See how RedSeal has helped healthcare organizations avoid experiencing the same network issues year after year by focusing on cybersecurity fundamentals.
We’ll show you how RedSeal can:
- Show you what’s on your network – including in your cloud environments.
- Show you how everything is connected. You’ll see all potential access, intended or not.
- Identify actual risk to your network from vulnerabilities and incidents.
With RedSeal, healthcare security teams have:
- Verified their network segmentation and passed PCI audits.
- Been confident that their unpatchable medical devices are protected behind firewalls.
- Verified that they comply with network policies and regulations.
- Visualized their network by site and by service.
- Been notified when network changes are made, cloud instances added, or sites come online.
- Prioritized vulnerabilities based not just on severity and asset value, but on actual risk in their networks.
- Understood what risk was being added to their network from mergers or acquisitions.
- Used RedSeal Professional Services so they can see this value quickly.
Thursday, March 12 10:45 am
Hall A — Booth 400 — Cybersecurity Theater A
CNET’s article on 2019 breaches began with the observation that they see the same network issues year after year – all while attacks and costs of breaches increase. But breaches aren’t inevitable. You’ll see how basic cybersecurity best practices can help you avoid those same mistakes and make your network more resilient to breaches. We’ll review the importance of understanding: What’s on your network. How it’s all connected. Your network risk.
AUDIENCE: Technical and management levels concerned with cybersecurity.
REGIONAL US HEALTHCARE PROVIDER
SITUATION: To avoid increased fees from credit card companies, the security team needed to pass their PCI audit—quickly. Unfortunately, the team is short staffed and so busy they haven’t been able to create standard operating procedures. The security team had other concerns, too. They needed to ensure that their unpatchable medical devices remained protected and behind firewalls. And, they wanted to be more proactive about security rather than just react to alerts.
A LARGE U.S. RESEARCH HOSPITAL
SITUATION: At a large research hospital, the security team members didn’t have enough information to do their jobs. The security team was small, and they lacked visibility into their network. They knew a new hospital would come online but they didn’t know when. They’d heard that some groups were working with AWS instances, but they didn’t know where or how many. They just didn’t know what they didn’t know. So, they asked RedSeal to show them what’s on their network, how it’s connected and the associated risk.
LARGE SOUTHERN U.S. HEALTHCARE PROVIDER
SITUATION: The security team for this large Southern US healthcare system needed help to pass a PCI audit. They didn’t know how their network was segmented or what subnets had PCI card holder data. They also wanted one “source of truth” for all their inventory, their Service Now CMDB. They expected the network device data to come from SolarWinds NCCM but weren’t confident that all the information was there. They looked to Tenable SC for their endpoint/host information, but again they weren’t confident that everything was being scanned. Additionally, their vulnerability management team wanted to improve patching prioritization by understanding potential access within the network. They knew the vulnerability severity and the value of the asset, but they wanted to know if the asset could be directly accessed from an untrusted network—and what an attacker could reach if the asset was compromised.