Unisys Stealth Solution for Network


Solution Guide
Relative to the 2.4 Release
Sample Use Case…
Healthcare Organization
Protecting PHI Data in Motion
Problem:
Ensuring sensitive information is secured while data is in
motion across private and public networks
Information sharing is necessary to provide effective healthcare services.
Health Information Exchanges (HIE) will raise the bar on the need to provide
information to consumers and to share information across many different
types of networks, providers and jurisdictional borders while protecting       Solution:
patient privacy. Solutions that are deployed in HIEs must address the data
protection requirements of HIPAA/HITECH and other data protection              • Using military grade encryption and unique
regulations and statutes.                                                        message shredding technology, Stealth
                                                                                 ensures that data cannot be stolen and/or
                                                                                 decoded by unauthorized users as it moves
Solution:                                                                        across networks.
                                                                               • Stealth creates Communities of Interest,
Unisys Stealth Solution for Secure Virtual Terminal                              based on user credentials and not device
                                                                                 location or physical topology, which control
                                                                                 the ability to decode Stealth formatted
                                                                                 messages.
                                                                               • Adding or removing users to COIs or
                          Network                                                changing access rights of COI members
                                                                                 can be accomplished in minutes with
                                                                                 Stealth.

                                   Patient PHI Secure



                                                                               © 2012 Unisys Corporation. All rights reserved.   2
Sample Use Case…
  Healthcare Organization
  Save Costs while Increasing Security

  Problem:
  Saving money on IT while restricting access to sensitive data
  HIPAA compliance requires secure controlled access to sensitive data to
  ensure patient privacy. The traditional approach of separate physical
  networks for different departments to control access to information is
  expensive and complex, and increases management overheard. Flattening                           Solution:
  the network is clearly more cost efficient, but protecting access to private
  resources with passwords is a breach waiting to happen.                                         • Stealth enables physical networks to be
                                                                                                    collapsed and VLANs to be reduced
                                                                                                    resulting  in   significant CapEx/OpEx
                                                                                                    savings.
Solution: Unisys Stealth Solution for Network
                                                                                                  • Easy to manage user groups provide
                             Dept Server                                                            cryptographic   separation,     providing
                   Dept                                                                             increased data security and facilitating
                   Network                                                                          compliance while simplifying the security
Medical Records                               Medical Records                                       management.
                                                                                    Data Center
                              Dept Server                          Common Network
                   Dept
                                                                                                  • Servers and applications can be accessed
                   Network                                                                          only by users with corresponding
                                                                                                    “Community of Interest” (COI) keys. Non-
Registration                                     Registration                                       COI members cannot even see the
                              Dept Server                                                           systems they are not authorized to access.
                   Dept
                   Network




 Finance                                         Finance

                                                                                                  © 2012 Unisys Corporation. All rights reserved.   3
Sample Use Case…
Healthcare Organization
SSVT Solves Leading Cause of HIPAA Data Breaches

Problem:
#1 Cause of HIPAA data breaches is theft of laptops
Using HIPAA-compliant practice management or Electronic Health Record
software packages with robust core IT systems is meaningless if someone
leaves a laptop where it can be lost or stolen. Over half of HIPAA security
breaches are behavior-driven, not technology driven. Laptops are used by      Solution:
senior clinical and business personnel who access a huge number of patient
records.                                                                      • SSVT allows users to securely work
                                                                                anywhere without storing patient personal
                                                                                health information on laptops, desktops or
                                                                                portable media, while remaining invisible
Solution:                                                                       even on the open internet.
                                                                              • SSVT safeguards patient data by
Unisys Stealth Solution for Secure Virtual Terminal                             neutralizing existing infections and
                                                                                malware, and protecting the data as it is
                                                                                moving through the network.
                                                                              • SSVT leaves no trace of user activity on
                           Network                                              the system and is configured to eliminate
                                                                                data loss at the end user’s PC/laptop.
                                                                              • If the SSVT is lost or stolen there is no risk
                                                                                of a third party getting access to your data,
                                Patient Data Secure                             as the SSVT device destroys its contents if
                                                                                someone attempts to take it apart.


                                                                              © 2012 Unisys Corporation. All rights reserved.   4
Sample Use Case…
      Healthcare Organization
      Emergency Preparedness

      Problem:
      When disaster strikes, medical personnel must still access
      patient data
      Your hospital data center has a disaster recovery “failover” plan, but if
      medical personnel cannot get to a facility, patient outcomes could suffer.
      Physicians must be able to triage remotely to advise on-site staff. Viewing             Solution:
      patient test results and diagnoses over the Internet is not secure and may
      violate privacy regulations.                                                            • SSVT allows users to securely work
                                                                                                anywhere, while remaining invisible even
                                                                                                on the open internet.
                                                                                              • SSVT safeguards patient data by not
      Solution:                                                                                 storing any information on the device
                                                                                                “hosting” the SSVT device, as well as
      Unisys Stealth Solution for Secure Virtual Terminal                                       protecting the data as it is moving through
                                                                                                the network.
                                                                                              • SSVT is password-protected and requires
                                                                                                user credentials to open a Stealth
                                                                                  Web           connection, hence there is no fear of
                                                       Hospital PC             Applications
                   Internet           Hospital                                                  misuse even in case of loss or theft.
                                      Network
Physician Laptop

                                               Patient Data Virtual Infrastructure




                                                                                              © 2012 Unisys Corporation. All rights reserved.   5
Sample Use Case…
Healthcare Organization
More Secure Telemedicine than Traditional VPN
Problem:
Privacy and confidentiality requirements in the medical realm
are not different in telemedicine
As with conventional medicine, a telemedicine clinician has the same duty to
safeguard a patient’s medical records and keep treatments confidential.
Transmitting sensitive information over communication lines lends itself to    Solution:
hacking attacks such as “man in the middle” eavesdropping and “phishing”
attempts whereby hackers masquerade as trusted partners. Organizations         •     Stealth creates a communications tunnel
must ensure that patient privacy is maintained, as well as ensuring the              invisible to everyone except those who
integrity of any data or images transmitted.                                         are pre-identified as part of the
                                                                                     “Community of Interest “(COI).
                                                                               •     Stealth is more secure than VPNs;
Solution:                                                                            Stealth formatted messages are not
                                                                                     decodable by any software other than a
Unisys Stealth Solution for Network                                                  Stealth endpoint with matching COI keys.
                                                                               •     Stealth is not vulnerable to “man in the
                                                                                     middle” attacks because Stealth secure
                                                                                     tunnels eliminate a hacker from inserting
                                                                                     himself between Stealth endpoints.
                           Network
                                                                               •     Stealth prevents phishing attempts
                                                                                     because all Stealth traffic flows between
                                                                                     endpoints that share the same COI keys.
                                                                                     Lacking the specific COI key material,
                           Patient Medical Records Secure                            there is no opportunity for any traffic to
                                                                                     be maliciously redirected.

                                                                               © 2012 Unisys Corporation. All rights reserved.   6

Stealth solution for healthcare

  • 1.
    Unisys Stealth Solutionfor Network Solution Guide Relative to the 2.4 Release
  • 2.
    Sample Use Case… HealthcareOrganization Protecting PHI Data in Motion Problem: Ensuring sensitive information is secured while data is in motion across private and public networks Information sharing is necessary to provide effective healthcare services. Health Information Exchanges (HIE) will raise the bar on the need to provide information to consumers and to share information across many different types of networks, providers and jurisdictional borders while protecting Solution: patient privacy. Solutions that are deployed in HIEs must address the data protection requirements of HIPAA/HITECH and other data protection • Using military grade encryption and unique regulations and statutes. message shredding technology, Stealth ensures that data cannot be stolen and/or decoded by unauthorized users as it moves Solution: across networks. • Stealth creates Communities of Interest, Unisys Stealth Solution for Secure Virtual Terminal based on user credentials and not device location or physical topology, which control the ability to decode Stealth formatted messages. • Adding or removing users to COIs or Network changing access rights of COI members can be accomplished in minutes with Stealth. Patient PHI Secure © 2012 Unisys Corporation. All rights reserved. 2
  • 3.
    Sample Use Case… Healthcare Organization Save Costs while Increasing Security Problem: Saving money on IT while restricting access to sensitive data HIPAA compliance requires secure controlled access to sensitive data to ensure patient privacy. The traditional approach of separate physical networks for different departments to control access to information is expensive and complex, and increases management overheard. Flattening Solution: the network is clearly more cost efficient, but protecting access to private resources with passwords is a breach waiting to happen. • Stealth enables physical networks to be collapsed and VLANs to be reduced resulting in significant CapEx/OpEx savings. Solution: Unisys Stealth Solution for Network • Easy to manage user groups provide Dept Server cryptographic separation, providing Dept increased data security and facilitating Network compliance while simplifying the security Medical Records Medical Records management. Data Center Dept Server Common Network Dept • Servers and applications can be accessed Network only by users with corresponding “Community of Interest” (COI) keys. Non- Registration Registration COI members cannot even see the Dept Server systems they are not authorized to access. Dept Network Finance Finance © 2012 Unisys Corporation. All rights reserved. 3
  • 4.
    Sample Use Case… HealthcareOrganization SSVT Solves Leading Cause of HIPAA Data Breaches Problem: #1 Cause of HIPAA data breaches is theft of laptops Using HIPAA-compliant practice management or Electronic Health Record software packages with robust core IT systems is meaningless if someone leaves a laptop where it can be lost or stolen. Over half of HIPAA security breaches are behavior-driven, not technology driven. Laptops are used by Solution: senior clinical and business personnel who access a huge number of patient records. • SSVT allows users to securely work anywhere without storing patient personal health information on laptops, desktops or portable media, while remaining invisible Solution: even on the open internet. • SSVT safeguards patient data by Unisys Stealth Solution for Secure Virtual Terminal neutralizing existing infections and malware, and protecting the data as it is moving through the network. • SSVT leaves no trace of user activity on Network the system and is configured to eliminate data loss at the end user’s PC/laptop. • If the SSVT is lost or stolen there is no risk of a third party getting access to your data, Patient Data Secure as the SSVT device destroys its contents if someone attempts to take it apart. © 2012 Unisys Corporation. All rights reserved. 4
  • 5.
    Sample Use Case… Healthcare Organization Emergency Preparedness Problem: When disaster strikes, medical personnel must still access patient data Your hospital data center has a disaster recovery “failover” plan, but if medical personnel cannot get to a facility, patient outcomes could suffer. Physicians must be able to triage remotely to advise on-site staff. Viewing Solution: patient test results and diagnoses over the Internet is not secure and may violate privacy regulations. • SSVT allows users to securely work anywhere, while remaining invisible even on the open internet. • SSVT safeguards patient data by not Solution: storing any information on the device “hosting” the SSVT device, as well as Unisys Stealth Solution for Secure Virtual Terminal protecting the data as it is moving through the network. • SSVT is password-protected and requires user credentials to open a Stealth Web connection, hence there is no fear of Hospital PC Applications Internet Hospital misuse even in case of loss or theft. Network Physician Laptop Patient Data Virtual Infrastructure © 2012 Unisys Corporation. All rights reserved. 5
  • 6.
    Sample Use Case… HealthcareOrganization More Secure Telemedicine than Traditional VPN Problem: Privacy and confidentiality requirements in the medical realm are not different in telemedicine As with conventional medicine, a telemedicine clinician has the same duty to safeguard a patient’s medical records and keep treatments confidential. Transmitting sensitive information over communication lines lends itself to Solution: hacking attacks such as “man in the middle” eavesdropping and “phishing” attempts whereby hackers masquerade as trusted partners. Organizations • Stealth creates a communications tunnel must ensure that patient privacy is maintained, as well as ensuring the invisible to everyone except those who integrity of any data or images transmitted. are pre-identified as part of the “Community of Interest “(COI). • Stealth is more secure than VPNs; Solution: Stealth formatted messages are not decodable by any software other than a Unisys Stealth Solution for Network Stealth endpoint with matching COI keys. • Stealth is not vulnerable to “man in the middle” attacks because Stealth secure tunnels eliminate a hacker from inserting himself between Stealth endpoints. Network • Stealth prevents phishing attempts because all Stealth traffic flows between endpoints that share the same COI keys. Lacking the specific COI key material, Patient Medical Records Secure there is no opportunity for any traffic to be maliciously redirected. © 2012 Unisys Corporation. All rights reserved. 6