Vous êtes sur la page 1sur 4

Security

Gateway Secures
Web 2.0 Initiative
Concerned about malware and other security issues, Health First settled on a solution that allows
IT to set granular, flexible Internet usage policies for devices, as well as specific users and groups.

L
eaders at Health First, a Florida-based not-for- ity and also to meet compliance regulation standards like
profit healthcare organization, thought that HIPAA and the HITECH Act - is our first priority, and
Web 2.0 had the potential to offer new ways so having the right security in place was our number one
to communicate with patients, employees and concern before opening access to Web 2.0."
potential new patients. Protecting sensitive patient data Health First IT and security management teams were
and the integrity of the organization, however, was a approached by different groups throughout the organiza-
paramount consideration and staff worried that opening tion about enabling access to tools like social networking
access without the right security, policies and planning sites to extend their communication on a real-time basis
could be disastrous - because Web 2.0 sites are a top as a cost-effective marketing tool. Additionally, Health
target of cybercriminals and a major source of data loss First was running out of room in its data center and
if not managed properly. so staff began to move systems traditionally managed
onsite to the cloud, such as transcription services and
enterprise-wide patient scheduling.
"In order to let our employees visit these The Health First network includes three hospitals, the
(social networking) sites, we needed a county's only trauma center,fitnesscenters and an aging
institute, among other services. With more than 6,000
Web security gateway solution that sits inline Internet-connected devices throughout the organization
in the network stream and is able to look at and thousands of employees with different roles, one of
the most critical challenges to opening access to Web 2.0
the specific content on the page in real time." was to find a security solution that would allow IT to set
granular, flexible Internet usage policies for devices, as
well as specific users and groups within the organization.
Just a few years ago, IT managers at healthcare or- Health First wanted to set policies that could, based on
ganizations could simply use Web security and filtering an employee's role, control how much access that person
solutions to set strict policies blocking employees from had to Web 2.0 sites, how much time they could spend
nearly all outside Internet access. The risks posed by on those sites, what level of access they could have to
the Web - such as an employee accidentally introducing sensitive corporate information and even what they could
malware or a virus onto the corporate network or viewing do with that information.
inappropriate information - were greater than the ben-
efits of allowing Internet access. Today, however, with the Flexibility for Different Needs
introduction of Web 2.0 technologies like cloud-based "We needed aflexiblesolution that would provide our
services, social networking sites, and new collaboration marketing team, for example, with access to YouTube to
and communication tools, the closed environment can create and promote videos on new services we provide
be unrealistic and can hinder business process. and to access our Facebook fan page, or allow our nurses
"Web 2.0 can help our organization stay ahead ofthe and doctors to access the cloud-based patient care ap-
technology curve, but jumping in without a plan in place plications we use," says Rushnell. "But we also needed
was not an option," says Christi Rushnell, Health First theflexibilityto ensure that a machine in an openly ac-
vice president, information technology and strategic cessible area was secured from allowing people to go to
services. "Protecting patient and personally identifiable places on the Web that would violate policies or put the
information - both because it's our corporate responsibil- organization at risk."

20 October 2009 HEALTH MANAGEMEnT TECHNOLOGY www.healthmgttech.com


Another problem Health First faced was that Web 2.0 "Web 2.0 has quickly diminished the effectiveness of
sites present an emerging vector for malware and other traditional security solutions like signature-based antivi-
data-stealing attacks. Cybercriminals are increasingly rus and traditional URL filtering, because it's dynamic
infecting sites that enable user-generated content such and constantly changing," says Frank Waszmer, Heath
as blogs and Twitter, with malicious content. Recent First information security architect. "Reputation-based
research also shows that 57 percent of data-stealing at- security is also not enough, as Web 2.0 sites generally
tacks are coming over the Web. Health First found that have a "good" reputation.
traditional security solutions were not up to the task of "Places like news sites, Google and social networking
protecting against Web 2.0 attacks and inappropriate sites have great reputations but, today, it's often these
content. legitimate sites that are targeted. In order to let our

Automate Hospital's Network Security

By Jim Alves
Not having a centralized dashboard or m a n a g e m e n t enables IT staff to identify and mitigate risks. This
console f o r m o n i t o r i n g t h e network a n d installing includes antivirus, antispyware and rootkit protection
u p d a t e s c a n p u t a strain o n t h e IT a n d security for servers, workstations and mobile computers.
t e a m s , f o r c i n g t h e m t o spend a majority of their In order to effectively manage this important
t i m e a n d b u d g e t o n m a i n t e n a n c e . T h e n u m b e r of component, the IT team needs visibility into all
machines distributed t h r o u g h o u t t h e organization deployment, configuration, status and operation of
c o m p o u n d s this issue, as t h e IT staff must travel t o the endpoint security functionality. Staff should also
e a c h location t o fix problems a n d m a n u a l l y install directly control all policies, deployment, updates and
upgrades a n d updates. operations schedules. In addition, IT professionals
A single IT m a n a g e m e n t system t h a t provides a should enforce corporate and security policies
holistic, real-time view of t h e entire network c a n across the entire organizational infrastructure to
help t h e IT t e a m be m o r e proactive a b o u t security. keep networks running at optimal level with minimal
By i m p l e m e n t i n g a comprehensive a n d integrated security intrusions.
IT automation platform that is both flexible and Patch and upgrade management is also a vital
scalable, organizations can provide their IT teams part to maintaining a hospital's IT infrastructure,
with a comprehensive look at the whole system, keeping security holes closed before major damage
reducing human error and security breaches, and is inflicted. This includes scheduling recurring
decreasing the amount of time spent addressing patch scans, searching networks for installed and
daily IT tasks. Through a single. Web-based console, missing security patches, detecting vulnerabilities,
one IT professional can efficiently manage hundreds and monitoring and maintaining patch compliance
of systems and have full insight into the health of throughout the entire enterprise. After the system
the infrastructure, saving time, travel, money and is diagnosed and vulnerabilities are located, the IT
resources. staff should then roll out the required actions across
Unlike conventional file-based products, IT the appropriate machines based on the extent of the
automation software creates an image of the update. Automating these tasks can make updating
entire system state, including operating system, and maintaining compliance quick and efficient.
business applications, user settings, drivers and Lastly, a comprehensive security solution
data. This makes rebuilding workstations easier, also includes backup and disaster recovery. IT
while also enabling more-effective monitoring and administrators should not only be able to locate what
implementation of updates simultaneously across needs to be backed up, but also know where the
the network. IT automaton also makes security data is stored in order to quickly recover important
more effective by centrally managing the three most information regardless of their physical location. This
important elements of is especially important when an unforeseen, major
Jim Alves is executive vice ° complete security event results in data loss.
president, product marketing Program: endpoint IT staff should also have the ability to deploy,
and strategy, for Kaseya, security, patch and configure, manage, monitor, secure, backup and
San Francisco. upgrade management, restore distributed systems. This removes the
For more information on and backup and responsibility of backing up workstations by end-
Kaseya solutions, disaster recovery. users, ensuring trained professionals monitor and
www.rsleads.com/910-200 Endpoint security manage the task on a regular and reliable basis.

www.healthmgttech.com HEALTH MAnAGEMENT TECHNOLOGY October 2009 21


Security

employees visit these sites, we needed a Web security specialized policies around Web use to provide greater
gateway solution that sits inline in the network stream, is protection for key areas.
able to look at the specific content on the page and then "Today, we are able to set Web-use policies around
prevent the malicious elements from being accessed." users, groups and devices," Waszmer notes. "Because of
Another requirement was the ability to look at en- the flexibility of the secure Web gateway and the report-
crypted secure socket layer (SSL) streams. Waszmer ing and policy infrastructure we have created, we have
noticed an increased amount of malicious traffic set up been able to roll out access to different Web 2.0 sites to
through SSL sessions. Without being able to see into the groups and specific people that need it.
the traffic streams, Waszmer worried that data-stealing "Additionally, one of the unique benefits about the
malware could make its way into the network. solution is that it classifies specific content on Web sites
Health First selected Websense Web Security in real time. So, if it classifies a Web page that has some
Gateway as a tool to enable employees to safely access business benefits but also contains some content that
Web 2.0. Waszmer designed a deployment strategy to violates a poUcy, the solution will block just that one
help minimize installation time. To redirect HTTP and portion of the page."
HTTP S Web traffic to the gateway, he deployed the Health First uses the gateway as part of a layered
system in what is called a "transparent proxy," utilizing security approach that involves technology, investiga-
the WCCP protocol. The majority of time spent on this tion, and awareness and education. "With our strategy
project has been around fine-tuning Web-use policies and technology in place, I'm able to run reports on Web
and working with the different departments to provide use, see malicious or inappropriate sites employees have
greater control and feedback. a t t e m p t e d to access, and use the reports to better edu-
cate Web users and gain a greater understanding of how
Policies Drive Compliance Web 2.0 sites can be used throughout the organization,"
Health First currently has five global policies that says Waszmer. "Additionally, the reports allow my team
govern where and how people can use and interact with to quickly respond to security events. With visibility
the Internet and Waszmer has created more than 20 into the systems, we're able to stay ahead of the threats
before they become a problem."
"Today, healthcare IT managers and C I O s need to
be an active part of the solution to balance the business
needs of Web 2.0 adoption with security," says Rushnell.
"Web 2.0 is here and only going to become a larger part
of our business, so my greatest advice to other healthcare
organizations thinking about enabling Web 2.0 is that they
Reconceiving Disease Management
This white paper demonstrates Intel's vision for the role of
need to anticipate the changes in the business and adjust,
rennote patient monitoring (flPM) technology in chronic disease actively taking steps to secure Web 2.0 use." HMT
management and identifies the core issues that disease man-
agement professionals must address. / - " " ' ' " " • ^

From the Catalog


J Connecting Patients and Healthcare Professionals According to www.websense.com: Websense Web
' The Intel Health Guide Solution Brief provides a closer look at
Security Gateway allows organizations to secure Web
next-generation remote patient monitoring.
_., traffic effectively while still enabling the latest in
Healthcare Document Imaging Trend Report Web 2.0 tools and applications. Through a real-time
The Healthcare sector provides significant opportunities for content-classification engine, the gateway analyzes
document imaging software and hardware including document Web traffic on the fly, instantly categorizing new sites
scanners. and dynamic content, proactively discovering security
Reaping the Benefits of an Electronic Health Records
risks, and blocking dangerous malware. Backed by
System Websense ThreatSeeker Network technologies. Web
Cost reduction, improved patient care, and compliance, have Security Gateway provides advanced analytics -
created a trifecta for moving to an Electronic Health Records including rules, signatures, heuristics and application
(EHR) management system. behaviors- to detect and block proxy avoidance,
hacking sites, adult content, botnets, keyloggers,
Catholic Health Initiatives Saves Big with IT Investment
Catholic Health Initiatives (CHI) saved $125 million with a suite
J ^ , ^ phishing a t t a c k s .
of business applications. For more information on spyware and many
Websense solutions: other types af unsafe
www.rsleads.com/91 (3-201 content.

22 October 2009 HEALTH MANAGEMENT TECHNOLOGY www.healthmgttech.com

Vous aimerez peut-être aussi