SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
© 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 1 of 3
Customer Case Study
EXECUTIVE SUMMARY
TEXAS HEART INSTITUTE
● Healthcare
● Houston, Texas USA
● More than 700 network users: 300-400
employ ees, plus fellows, monitors, and visitors
BUSINESS CHALLENGE
● Need f or data security
● Content f iltering to comply with HIPAA
● Employ ee access to applications without
capability to send files outside organization
NETWORK SOLUTION
● Cisco ASA 5585-XAdaptive Security
Appliance with Next-Generation Firewall
Serv ices
● Cisco Nexus Switches (Nexus 7010)
● Cisco Switches (4500)
● Mobile Cisco Routers (C819) (Mobile MRI)
● Cisco ISA Routers (C570W) (Mobile MRI)
BUSINESS RESULTS
● Prov ides moregranular security allowing
users to more easily do their jobs
● Enables access to web applications, suchas
Dropbox and Facebook, with restrictions that
prov ide legal constraints, while still allowing
employ ees to be productive
● Restricts access toport and protocol-hopping
applications, microapplications
Leveraging Context-Aware Security to Safeguard
Patient Data
Texas Heart Institute controls network access to meet regulatory compliance needs
for its locations located in the world’s largest medical complex.
Business Challenge
The Texas Heart Institute (w ww.texasheart.org), founded in 1962, is
a nonprofit organization dedicated to innovative and progressive
programs in research, education, and improved patient care for
cardiovascular health. Together w ith its clinical partner, St. Luke’s
Episcopal Hospital, it has been ranked among the top 10
cardiovascular centers in the United States by U.S. News & World
Report’s annual guide to “America’s Best Hospitals” every year since
the rankings began in 1991. Both are part of Texas Medical Center
(http://texasmedicalcenter.org/facts-and-figures/), the
w orld’s largest medical complex.
The Texas Heart Institute (THI) also is affiliated w ith The University
of Texas Health Science (UT) System, w hich promotes collaboration
in cardiovascular research and education among faculty at the Texas
Heart Institute and other UT facilities, as w ell as Baylor, University of
Houston, and Rice.
The research institute netw ork serves 700 people, including 300 to
400 employees and hundreds of fellow s, residents, auditors,
monitors, and volunteers. Data security is paramount; the institute
creates considerable intellectual property (IP), and it is a core lab for
several other institutes in the medical center. It also is responsible for
all data as it comes through its netw ork. Health Insurance Portability
and Accountability Act (HIPAA) and Health Information Technology
for Economic and Clinical Health (HITECH) Act regulations constitute
© 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 2 of 3
key protections as w ellas institute and medical center standards.
The Institute also is in the midst of a study of 10,000 middle school and high school students to learn more about
sudden cardiac death in young people. The program helps assess hard-to-detect heart anomalies that can lead to
sudden death. The resulting patient data, including MRI (magnetic resonance imaging) results, needs to be
protected as it is transmitted back to the Institute.
Additionally, the institute w anted to allow users access to previously
blocked applications that now are important to their jobs, such as
Dropbox and Facebook, w hile blocking the features that might
jeopardize security or regulations.
Solution
The institute implemented Cisco
®
ASA 5585 Adaptive Security
Appliance(s) w ith ASA 5585-X Adaptive Security Appliance w ith
Next-Generation Firew all Services, w hich allow s for an
unprecedented level of visibility into netw ork traffic flow —including
observing the users connecting to the netw ork, the devices used,
and the applications and w ebsites accessed—in order to make more
informed decisions regarding access.
The institute now can allow users access to Facebook and Dropbox
to receive files and information but not to send them, so protected data stays w ithin the institute. Cisco ASA Next-
Generation Firew all(s) also filter port and protocol applications such as BitTorrent, w hich can fall aw ry of the
organization’s legal guidelines.
In concert w ith the ASA Next-Generation Firew all(s), THI also runs Cisco AnyConnect
®
and AnyConnect Mobile,
and it utilizes the SSL VPN function of the ASA. The institute decided to return to Cisco for local sw itches and
w ireless, as w ellas ASA Next-Generation Firew all(s), after a half decade w ith an alternative provider that lacked
strong support.
Business Results
Using the Cisco ASA Next-Generation Firew all, THI augments its efforts to protect against liabilities by limiting
unw arranted and unw anted netw ork access.
“We still have to monitor, but w e can immediately block everything— from BitTorrent, to adult sites, to foreign
sites—w hile providing specific filtering rules for online access to other w ebsites,” says LaBleu.
“It’s easy to configure rules based on IP addresses,” he adds. “At the ASA, you can determine w hat goes through
the Next-Generation Firew all Services. The on-board PRSM management system makes configuration extremely
simple. The off-box PRSM allow s you to integrate ASA objects w ith the CX to simplify access polices and rules.
Above all, if there is an issue, I only have to w orkw ith one company: Cisco.”
PRODUCT LIST
SECURITYAND CONNECTIVITY
● Cisco ASA 5585-XAdaptive Security
Appliance with these Next-Generation Firewall
Serv ices:
Application Visibility and Control
Web Security Essentials
● Cisco Prime Security Manager
● C isco AnyConnect
SWITCHING AND ROUTING
● Cisco Nexus switches (Nexus 7010)
● Cisco Switches (4500)
● Mobile Cisco Routers (C819) (Mobile MRI)
● Cisco ISA Routers (C570W) (Mobile MRI)
“In my opinion, Cisco sets a high standard in both vendor support and
compatibility.”
— Chris LaBleu, Director of Information Technology, Texas Heart Institute
© 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 3 of 3
According to LaBleu, using a hardw are solution also allow ed for easier configuration and setup instead of multiple
server requirements for softw are.
THI uses the Cisco Prime Security Manager dashboard for administration, w hich the organization finds critically
important to maintaining overarching control and visibility into its security environment.
“With a single glance to our screen, w e can see w hat’s going on at all times,” says LaBleu. “The fact that PRSM
operates in real time is key for us versus other dashboards that are statically set to refresh every 15 minutes. With
real time, you can see a spike happening and counter it before it becomes a big problem.”
The Prime Security Manager dashboard also allow s administrators to drill dow n into the reporting structure easily,
to see w hat’s going on.
“The Next-General Firew all Services absolutely helps THI to achieve its goals and objectives,” says LaBleu. “It
plays a big role in w hat w e’re trying to achieve. It gives us extra-granular security that w e didn’t have. Previously,
w e w ere only able to conduct basic filtering. For example, users either w ere or w eren’t allow ed to log on to
Facebook or Dropbox.”
“Now , w e are not restricting w hat our users need to do, but w e are restricting w hat w e don’t w ant them to do.”
With Cisco, THI increasingly is leveraging technology to help serve healthcare in improved w ays, as one of the
tools that help them to be compliant w ith patient privacy law s. LaBleu points to the site-to-site connections w ith
THI’s mobile MRI trailer. The encrypted VPN tunnel connects daily to transmit patient data from middle schools
around Houston w here students receive free MRIs.
By maximizing granular access, facilitating the w ays in w hich THI can meet regulatory compliance to maintain
privacy controls, and protecting data, THI’s netw ork team can free up time needed by the organization’s scientists
and physicians to continue their important w orkin healthcare for future generations.
For More Information
To find out more about Cisco Adaptive Security Appliances go to
http://w w w.cisco.com/en/US/products/ps5708/Products_Sub_Category_Home.html
Printed in USA CXX-XXXXXX-XX 10/11

Más contenido relacionado

La actualidad más candente

Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving servicesCloudMask inc.
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industryCloudMask inc.
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...hemanthbbc
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityAccenture
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft SolutionHarriet Schneider
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyat MicroFocus Italy ❖✔
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection Pablo Junco
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing MethodsIJCSIS Research Publications
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital businessUlf Mattsson
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Community
 
Tasmanian data linkage unit
Tasmanian data linkage unitTasmanian data linkage unit
Tasmanian data linkage unitARDC
 
Oracle 11g security - 2014
Oracle 11g security - 2014Oracle 11g security - 2014
Oracle 11g security - 2014Connor McDonald
 

La actualidad más candente (20)

Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
Project 3
Project 3Project 3
Project 3
 
2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_security
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economy
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
Trusted information protection
Trusted information protection Trusted information protection
Trusted information protection
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
Cloud Data Security and Secure Data Sharing Methods
 Cloud Data Security and Secure Data Sharing Methods Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
 
Tasmanian data linkage unit
Tasmanian data linkage unitTasmanian data linkage unit
Tasmanian data linkage unit
 
Oracle 11g security - 2014
Oracle 11g security - 2014Oracle 11g security - 2014
Oracle 11g security - 2014
 

Destacado

Workshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La SapienzaWorkshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La SapienzaSaverio Massaro
 
Taylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipRita_E
 
E metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalE metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalFLUZO
 
2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova2012 colloque mobilecréation-nova
2012 colloque mobilecréation-novaMobileCreation
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Lan presentation ed tech 541
Lan presentation ed tech 541Lan presentation ed tech 541
Lan presentation ed tech 541amybass
 
Presentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San PedroPresentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San Pedrowww.tumarketing.co
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
 
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...Saverio Massaro
 
Interni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàSaverio Massaro
 
Taylor rita
Taylor ritaTaylor rita
Taylor ritaRita_E
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Customer support 1
Customer support 1Customer support 1
Customer support 1Arya Ningrat
 
Ida ketik pengaruh tv terhadap anak
Ida ketik  pengaruh tv terhadap anakIda ketik  pengaruh tv terhadap anak
Ida ketik pengaruh tv terhadap anakArya Ningrat
 

Destacado (20)

Workshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La SapienzaWorkshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La Sapienza
 
Hipertensi 2
Hipertensi 2Hipertensi 2
Hipertensi 2
 
Taylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zip
 
E metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalE metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols final
 
2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Lan presentation ed tech 541
Lan presentation ed tech 541Lan presentation ed tech 541
Lan presentation ed tech 541
 
Presentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San PedroPresentación institucional - Urbanización San Pedro
Presentación institucional - Urbanización San Pedro
 
Bab 1 nifas 2
Bab 1 nifas 2Bab 1 nifas 2
Bab 1 nifas 2
 
Intannnnn5555
Intannnnn5555Intannnnn5555
Intannnnn5555
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
#Sottaninrete: metodologie, strumenti, processi@ lavorare nei territori works...
 
Interni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolarità
 
Taylor rita
Taylor ritaTaylor rita
Taylor rita
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Customer support 1
Customer support 1Customer support 1
Customer support 1
 
Teori 2
Teori 2Teori 2
Teori 2
 
affizan eady
affizan eadyaffizan eady
affizan eady
 
Ida ketik pengaruh tv terhadap anak
Ida ketik  pengaruh tv terhadap anakIda ketik  pengaruh tv terhadap anak
Ida ketik pengaruh tv terhadap anak
 
Bunga lanka
Bunga lankaBunga lanka
Bunga lanka
 

Similar a Leveraging Context-Aware Security to Safeguard Patient Data

Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigANIL247048
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...NAUMAN MUSHTAQ
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...IJSRED
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountabilityNagaraj Naidu
 
Citrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health SystemCitrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health SystemCitrix
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...IRJET Journal
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02Partha Sarathi Kar
 
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxRunning Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxglendar3
 
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxRunning Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxtodd581
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...Clifton M. Hasegawa & Associates, LLC
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloudieeepondy
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
 
cloud-security
cloud-securitycloud-security
cloud-securityAsun Sada
 

Similar a Leveraging Context-Aware Security to Safeguard Patient Data (20)

Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
 
The Polytechnic of Namibia
The Polytechnic of NamibiaThe Polytechnic of Namibia
The Polytechnic of Namibia
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
New Charter Housing Trust
New Charter Housing TrustNew Charter Housing Trust
New Charter Housing Trust
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountability
 
Citrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health SystemCitrix Customer Story: Southcoast Health System
Citrix Customer Story: Southcoast Health System
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 
University of Granada
University of GranadaUniversity of Granada
University of Granada
 
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
ACCESSIBILITY OF MOBILE CYBER PHYSICAL SYSTEM 02
 
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxRunning Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
 
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docxRunning Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
Running Head MOBILE COMPUTING INTEGRATION ON IT INFRASTRUCTURE1.docx
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
Managing sensitive applications in the public cloud
Managing sensitive applications in the public cloudManaging sensitive applications in the public cloud
Managing sensitive applications in the public cloud
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
cloud-security
cloud-securitycloud-security
cloud-security
 
Sapna ppt
Sapna pptSapna ppt
Sapna ppt
 

Más de Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 

Más de Cisco Security (20)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Leveraging Context-Aware Security to Safeguard Patient Data

  • 1. © 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 1 of 3 Customer Case Study EXECUTIVE SUMMARY TEXAS HEART INSTITUTE ● Healthcare ● Houston, Texas USA ● More than 700 network users: 300-400 employ ees, plus fellows, monitors, and visitors BUSINESS CHALLENGE ● Need f or data security ● Content f iltering to comply with HIPAA ● Employ ee access to applications without capability to send files outside organization NETWORK SOLUTION ● Cisco ASA 5585-XAdaptive Security Appliance with Next-Generation Firewall Serv ices ● Cisco Nexus Switches (Nexus 7010) ● Cisco Switches (4500) ● Mobile Cisco Routers (C819) (Mobile MRI) ● Cisco ISA Routers (C570W) (Mobile MRI) BUSINESS RESULTS ● Prov ides moregranular security allowing users to more easily do their jobs ● Enables access to web applications, suchas Dropbox and Facebook, with restrictions that prov ide legal constraints, while still allowing employ ees to be productive ● Restricts access toport and protocol-hopping applications, microapplications Leveraging Context-Aware Security to Safeguard Patient Data Texas Heart Institute controls network access to meet regulatory compliance needs for its locations located in the world’s largest medical complex. Business Challenge The Texas Heart Institute (w ww.texasheart.org), founded in 1962, is a nonprofit organization dedicated to innovative and progressive programs in research, education, and improved patient care for cardiovascular health. Together w ith its clinical partner, St. Luke’s Episcopal Hospital, it has been ranked among the top 10 cardiovascular centers in the United States by U.S. News & World Report’s annual guide to “America’s Best Hospitals” every year since the rankings began in 1991. Both are part of Texas Medical Center (http://texasmedicalcenter.org/facts-and-figures/), the w orld’s largest medical complex. The Texas Heart Institute (THI) also is affiliated w ith The University of Texas Health Science (UT) System, w hich promotes collaboration in cardiovascular research and education among faculty at the Texas Heart Institute and other UT facilities, as w ell as Baylor, University of Houston, and Rice. The research institute netw ork serves 700 people, including 300 to 400 employees and hundreds of fellow s, residents, auditors, monitors, and volunteers. Data security is paramount; the institute creates considerable intellectual property (IP), and it is a core lab for several other institutes in the medical center. It also is responsible for all data as it comes through its netw ork. Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health (HITECH) Act regulations constitute
  • 2. © 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 2 of 3 key protections as w ellas institute and medical center standards. The Institute also is in the midst of a study of 10,000 middle school and high school students to learn more about sudden cardiac death in young people. The program helps assess hard-to-detect heart anomalies that can lead to sudden death. The resulting patient data, including MRI (magnetic resonance imaging) results, needs to be protected as it is transmitted back to the Institute. Additionally, the institute w anted to allow users access to previously blocked applications that now are important to their jobs, such as Dropbox and Facebook, w hile blocking the features that might jeopardize security or regulations. Solution The institute implemented Cisco ® ASA 5585 Adaptive Security Appliance(s) w ith ASA 5585-X Adaptive Security Appliance w ith Next-Generation Firew all Services, w hich allow s for an unprecedented level of visibility into netw ork traffic flow —including observing the users connecting to the netw ork, the devices used, and the applications and w ebsites accessed—in order to make more informed decisions regarding access. The institute now can allow users access to Facebook and Dropbox to receive files and information but not to send them, so protected data stays w ithin the institute. Cisco ASA Next- Generation Firew all(s) also filter port and protocol applications such as BitTorrent, w hich can fall aw ry of the organization’s legal guidelines. In concert w ith the ASA Next-Generation Firew all(s), THI also runs Cisco AnyConnect ® and AnyConnect Mobile, and it utilizes the SSL VPN function of the ASA. The institute decided to return to Cisco for local sw itches and w ireless, as w ellas ASA Next-Generation Firew all(s), after a half decade w ith an alternative provider that lacked strong support. Business Results Using the Cisco ASA Next-Generation Firew all, THI augments its efforts to protect against liabilities by limiting unw arranted and unw anted netw ork access. “We still have to monitor, but w e can immediately block everything— from BitTorrent, to adult sites, to foreign sites—w hile providing specific filtering rules for online access to other w ebsites,” says LaBleu. “It’s easy to configure rules based on IP addresses,” he adds. “At the ASA, you can determine w hat goes through the Next-Generation Firew all Services. The on-board PRSM management system makes configuration extremely simple. The off-box PRSM allow s you to integrate ASA objects w ith the CX to simplify access polices and rules. Above all, if there is an issue, I only have to w orkw ith one company: Cisco.” PRODUCT LIST SECURITYAND CONNECTIVITY ● Cisco ASA 5585-XAdaptive Security Appliance with these Next-Generation Firewall Serv ices: Application Visibility and Control Web Security Essentials ● Cisco Prime Security Manager ● C isco AnyConnect SWITCHING AND ROUTING ● Cisco Nexus switches (Nexus 7010) ● Cisco Switches (4500) ● Mobile Cisco Routers (C819) (Mobile MRI) ● Cisco ISA Routers (C570W) (Mobile MRI) “In my opinion, Cisco sets a high standard in both vendor support and compatibility.” — Chris LaBleu, Director of Information Technology, Texas Heart Institute
  • 3. © 2013 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public. Page 3 of 3 According to LaBleu, using a hardw are solution also allow ed for easier configuration and setup instead of multiple server requirements for softw are. THI uses the Cisco Prime Security Manager dashboard for administration, w hich the organization finds critically important to maintaining overarching control and visibility into its security environment. “With a single glance to our screen, w e can see w hat’s going on at all times,” says LaBleu. “The fact that PRSM operates in real time is key for us versus other dashboards that are statically set to refresh every 15 minutes. With real time, you can see a spike happening and counter it before it becomes a big problem.” The Prime Security Manager dashboard also allow s administrators to drill dow n into the reporting structure easily, to see w hat’s going on. “The Next-General Firew all Services absolutely helps THI to achieve its goals and objectives,” says LaBleu. “It plays a big role in w hat w e’re trying to achieve. It gives us extra-granular security that w e didn’t have. Previously, w e w ere only able to conduct basic filtering. For example, users either w ere or w eren’t allow ed to log on to Facebook or Dropbox.” “Now , w e are not restricting w hat our users need to do, but w e are restricting w hat w e don’t w ant them to do.” With Cisco, THI increasingly is leveraging technology to help serve healthcare in improved w ays, as one of the tools that help them to be compliant w ith patient privacy law s. LaBleu points to the site-to-site connections w ith THI’s mobile MRI trailer. The encrypted VPN tunnel connects daily to transmit patient data from middle schools around Houston w here students receive free MRIs. By maximizing granular access, facilitating the w ays in w hich THI can meet regulatory compliance to maintain privacy controls, and protecting data, THI’s netw ork team can free up time needed by the organization’s scientists and physicians to continue their important w orkin healthcare for future generations. For More Information To find out more about Cisco Adaptive Security Appliances go to http://w w w.cisco.com/en/US/products/ps5708/Products_Sub_Category_Home.html Printed in USA CXX-XXXXXX-XX 10/11