Webinar: CYREN WebSecurity for Healthcare

27
1 ©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission. Achieving Effective Cyber Security for Healthcare Chris Taylor, Sr. Director, Product and Marketing

Transcript of Webinar: CYREN WebSecurity for Healthcare

Page 1: Webinar: CYREN WebSecurity for Healthcare

1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.

Achieving Effective Cyber Security for Healthcare

Chris Taylor, Sr. Director, Product and Marketing

Page 2: Webinar: CYREN WebSecurity for Healthcare

2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

About CYREN

THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE

Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator of cyber intelligence solutions. CYREN provides web, email, endpoint, and roaming cybersecurity solutions that are relied upon by the world’s largest IT companies to protect them and the billions of customers they serve from today’s advanced threats.

2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Page 3: Webinar: CYREN WebSecurity for Healthcare

3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN Powers the World’s Security

Our Cyber Intelligence forms the security foundation of many of the world’s largest and most influential information technology and Internet security brands.

Page 4: Webinar: CYREN WebSecurity for Healthcare

4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

CYREN by the Numbers

The Best Data Delivers the Best Protection

Page 5: Webinar: CYREN WebSecurity for Healthcare

5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 5

The Changing Security Landscape for Healthcare

Page 6: Webinar: CYREN WebSecurity for Healthcare

6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

New Technology Is Transforming HealthcareDriven by the need for better patient outcomes and cost reduction

Philips HealthTech Trends, 2015

Page 7: Webinar: CYREN WebSecurity for Healthcare

7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

New Technology Is Transforming HealthcareDriven by the need for better patient outcomes and cost reduction

Philips HealthTech Trends, 2015

Page 8: Webinar: CYREN WebSecurity for Healthcare

8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Poll Question #1

Which technologies have you implemented? (Select All that Apply)1. Mobile (tablet/laptop/smartphone) devices for clinicians2. Electronic Health/Medical Record (EHR/EMR) platform3. Electronic Document Management4. Moving data and/or applications to the Cloud5. Wireless wearable patient monitors?

Page 9: Webinar: CYREN WebSecurity for Healthcare

9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

New Technology Creates Security Challenges

Scarcity of security resources

Additional use of local and personal devices

Hassle of basic security measures

Lagging security governance

Page 10: Webinar: CYREN WebSecurity for Healthcare

10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Today’s Healthcare Security Headlines

Page 11: Webinar: CYREN WebSecurity for Healthcare

11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

What the Analysts Say…“The expanding number of access points to Protected Health Information (PHI) and other sensitive data via electronic medical records and the growing popularity of wearable technology makes the healthcare industry a vulnerable and attractive target for cybercriminals. Several factors suggest the healthcare industry will continue to be plagued with data breach headlines in 2015.”

2015 Annual Data Breach Industry Forecast, Experian

“A series of recent high-profile security failures shows that many healthcare delivery organizations' current practices and controls remain inadequate. Gartner's guidelines will help CIOs keep their organizations safe to facilitate safe participation in digital business.

Healthcare Delivery Organizations Will Need Stronger Security to Participate in Digital Business, Gartner, 2015

“Small- to middle-market (healthcare) organizations are at greater risk for data breach, as they have limited security and privacy processes, personnel, technology, and budgets compared to their enterprise or large corporate counterparts.”

2015 Annual Benchmark Study on Privacy and Security of Healthcare Data, Ponemon Institute

Page 12: Webinar: CYREN WebSecurity for Healthcare

12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Poll Question #2

What Web security concerns do you have? (Select All that Apply)1. Clinicians connecting to unsecured networks2. Phishing attacks3. Enforcing compliance policy on browsing4. Maintaining patient data privacy (HIPAA)5. Security for patient/visitor WiFi

Page 13: Webinar: CYREN WebSecurity for Healthcare

13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 13

Healthcare Threat Vectors

Page 14: Webinar: CYREN WebSecurity for Healthcare

14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Phishing Continues to Grow in Popularity

Source: CYREN Cyber Threat Q1 Report, April 2015

Page 15: Webinar: CYREN WebSecurity for Healthcare

15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Android Is the Fastest-Growing Target for Malware

Source: CYREN Cyber Threat Q1 Report, April 2015

Page 16: Webinar: CYREN WebSecurity for Healthcare

16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Poll Question #3

What security technology do you use today? (Select All that Apply)1. Firewall with Content Filtering2. Unified Threat Management (UTM) appliance3. Next Generation Firewall (NGFW) appliance4. Secure Web Gateway (SWG) appliance5. Cloud-based Web security

Page 17: Webinar: CYREN WebSecurity for Healthcare

17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Healthcare Security is Trapped in a Legacy Approach

Load Balancer

Edge FirewallServer–Side SSL Tunnel

Aggregation firewall

Client - side SSL tunnel

Sandbox SSLWeb Filter

Logfiles

Flow Management Content Inspection

SSLSSL

SSL

PAC File

SSL

SSL

This approach was defined for a 1990s computing model – centralized and static

Page 18: Webinar: CYREN WebSecurity for Healthcare

18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

TCO

We Need a Modern Solution to Modern Threats

Security Roaming

Page 19: Webinar: CYREN WebSecurity for Healthcare

19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

APPLICATIONPolicy, Enforcement, Logging, Alerting, Reporting

ANALYSISRPD, Heuristics, Signature, Sand box, Human, etc.

THREAT DATA17 BILLION transactions per day

ENDPOINTS500 THOUSAND points of presence, protecting 600 MILLION users

SECURITYApplied

Cyber Intelligence

INSIGHTCyber Intelligence

Pre-Compromise Compromise Post-Compromise

Reconnaissance Weaponization Delivery Exploitation Installation Command & Control

Actions on Target

Helping Enterprises Disruptthe Cyber Kill Chain

Applied Cyber Intelligence is the Answer

Page 20: Webinar: CYREN WebSecurity for Healthcare

20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

The fastest, best protection, from the brand the security industry trusts

The Cyber Intelligence that protects 600+ Million global users today

Cloud economics and ease of use combine for the lowest Total Cost of Ownership

Your security scales with you, no matter how big or complex your infrastructure becomes

A total security solution for office-based, remote, roaming, and corporate IoT devices

Protection for users and for Public/Guest WiFi networks

CYREN WebSecurity Is Applied Cyber Intelligence

Page 21: Webinar: CYREN WebSecurity for Healthcare

21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. © 2014 CYREN Confidential and Proprietary 21

Mobile App

Consumer Cloud

Private Cloud

Blocking Threats Enforcing Compliance

Cloud AppPublic Cloud

Analyzing Web Traffic Applying Cyber Intelligence

BotExploits APT

Malware

Roaming HomeOn Call Wearables/IoTPCP MobileHospital Clinic

The Best Web Security for Healthcare

Page 22: Webinar: CYREN WebSecurity for Healthcare

22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Zero-Hour Phishing

Faster Detection Means Better Protection

Compliance / ProductivityZero-Hour Malware

“CYREN consistently demonstrates the best performance; detecting new phishing attacks faster than others, and providing unique detection of many attacks.” Greg Ogorek, Sr. Director, Cyber Security Operations, Cyveillance

Applied Cyber Intelligence Disrupts the Cyber Kill Chain and Boosts Productivity

Page 23: Webinar: CYREN WebSecurity for Healthcare

23©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Malware Trends and Detection Speed

Malware Emails Malware URLs Zero-hourMalwaredetection

Page 24: Webinar: CYREN WebSecurity for Healthcare

24©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

No capital expense for hardware or software

Eliminates the cost and complexity of multiple appliances

Up-to-the-moment applied cyber intelligence

Simple to deploy, easy to administer - centralized or distributed

Scales and moves with you

The Lowest Total Cost of Ownership (TCO)Cloud-based Web Security as a Service drives down your cost

Page 25: Webinar: CYREN WebSecurity for Healthcare

25©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Simple deployment options

No backhaul for branch locations and remote workers

Policy enforcement and protection for up to 5 devices per user

Protect networks, notebooks, tablets and smartphones

Flexible controls for BYOD and corporate devices

No discernible impact compliant browsing experience

Secure Internet connectivity for IoT/wearables

Security and compliance public/guest WiFi networks

The Best Solution for Roaming and RemoteDesigned for modern business computing

Page 26: Webinar: CYREN WebSecurity for Healthcare

26©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Healthcare technology use has transformed, creating gaps in security

Cyber criminals are systematically targeting these gaps

The legacy, hardware-driven approach to Web security is inadequate to close them

21st Century threats require a 21st Century solution with fast, accurate protection

CYREN WebSecurity is that solution

Summary

Page 27: Webinar: CYREN WebSecurity for Healthcare

27©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

You can also find us here:

www.CYREN.com

twitter.com/cyreninc

linkedin.com/company/cyren

©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.

Thank You. Any Questions or Thoughts?

Chris TaylorCYREN Marketing+1 [email protected]