Webinar: CYREN WebSecurity for Healthcare
-
Upload
cyren -
Category
Technology
-
view
50 -
download
1
Transcript of Webinar: CYREN WebSecurity for Healthcare
1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Achieving Effective Cyber Security for Healthcare
Chris Taylor, Sr. Director, Product and Marketing
2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
About CYREN
THE BEST KEPT SECRET IN INFORMATION SECURITY FOR MORE THAN A DECADE
Founded in 1991, CYREN (NASDAQ and TASE: CYRN) is a long-time innovator of cyber intelligence solutions. CYREN provides web, email, endpoint, and roaming cybersecurity solutions that are relied upon by the world’s largest IT companies to protect them and the billions of customers they serve from today’s advanced threats.
2©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Powers the World’s Security
Our Cyber Intelligence forms the security foundation of many of the world’s largest and most influential information technology and Internet security brands.
4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN by the Numbers
The Best Data Delivers the Best Protection
5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 5
The Changing Security Landscape for Healthcare
6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
New Technology Is Transforming HealthcareDriven by the need for better patient outcomes and cost reduction
Philips HealthTech Trends, 2015
7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
New Technology Is Transforming HealthcareDriven by the need for better patient outcomes and cost reduction
Philips HealthTech Trends, 2015
8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question #1
Which technologies have you implemented? (Select All that Apply)1. Mobile (tablet/laptop/smartphone) devices for clinicians2. Electronic Health/Medical Record (EHR/EMR) platform3. Electronic Document Management4. Moving data and/or applications to the Cloud5. Wireless wearable patient monitors?
9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
New Technology Creates Security Challenges
Scarcity of security resources
Additional use of local and personal devices
Hassle of basic security measures
Lagging security governance
10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Today’s Healthcare Security Headlines
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
What the Analysts Say…“The expanding number of access points to Protected Health Information (PHI) and other sensitive data via electronic medical records and the growing popularity of wearable technology makes the healthcare industry a vulnerable and attractive target for cybercriminals. Several factors suggest the healthcare industry will continue to be plagued with data breach headlines in 2015.”
2015 Annual Data Breach Industry Forecast, Experian
“A series of recent high-profile security failures shows that many healthcare delivery organizations' current practices and controls remain inadequate. Gartner's guidelines will help CIOs keep their organizations safe to facilitate safe participation in digital business.
Healthcare Delivery Organizations Will Need Stronger Security to Participate in Digital Business, Gartner, 2015
“Small- to middle-market (healthcare) organizations are at greater risk for data breach, as they have limited security and privacy processes, personnel, technology, and budgets compared to their enterprise or large corporate counterparts.”
2015 Annual Benchmark Study on Privacy and Security of Healthcare Data, Ponemon Institute
12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question #2
What Web security concerns do you have? (Select All that Apply)1. Clinicians connecting to unsecured networks2. Phishing attacks3. Enforcing compliance policy on browsing4. Maintaining patient data privacy (HIPAA)5. Security for patient/visitor WiFi
13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 13
Healthcare Threat Vectors
14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Phishing Continues to Grow in Popularity
Source: CYREN Cyber Threat Q1 Report, April 2015
15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Android Is the Fastest-Growing Target for Malware
Source: CYREN Cyber Threat Q1 Report, April 2015
16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Poll Question #3
What security technology do you use today? (Select All that Apply)1. Firewall with Content Filtering2. Unified Threat Management (UTM) appliance3. Next Generation Firewall (NGFW) appliance4. Secure Web Gateway (SWG) appliance5. Cloud-based Web security
17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Healthcare Security is Trapped in a Legacy Approach
Load Balancer
Edge FirewallServer–Side SSL Tunnel
Aggregation firewall
Client - side SSL tunnel
Sandbox SSLWeb Filter
Logfiles
Flow Management Content Inspection
SSLSSL
SSL
PAC File
SSL
SSL
This approach was defined for a 1990s computing model – centralized and static
18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
TCO
We Need a Modern Solution to Modern Threats
Security Roaming
19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
APPLICATIONPolicy, Enforcement, Logging, Alerting, Reporting
ANALYSISRPD, Heuristics, Signature, Sand box, Human, etc.
THREAT DATA17 BILLION transactions per day
ENDPOINTS500 THOUSAND points of presence, protecting 600 MILLION users
SECURITYApplied
Cyber Intelligence
INSIGHTCyber Intelligence
Pre-Compromise Compromise Post-Compromise
Reconnaissance Weaponization Delivery Exploitation Installation Command & Control
Actions on Target
Helping Enterprises Disruptthe Cyber Kill Chain
Applied Cyber Intelligence is the Answer
20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
The fastest, best protection, from the brand the security industry trusts
The Cyber Intelligence that protects 600+ Million global users today
Cloud economics and ease of use combine for the lowest Total Cost of Ownership
Your security scales with you, no matter how big or complex your infrastructure becomes
A total security solution for office-based, remote, roaming, and corporate IoT devices
Protection for users and for Public/Guest WiFi networks
CYREN WebSecurity Is Applied Cyber Intelligence
21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. © 2014 CYREN Confidential and Proprietary 21
Mobile App
Consumer Cloud
Private Cloud
Blocking Threats Enforcing Compliance
Cloud AppPublic Cloud
Analyzing Web Traffic Applying Cyber Intelligence
BotExploits APT
Malware
Roaming HomeOn Call Wearables/IoTPCP MobileHospital Clinic
The Best Web Security for Healthcare
22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Zero-Hour Phishing
Faster Detection Means Better Protection
Compliance / ProductivityZero-Hour Malware
“CYREN consistently demonstrates the best performance; detecting new phishing attacks faster than others, and providing unique detection of many attacks.” Greg Ogorek, Sr. Director, Cyber Security Operations, Cyveillance
Applied Cyber Intelligence Disrupts the Cyber Kill Chain and Boosts Productivity
23©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Malware Trends and Detection Speed
Malware Emails Malware URLs Zero-hourMalwaredetection
24©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
No capital expense for hardware or software
Eliminates the cost and complexity of multiple appliances
Up-to-the-moment applied cyber intelligence
Simple to deploy, easy to administer - centralized or distributed
Scales and moves with you
The Lowest Total Cost of Ownership (TCO)Cloud-based Web Security as a Service drives down your cost
25©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Simple deployment options
No backhaul for branch locations and remote workers
Policy enforcement and protection for up to 5 devices per user
Protect networks, notebooks, tablets and smartphones
Flexible controls for BYOD and corporate devices
No discernible impact compliant browsing experience
Secure Internet connectivity for IoT/wearables
Security and compliance public/guest WiFi networks
The Best Solution for Roaming and RemoteDesigned for modern business computing
26©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Healthcare technology use has transformed, creating gaps in security
Cyber criminals are systematically targeting these gaps
The legacy, hardware-driven approach to Web security is inadequate to close them
21st Century threats require a 21st Century solution with fast, accurate protection
CYREN WebSecurity is that solution
Summary
27©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Thank You. Any Questions or Thoughts?
Chris TaylorCYREN Marketing+1 [email protected]