Risk
1/23/2013
01:55 PM
Paul Cerrato
Paul Cerrato
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Is Mobile Device Management The Answer?

MDM software is being considered by healthcare IT execs concerned about security.

InformationWeek Green - Jan. 28, 2013
InformationWeek Green
Download the entire February 2013 issue of InformationWeek Healthcare, distributed in an all-digital format as part of our Green Initiative
(Registration required.)


Of all the issues that keep health IT managers awake at night, it's hard to find one more vexing than mobile device management. A recent survey of healthcare providers makes the angst obvious.

Security and management concerns are top of mind for many healthcare organizations, according to a recent KLAS report. In the study, "Mobile Healthcare Applications: Can Enterprise Vendors Keep Up?" 105 respondents, most of them C-level executives, said that securing personal devices via MDM software is one of their top concerns.

When the execs were asked what their organizations are looking to do to secure personal devices used at work, their No. 1 response was data encryption. MDM was No. 2, which is promising, says Eric Westerlind, the report's author.

"[Providers] are concerned with making sure tablets are secure, and it's difficult because it's a personal device," Westerlind says. "Whatever they install can't be too intrusive, and sometimes that can be an issue with MDM. But when you're dealing with patient information, anything that contains data covered by HIPAA needs to be secured, and those devices need to be able to be wiped clean."

Devices More Secure

Ken Kleinberg, a health IT consultant with the Advisory Board, points out that the operating systems of mobile devices have more robust security features than the legacy Windows systems found in hospitals. But he emphasizes that hospitals need to implement strong bring-your-own-device security policies, including mobile application management tools. "It's not just that you're going to control the configuration on the device. You're also going to control what application can be loaded on that device," Kleinberg says.

A hospital's IT organization can give doctors a list of the applications it has vetted, he notes. If a doctor wants to use a document reader, for instance, the hospital might suggest one. If he wants to use a dosing calculator, it might suggest three apps and make them available on its application server.

 Beth Israel Deaconess Medical Center CIO, Dr. John Halamka
Halamka enforces security policies via Exchange ActiveSync

The Policy Approach

During interviews with several IT pros, it became obvious that when it comes to MDM, one size doesn't fit all. For instance, rather than choose an MDM product, Beth Israel Deaconess Medical Center has for now "settled on enforcing tight security policies through Exchange ActiveSync," says BIDMC's CIO, Dr. John Halamka.

"It is highly likely we are capturing most, if not all, BYODs that access BIDMC resources, as email is by far the most frequently used application," Halamka says. "We really don't have other applications that have been customized to run on smartphones and tablets. Our applications are native to the Web, so the ability to install and manage mobile applications is not something we've encountered as a problem yet."

For those healthcare providers that do require native mobile apps for their physicians, several vendors offer MDM platforms to address security threats.

Bob DeLisa, president of Cooperative Systems, a Connecticut-based IT support and consulting firm, offers some advice on choosing an MDM system. He tells clients to base their decision "on the age and scalability of your current infrastructure." Consider Meraki, for instance, when you're doing an infrastructure upgrade, DeLisa says, and consider server-based products such as those from Good Technology, MobileIron and BoxTone if you've recently upgraded.

He also sees promise in cloud-based MDM products, "mostly because the medical practice will be able to keep up with technology in a proactive manner. " DeLisa notes that the easiest system to administer is usually the most cost-effective. And with so many vendors, "the seesaw battle for features among the top players will be secondary to implementation, training and support," he says.

Some hospitals and practices prefer to custom build their BYOD system, but those that want to go with an MDM product must consider a long list of technical issues:

Our full report on how mobility and BYOD are changing healthcare is free with registration.
This report includes 14 pages of action-oriented analysis. What you'll find:
  • How the "FDA effect" hinders chronic disease apps
  • The types of tablets that doctors are using
Get This And All Our Reports

>> Which mobile operating systems do we need to support?

>> Do we plan to host the MDM system on our network?

>> Which email system do our clinicians use, and will it be compatible with the MDM tool?

>> Will the MDM software enable us to remain HIPAA-compliant?

>> What are the software's lock and wipe capabilities?

>> Will we use the MDM tool to push out other applications that clinicians insist on using to manage patients?

Most of these questions are outlined in the Avema Critical Wireless Buyer's Guide, which Halamka mentioned in a recent email exchange.

George Brenckle, CIO at UMass Memorial Healthcare in Worchester, Mass., takes a different approach to BYOD. He prefers to focus on managing data rather than devices, one reason UMass has switched to a virtual desktop approach. With all of its sensitive patient data on hospital servers, there's no risk of breaches from stolen or lost iPads and laptops.

What about commercial MDM products? Brenckle says the challenge is keeping one step ahead of the rapidly changing mobile device ecosystem. "So you invest in one of these MDM tools and it's working well, and suddenly a new tablet or smartphone comes on the market that the tool isn't equipped to manage," he says.

BYOD isn't going away, because clinicians are in love with their devices. Those devices help them provide better patient care and may even have saved lives. Once you find the right management solution, it will save you some sleepless nights as well.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3580
Published: 2014-12-18
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.

CVE-2014-6076
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2014-6077
Published: 2014-12-18
Cross-site request forgery (CSRF) vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-6078
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 do not have a lockout period after invalid login attempts, which makes it easier for remote attackers to obtain admin access via a brute-force attack.

CVE-2014-6080
Published: 2014-12-18
SQL injection vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.