techniques for Predictive ModelingGraded Discussion  Techniques.docxTechniques for Predictive ModelingGraded Discussion  Techniques.docx
Techniques for Predictive ModelingGraded Discussion  Techniques.docx
bradburgess22840
 
Literature Evaluation TableStudent Name Summary of Clinic.docx
Literature Evaluation TableStudent Name Summary of Clinic.docxLiterature Evaluation TableStudent Name Summary of Clinic.docx
Literature Evaluation TableStudent Name Summary of Clinic.docx
jesssueann
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
Anton Lishchuk
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
Nathan Wallace, PhD, PE
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
Open Access Systems Corporation
 
How Networked Things are Changing Medicine
How Networked Things are Changing MedicineHow Networked Things are Changing Medicine
How Networked Things are Changing Medicine
Real-Time Innovations (RTI)
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
Cristian Garcia G.
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
Splunk
 
online ambulance service.pptx
online ambulance service.pptxonline ambulance service.pptx
online ambulance service.pptx
ssusere7086c
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
Tarek Nader
 
Mis
MisMis
Mis
misecho
 

Similar to Defending Healthcare Networks with NetFlow (20)

How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
 
Techniques for Predictive ModelingGraded Discussion  Techniques.docx
Techniques for Predictive ModelingGraded Discussion  Techniques.docxTechniques for Predictive ModelingGraded Discussion  Techniques.docx
Techniques for Predictive ModelingGraded Discussion  Techniques.docx
 
Literature Evaluation TableStudent Name Summary of Clinic.docx
Literature Evaluation TableStudent Name Summary of Clinic.docxLiterature Evaluation TableStudent Name Summary of Clinic.docx
Literature Evaluation TableStudent Name Summary of Clinic.docx
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
 
How Networked Things are Changing Medicine
How Networked Things are Changing MedicineHow Networked Things are Changing Medicine
How Networked Things are Changing Medicine
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
online ambulance service.pptx
online ambulance service.pptxonline ambulance service.pptx
online ambulance service.pptx
 
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014UTM Technology & Leaders of UTMs in Gartner Magic report 2014
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
 
Mis
MisMis
Mis
 

More from Lancope, Inc.

Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective Security
Lancope, Inc.
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
Lancope, Inc.
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
Lancope, Inc.
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Lancope, Inc.
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Lancope, Inc.
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
Lancope, Inc.
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Lancope, Inc.
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Lancope, Inc.
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
Lancope, Inc.
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
Lancope, Inc.
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Lancope, Inc.
 
The Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident ResponseThe Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident Response
Lancope, Inc.
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Lancope, Inc.
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
Lancope, Inc.
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
Lancope, Inc.
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
Lancope, Inc.
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
Lancope, Inc.
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
Lancope, Inc.
 
Looking for the weird webinar 09.24.14
Looking for the weird   webinar 09.24.14Looking for the weird   webinar 09.24.14
Looking for the weird webinar 09.24.14
Lancope, Inc.
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Lancope, Inc.
 

More from Lancope, Inc. (20)

Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective Security
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
The Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident ResponseThe Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident Response
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Looking for the weird webinar 09.24.14
Looking for the weird   webinar 09.24.14Looking for the weird   webinar 09.24.14
Looking for the weird webinar 09.24.14
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
 

Recently uploaded

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 

Recently uploaded (20)

Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 

Defending Healthcare Networks with NetFlow

  • 1. Defending Health Care Networks with NetFlow Jeffrey M. Wells, CCIE, CISSP Director of Business Development jwells@lancope.com © 2013 Lancope, Inc. All rights reserved. 1
  • 2. The Healthcare IT Problem Space • Rapidly changing technology and pressure for adoption. • Expensive stationary and mobile devices. • High-risk medical equipment (automated pharmacies, medical robots, etc.) • Need to provide guest access for patients and their loved ones. • Need to provide access for transient professionals – visiting surgeons, etc. • Need to provide access that’s open to “any device, anywhere”. • Need to monitor and differentiate access. • Enormous, complex and murky regulatory environment. • Patient care aspect of business enormously magnifies risk. • For Healthcare IT these all boil down to a problem with visibility. © 2013 Lancope, Inc. All rights reserved. 2
  • 3. Examples Monitoring medical devices • • • Where is my crash cart? Who used it last? Is it in use now? What devices on the network are touching my infusion pumps? Is my automated pharmacy secured? Are the network access policies working? Differentiated access • • • Bandwidth management • • • How can I ensure rapid delivery of radiology images from my PACS system across the hospital internetwork? How do I know the QoS policies I’ve implemented are working? Which clinics are utilizing the network the most effectively? © 2013 Lancope, Inc. All rights reserved. Is patient guest access sufficiently isolated? Is that patient’s bored, angry teenage son trying to hack us? Can I get the visiting neurosurgeon with his iPad online rapidly so he can do the job we’re paying him for? Regulatory environment • • • How do I track access to regulated information? How can I ensure compliance with HIPAA, ACA, PCI or other regulatory requirements for critical systems? How do I deal with an audit in the most efficient way possible? 3
  • 4. The Big Picture How can I ensure that my IT operations and underlying infrastructure positively impact my patients’ medical outcomes? © 2013 Lancope, Inc. All rights reserved. 4
  • 5. Additionally … We still have to deal with all the “normal” IT issues common to all business: • Network monitoring and management • Security of assets and data • Advanced threats – detect and respond • Antivirus • Et cetera… It all boils down to a problem of visibility © 2013 Lancope, Inc. All rights reserved. 5
  • 6. What would be the ideal visibility situation? Full packet capture or IDS everywhere…? 3560-X Internet Shasta ASR-1000 Lompoc 3925 ISR WAN Cat6k Cat6k ASA Chandler Cat4k Datacenter DMZ Access UCS with Nexus 1000v 3850 Stack(s) © 2013 Lancope, Inc. All rights reserved. 6
  • 7. Traditional Monitoring © 2013 Lancope, Inc. All rights reserved. 7
  • 8. Introducing NetFlow Technology telephone bill NetFlow © 2013 Lancope, Inc. All rights reserved. 8
  • 9. End-to-end visibility via flow telemetry … … your infrastructure is the source: 3560-X Internet Shasta NetFlow NetFlow NetFlow Lompoc NetFlow 3925 ISR WAN NetFlow ASR-1000 NetFlow Cat6k NetFlow Cat6k NetFlow ASA Chandler NetFlow DMZ NetFlow Cat4k NetFlow Datacenter NetFlow UCS with Nexus 1000v NetFlow Access NetFlow NetFlow NetFlow 3850 Stack(s) © 2013 Lancope, Inc. All rights reserved. 9
  • 10. StealthWatch Management Console StealthWatch FlowReplicator NetFlow, syslog, SNMP ID1100 StealthWatch FlowCollector StealthWatch FlowSensor NetFlow enabled routers, switches, firewalls © 2013 Lancope, Inc. All rights reserved. vSphere with StealthWatch FlowSensor VE User and Device Information 10
  • 11. Typical Use Cases • Protecting Patient Data – Enhancing data privacy and security policy enforcement • Ensuring Regulatory Compliance with industry legislation – Reduce the risk of data tampering or theft, track user identity and increase accountability • Monitoring Data from a range of devices – Track critical devices on the network including heart pumps, dialysis machines, drug dispensing machines, etc. View the device, location and activity to ensure machines are secure and operating within policy • Securing Hospital Guest Networks – Maintain a robust BYOD policy to ensure visitors can use the hospital guest network without accessing confidential data and devices © 2013 Lancope, Inc. All rights reserved. 11
  • 12. Typical Use Cases - • Rapid reaction to network or security issues – “Network is slow/down” – “My app isn’t working” • Network Bandwidth Management – Ensure devices on the network are correctly configured – Track data across the network including large electronic images and files (X-Rays, MRI scans, etc) • Enhance Network Infrastructure – Augment investment in existing hardware (switches and routers) by capturing flow data for full end-to-end visibility across the network – Monitor RTP infrastructure: VoIP, video, etc. – Monitor QoS policies © 2013 Lancope, Inc. All rights reserved. 12
  • 13. Use case examples © 2013 Lancope, Inc. All rights reserved. 13
  • 14. How are my critical links being utilized? © 2013 Lancope, Inc. All rights reserved. 14
  • 15. Who talks to my HIPAA hosts? Legitimate What’s this?? © 2013 Lancope, Inc. All rights reserved. 15
  • 16. Monitor complex relationships © 2013 Lancope, Inc. All rights reserved. 16
  • 17. Monitor wireless guests © 2013 Lancope, Inc. All rights reserved. 117
  • 18. Monitor critical servers or devices © 2013 Lancope, Inc. All rights reserved. 18
  • 19. Identity integration From any report, instantly answer the question of “who”… © 2013 Lancope, Inc. All rights reserved. 19
  • 20. Further learning • Market Brief (Network & Security Challenges in Healthcare) • http://www.lancope.com/resource-center/market-briefs/networkchallenges-of-healthcare/ • Webinar: Defending HealthCare Networks: 30th October http://www.lancope.com/company-overview/webinar/defendinghealthcare-networks-with-netflow • Featured Case Studies/Success stories • http://www.lancope.com/resource-center/case-studies/stanford/ • http://www.lancope.com/resource-center/case-studies/psbc-case-study/ • CTD Video • http://www.lancope.com/resource-center/videos/ctd/ © 2013 Lancope, Inc. All rights reserved. 20
  • 21. Q&A © 2013 Lancope, Inc. All rights reserved. 21
  • 22. Thank You Jeffrey M. Wells, CCIE, CISSP Director of Business Development jwells@lancope.com www.lancope.com @Lancope (company) @netflowninjas (company blog) https://www.facebook.com/Lancope http://www.linkedin.com/groups/NetFlow-Ninjas-2261596/about https://plus.google.com/u/0/103996520487697388791/posts http://feeds.feedburner.com/NetflowNinjas © 2013 Lancope, Inc. All rights reserved. 22