SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
Your Roadmap to Healthcare
Security and BYOD
Healthcare Security
Checklist
Protect PHI
 Mitigate BYOD risks
 Apply dual factor
authentication
 Encrypt PHI data
Develop repeatable
processes for compliance
Implement procedures
and technologies
Healthcare Security Risks
96% of healthcare providers
had one or more data
breaches in the past 2 years1
1 Dell Secureworks
2 2014 Healthcare Breach Report.
Data Loss
68% of healthcare breaches are due to lost or
stolen mobile devices or files2
Impact of BYOD
BYOD: A Reality for Healthcare Providers
 Healthcare IT is already rolling out mobile apps
to improve productivity and patient care
– 2 out of 5 doctors already use mobile devices
during consultations1
 Yet mobility also presents a threat…
– 3.1M smartphones were stolen
in the U.S. in 20131
Source: Dell SecureWorks
Top Mobile Risks for Healthcare
Lost mobile devices
Stolen mobile devices
Downloading of viruses and malware
Unintentional disclosure to unauthorized users
Unsecure Wi-fi networks
Source: HealthIT.gov, Mobile Devices: Know the Risks
5 Pillars of Healthcare Security
Technical safeguards defined by the U.S. Department of Health & Human Services
Access Control
Audit
Control
Transmission
Security
Integrity
Person or
Entity
Authentication
1.Access Control: Limit users rights to
business need-to-know
– Unique User Identification
– Emergency Access Procedure
– Automatic Logoff
– Encryption and Decryption
Access Control
Audit
Control
2. Audit Control: Implement hardware,
software, or procedural mechanisms that
record and examine access to ePHI
5 Pillars of Healthcare Security
Technical safeguards defined by the U.S. Department of Health & Human Services
Transmission
Security
Integrity
Person or
Entity
Authentication
5 Pillars of Healthcare Security
Technical safeguards defined by the U.S. Department of Health & Human Services
Access Control
Audit
Control
Transmission
Security
Integrity
Person or
Entity
Authentication
3. Integrity: Implement policies and
procedures to protect ePHI from
improper alteration or destruction
5 Pillars of Healthcare Security
Technical safeguards defined by the U.S. Department of Health & Human Services
Access Control
Audit
Control
Transmission
Security
Integrity
Person or
Entity
Authentication
4. Person or Entity Authentication: Verify that
users seeking access to ePHI are who they
say they are
– Biometric, smartcard, pin/passcode, token
5 Pillars of Healthcare Security
Technical safeguards defined by the U.S. Department of Health & Human Services
Access Control
Audit
Control
Transmission
Security
Integrity
Person or
Entity
Authentication
5. Transmission Security: Prevent
unauthorized access to ePHI that is being
transmitted over a network.
– Integrity: Prevent modification or tampering of
ePHI data in transit
– Encryption: Encrypt ePHI whenever appropriate
BYOD Challenges the 5 Pillars of Security
Transmission
Security
Person or
Entity
Authentication
Audit ControlAccess Control Integrity
Difficult to
audit mobile
activity since
doctors may
share PHI with
patients via
email or text
messaging
apps
Every app may
have different
authentication
methods; they
may not
support
biometric or
PIN/passcode
methods
Mobile apps
may not use
stringent SSL
ciphers or
even encrypt
data at all
IT must define
distinct
policies for
different
users, mobile
apps and
devices—a
management
nightmare
Controls must
be applied to
prevent
accidental
deletion or
alteration of
PHI from
mobile
devices
Risks of Uncontrolled Devices
Weak
Encryption
No support for
strong
authentication
Unpatched
application
Stores PHI on
phone
No auditing of
user access
Unpatched
phone OS
In violation of HIPAA compliance requirements
IT Management and Training
 IT will likely need to help doctors install mobile apps
– They may also need to assist users through upgrades
 If apps vary by device, IT will need to provide separate
app training for Apple, Android, Microsoft or HTML5
users
Mobile Device Management Not Working
20% of enterprise BYOD programs will fail due
to MDM measures that are too restrictive.1
1 2014 MDM research report by ESG
2 2014 Employee BYOD Survey by Zixcorp
3 Gartner 2014 Mobility Predictions; original quote spelled out BYOD and MDM.
For IT TeamsFor Employees
43% worry that employers could
access personal data2
30% are concerned their employer
could control their personal device2
30% say MDM is
more difficult to use
than they anticipated1
VDI Isn’t the Solution for BYOD
Expensive
VDI Shortcomings
– Not designed for touch
– No multimedia redirection
– No access to camera,
printer, video, GPS
Total cost for Microsoft
VDI, Citrix, and hardware
is $1,000+ per user1
Not designed for
cellular edge, 3G
networks
1 Microsoft Desktop OS $187 per user, Citrix $300/user
Requires High
Bandwidth
Designed for
Windows
Virtual Mobile
Infrastructure
The Roadmap for Healthcare
Security Requires…
Virtual Mobile Infrastructure (VMI)
VMI is a service that hosts mobile apps or full
operating systems on remote servers
Provide remote access to:
 Android, Apple iOS and Windows
Phone with client apps
 Any HTML 5-enabled device
Centralize app management to:
 Eliminate need to install and
upgrade apps on every device
VMI Benefits for Healthcare Providers
Stop data loss by
preventing users from
downloading data to
their device
Lower IT costs by
eliminating mobile app
management per device
Extend mobile access to
all users and devices
with a HTML5 browser
Meet compliance by
monitoring data access
SierraVMI Keeps PHI Data Safe
SierraVMI Shields
Healthcare Data
4096-bit ECDHE
Encryption
Dual factor
authentication
SierraVMI:
• Records healthcare app access
• Stores app data securely in the data center
• IT can centrally upgrade mobile apps
Medical
professional
SierraVMI Deployment
SierraVMI hosted in
Secure Data Center
Authentication
Server
Laptop
Tablet
Phone
Databases with
PHI data
Mobile App Virtualization Architecture
Android VM Kernel
Multi-User Android Runtime
VMI Security
Gateway
Pharma
App
Patient
Messaging
App
PHI
App
Clients
Authentication
Server
Benefits
 Very high density
 Apps can share resources like CPU
 Easy to manage
 No need for expensive storage
Firefall containerFirefall containerFirefall container
Monitor User and Application Activity
 Dashboard of
system status
 Detailed logs
of user activity
 Geo-tracking
User Monitoring
 Record user
sessions for
forensics
 Allow admins
to view up to 8
active sessions
Prevent Data Loss
 Watermarking deters users
from photographing screens
– Watermark all content including
documents, video, pictures with
no additional overhead
 Anti-screen capture prevents
users from taking screenshots
 With VMI, no data is
downloaded to the phone
– Users cannot copy and paste text
Strong Authentication
Prevent unauthorized access with:
– Client certificates
– One-time password (sent via text message)
– Restricting access based on geographic location
– Brute force login protection
Ensure only legitimate users
access your data
Single Sign-on to Streamline Management
 Integrate with LDAP, Active
Directory or SAML
 Access email, calendar,
contacts, and business apps
without needing to re-
authenticate
 Automate app provisioning
 Reduce IT helpdesk calls due
to forgotten passwords
 Improve user experience by
eliminating extra login steps
IT Cost ReductionDirectory Services Integration
 Centralized data storage
 Prevent data loss from device theft
 Centralized patch management
 Eliminate concerns of devices with vulnerable or unpatched software
 Regularly scan Android server for viruses and vulnerabilities
Simplify and Secure Mobile App Management
SierraVMI Benefits for Healthcare
Compliance: Ensure privacy and
prevent data loss
Security: Strong authentication,
4096-bit encryption
Scalability: High user density, high
performance
www.sierraware.com
Click now to
view SierraVMI

Mais conteúdo relacionado

Mais procurados

Agile Architecture
Agile Architecture Agile Architecture
Agile Architecture VMware Tanzu
 
Amazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderAmazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderDebojyoti Ghosh
 
Why Value Stream is key to Digital Product Delivery
Why Value Stream is key to Digital Product Delivery Why Value Stream is key to Digital Product Delivery
Why Value Stream is key to Digital Product Delivery Mani Maun
 
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs
 
Production Support
Production SupportProduction Support
Production Supportr_shanki
 
Understand your Business processes
Understand your Business processesUnderstand your Business processes
Understand your Business processesGaurav Kumar
 
Business Process Automation PowerPoint Presentation Slides
Business Process Automation PowerPoint Presentation SlidesBusiness Process Automation PowerPoint Presentation Slides
Business Process Automation PowerPoint Presentation SlidesSlideTeam
 
FastTrack for Dynamics 365 Overview Partner Pitch Deck.pptx
FastTrack for Dynamics 365 Overview Partner Pitch Deck.pptxFastTrack for Dynamics 365 Overview Partner Pitch Deck.pptx
FastTrack for Dynamics 365 Overview Partner Pitch Deck.pptxKamilaCordier2
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
BPM & RPA, end-to-end automation with Bonita and UIPath
BPM & RPA, end-to-end automation with Bonita and UIPathBPM & RPA, end-to-end automation with Bonita and UIPath
BPM & RPA, end-to-end automation with Bonita and UIPathBonitasoft
 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsMarlon Dumas
 
Assessing Your Processes using ISO Standards
Assessing Your Processes using ISO StandardsAssessing Your Processes using ISO Standards
Assessing Your Processes using ISO StandardsPECB
 
IIoT in Pharma Manufacturing and Use Cases
IIoT in Pharma Manufacturing and Use CasesIIoT in Pharma Manufacturing and Use Cases
IIoT in Pharma Manufacturing and Use CasesSadatulla Zishan
 
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOrange Business Services
 
BPM (Business Process Management), CRM and Cross-Functional Enterprise-Level ...
BPM (Business Process Management), CRM and Cross-Functional Enterprise-Level ...BPM (Business Process Management), CRM and Cross-Functional Enterprise-Level ...
BPM (Business Process Management), CRM and Cross-Functional Enterprise-Level ...Alan McSweeney
 
The journey from traditional to conversational IVR
The journey from traditional to conversational IVRThe journey from traditional to conversational IVR
The journey from traditional to conversational IVRkore.ai
 

Mais procurados (20)

Agile Architecture
Agile Architecture Agile Architecture
Agile Architecture
 
Amazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderAmazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service Provider
 
Why Value Stream is key to Digital Product Delivery
Why Value Stream is key to Digital Product Delivery Why Value Stream is key to Digital Product Delivery
Why Value Stream is key to Digital Product Delivery
 
Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services Marlabs Capabilities Overview: Application Maintenance Support Services
Marlabs Capabilities Overview: Application Maintenance Support Services
 
Production Support
Production SupportProduction Support
Production Support
 
Mohamed_Resume
Mohamed_ResumeMohamed_Resume
Mohamed_Resume
 
Understand your Business processes
Understand your Business processesUnderstand your Business processes
Understand your Business processes
 
Business Process Automation PowerPoint Presentation Slides
Business Process Automation PowerPoint Presentation SlidesBusiness Process Automation PowerPoint Presentation Slides
Business Process Automation PowerPoint Presentation Slides
 
FastTrack for Dynamics 365 Overview Partner Pitch Deck.pptx
FastTrack for Dynamics 365 Overview Partner Pitch Deck.pptxFastTrack for Dynamics 365 Overview Partner Pitch Deck.pptx
FastTrack for Dynamics 365 Overview Partner Pitch Deck.pptx
 
Yogeshwaran_Latest_Resume
Yogeshwaran_Latest_Resume Yogeshwaran_Latest_Resume
Yogeshwaran_Latest_Resume
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
BPM & RPA, end-to-end automation with Bonita and UIPath
BPM & RPA, end-to-end automation with Bonita and UIPathBPM & RPA, end-to-end automation with Bonita and UIPath
BPM & RPA, end-to-end automation with Bonita and UIPath
 
Business Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to PredictionsBusiness Process Analytics: From Insights to Predictions
Business Process Analytics: From Insights to Predictions
 
Assessing Your Processes using ISO Standards
Assessing Your Processes using ISO StandardsAssessing Your Processes using ISO Standards
Assessing Your Processes using ISO Standards
 
IIoT in Pharma Manufacturing and Use Cases
IIoT in Pharma Manufacturing and Use CasesIIoT in Pharma Manufacturing and Use Cases
IIoT in Pharma Manufacturing and Use Cases
 
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
 
BPM (Business Process Management), CRM and Cross-Functional Enterprise-Level ...
BPM (Business Process Management), CRM and Cross-Functional Enterprise-Level ...BPM (Business Process Management), CRM and Cross-Functional Enterprise-Level ...
BPM (Business Process Management), CRM and Cross-Functional Enterprise-Level ...
 
Microsoft Power Platform.pptx
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptx
 
The journey from traditional to conversational IVR
The journey from traditional to conversational IVRThe journey from traditional to conversational IVR
The journey from traditional to conversational IVR
 
Savitha_Resume
Savitha_ResumeSavitha_Resume
Savitha_Resume
 

Semelhante a Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD

SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesrebelreg
 
A case study on BFSI and healthcare
A case study on BFSI and healthcare A case study on BFSI and healthcare
A case study on BFSI and healthcare Anubhuti Pandey
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Rio Valdes
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Walt Maclay
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...Health IT Conference – iHT2
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
Mobile monday mhealth
Mobile monday mhealthMobile monday mhealth
Mobile monday mhealthJoe Drumgoole
 

Semelhante a Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD (20)

SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
A case study on BFSI and healthcare
A case study on BFSI and healthcare A case study on BFSI and healthcare
A case study on BFSI and healthcare
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?
 
MobileSecurity WhitePaper
MobileSecurity WhitePaperMobileSecurity WhitePaper
MobileSecurity WhitePaper
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
Mobile monday mhealth
Mobile monday mhealthMobile monday mhealth
Mobile monday mhealth
 

Mais de Sierraware

Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 
Sierraware virtual phone
Sierraware virtual phoneSierraware virtual phone
Sierraware virtual phoneSierraware
 
Trustzone secure os tee for mips
Trustzone secure os tee for mipsTrustzone secure os tee for mips
Trustzone secure os tee for mipsSierraware
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkSierraware
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD SuccessSierraware
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101Sierraware
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMISierraware
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware
 

Mais de Sierraware (9)

Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 
Cloud gaming
Cloud gamingCloud gaming
Cloud gaming
 
Sierraware virtual phone
Sierraware virtual phoneSierraware virtual phone
Sierraware virtual phone
 
Trustzone secure os tee for mips
Trustzone secure os tee for mipsTrustzone secure os tee for mips
Trustzone secure os tee for mips
 
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't WorkMoving Beyond MDM: Why Legacy Mobile Security Products Don't Work
Moving Beyond MDM: Why Legacy Mobile Security Products Don't Work
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor
 

Último

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD

  • 1. Your Roadmap to Healthcare Security and BYOD
  • 2. Healthcare Security Checklist Protect PHI  Mitigate BYOD risks  Apply dual factor authentication  Encrypt PHI data Develop repeatable processes for compliance Implement procedures and technologies
  • 3. Healthcare Security Risks 96% of healthcare providers had one or more data breaches in the past 2 years1 1 Dell Secureworks 2 2014 Healthcare Breach Report. Data Loss 68% of healthcare breaches are due to lost or stolen mobile devices or files2 Impact of BYOD
  • 4. BYOD: A Reality for Healthcare Providers  Healthcare IT is already rolling out mobile apps to improve productivity and patient care – 2 out of 5 doctors already use mobile devices during consultations1  Yet mobility also presents a threat… – 3.1M smartphones were stolen in the U.S. in 20131 Source: Dell SecureWorks
  • 5. Top Mobile Risks for Healthcare Lost mobile devices Stolen mobile devices Downloading of viruses and malware Unintentional disclosure to unauthorized users Unsecure Wi-fi networks Source: HealthIT.gov, Mobile Devices: Know the Risks
  • 6. 5 Pillars of Healthcare Security Technical safeguards defined by the U.S. Department of Health & Human Services Access Control Audit Control Transmission Security Integrity Person or Entity Authentication 1.Access Control: Limit users rights to business need-to-know – Unique User Identification – Emergency Access Procedure – Automatic Logoff – Encryption and Decryption
  • 7. Access Control Audit Control 2. Audit Control: Implement hardware, software, or procedural mechanisms that record and examine access to ePHI 5 Pillars of Healthcare Security Technical safeguards defined by the U.S. Department of Health & Human Services Transmission Security Integrity Person or Entity Authentication
  • 8. 5 Pillars of Healthcare Security Technical safeguards defined by the U.S. Department of Health & Human Services Access Control Audit Control Transmission Security Integrity Person or Entity Authentication 3. Integrity: Implement policies and procedures to protect ePHI from improper alteration or destruction
  • 9. 5 Pillars of Healthcare Security Technical safeguards defined by the U.S. Department of Health & Human Services Access Control Audit Control Transmission Security Integrity Person or Entity Authentication 4. Person or Entity Authentication: Verify that users seeking access to ePHI are who they say they are – Biometric, smartcard, pin/passcode, token
  • 10. 5 Pillars of Healthcare Security Technical safeguards defined by the U.S. Department of Health & Human Services Access Control Audit Control Transmission Security Integrity Person or Entity Authentication 5. Transmission Security: Prevent unauthorized access to ePHI that is being transmitted over a network. – Integrity: Prevent modification or tampering of ePHI data in transit – Encryption: Encrypt ePHI whenever appropriate
  • 11. BYOD Challenges the 5 Pillars of Security Transmission Security Person or Entity Authentication Audit ControlAccess Control Integrity Difficult to audit mobile activity since doctors may share PHI with patients via email or text messaging apps Every app may have different authentication methods; they may not support biometric or PIN/passcode methods Mobile apps may not use stringent SSL ciphers or even encrypt data at all IT must define distinct policies for different users, mobile apps and devices—a management nightmare Controls must be applied to prevent accidental deletion or alteration of PHI from mobile devices
  • 12. Risks of Uncontrolled Devices Weak Encryption No support for strong authentication Unpatched application Stores PHI on phone No auditing of user access Unpatched phone OS In violation of HIPAA compliance requirements
  • 13. IT Management and Training  IT will likely need to help doctors install mobile apps – They may also need to assist users through upgrades  If apps vary by device, IT will need to provide separate app training for Apple, Android, Microsoft or HTML5 users
  • 14. Mobile Device Management Not Working 20% of enterprise BYOD programs will fail due to MDM measures that are too restrictive.1 1 2014 MDM research report by ESG 2 2014 Employee BYOD Survey by Zixcorp 3 Gartner 2014 Mobility Predictions; original quote spelled out BYOD and MDM. For IT TeamsFor Employees 43% worry that employers could access personal data2 30% are concerned their employer could control their personal device2 30% say MDM is more difficult to use than they anticipated1
  • 15. VDI Isn’t the Solution for BYOD Expensive VDI Shortcomings – Not designed for touch – No multimedia redirection – No access to camera, printer, video, GPS Total cost for Microsoft VDI, Citrix, and hardware is $1,000+ per user1 Not designed for cellular edge, 3G networks 1 Microsoft Desktop OS $187 per user, Citrix $300/user Requires High Bandwidth Designed for Windows
  • 16. Virtual Mobile Infrastructure The Roadmap for Healthcare Security Requires…
  • 17. Virtual Mobile Infrastructure (VMI) VMI is a service that hosts mobile apps or full operating systems on remote servers Provide remote access to:  Android, Apple iOS and Windows Phone with client apps  Any HTML 5-enabled device Centralize app management to:  Eliminate need to install and upgrade apps on every device
  • 18. VMI Benefits for Healthcare Providers Stop data loss by preventing users from downloading data to their device Lower IT costs by eliminating mobile app management per device Extend mobile access to all users and devices with a HTML5 browser Meet compliance by monitoring data access
  • 19. SierraVMI Keeps PHI Data Safe SierraVMI Shields Healthcare Data 4096-bit ECDHE Encryption Dual factor authentication SierraVMI: • Records healthcare app access • Stores app data securely in the data center • IT can centrally upgrade mobile apps Medical professional
  • 20. SierraVMI Deployment SierraVMI hosted in Secure Data Center Authentication Server Laptop Tablet Phone Databases with PHI data
  • 21. Mobile App Virtualization Architecture Android VM Kernel Multi-User Android Runtime VMI Security Gateway Pharma App Patient Messaging App PHI App Clients Authentication Server Benefits  Very high density  Apps can share resources like CPU  Easy to manage  No need for expensive storage Firefall containerFirefall containerFirefall container
  • 22. Monitor User and Application Activity  Dashboard of system status  Detailed logs of user activity  Geo-tracking
  • 23. User Monitoring  Record user sessions for forensics  Allow admins to view up to 8 active sessions
  • 24. Prevent Data Loss  Watermarking deters users from photographing screens – Watermark all content including documents, video, pictures with no additional overhead  Anti-screen capture prevents users from taking screenshots  With VMI, no data is downloaded to the phone – Users cannot copy and paste text
  • 25. Strong Authentication Prevent unauthorized access with: – Client certificates – One-time password (sent via text message) – Restricting access based on geographic location – Brute force login protection Ensure only legitimate users access your data
  • 26. Single Sign-on to Streamline Management  Integrate with LDAP, Active Directory or SAML  Access email, calendar, contacts, and business apps without needing to re- authenticate  Automate app provisioning  Reduce IT helpdesk calls due to forgotten passwords  Improve user experience by eliminating extra login steps IT Cost ReductionDirectory Services Integration
  • 27.  Centralized data storage  Prevent data loss from device theft  Centralized patch management  Eliminate concerns of devices with vulnerable or unpatched software  Regularly scan Android server for viruses and vulnerabilities Simplify and Secure Mobile App Management
  • 28. SierraVMI Benefits for Healthcare Compliance: Ensure privacy and prevent data loss Security: Strong authentication, 4096-bit encryption Scalability: High user density, high performance