Beth Israel Medical Center Adds Third Brigade's Server Security
BIDMC is using the host-based firewall module of Third Brigade Deep Security to create zones of trust within its datacenters
December 17, 2008
PRESS RELEASE
Ottawa, ON and Reston, VA December 16, 2008 Third Brigade (www.thirdbrigade.com), experts in server and application protection for dynamic datacenters, today announced that Beth Israel Deaconess Medical Center (BIDMC) has deployed Third Brigade Deep Security for increased protection of patient and hospital data. BIDMC, one of four Boston-area hospitals to standardize on Third Brigade, safeguards the personal and medical data resulting from nearly three quarters of a million patient visits annually.
We believe in defense-in-depth. It is simply good practice, said Mark Olson, manager of IT security at BIDMC. We have network firewalls and IPS, but I am always looking to do more to protect our patient data, so protection on the host server is important to me. Third Brigade has helped us to create a tighter ring of security around our servers.
BIDMC has a reputation of implementing state-of-the-art technologies designed to deliver unparalleled service to its customers. Naturally, protection of critical patient information is of paramount importance. To this end, BIDMC is using the host-based firewall module of Third Brigade Deep Security to create zones of trust within its datacenters. The intrusion detection and prevention capabilities monitor network traffic at the host servers to protect BIDMCs diverse IT environment from attacks on vulnerabilities in operating systems and applications, including legacy web applications.
BIDMC, like all of our customers, understands the importance of proximity when it comes to security, said Wael Mohamed, president and CEO at Third Brigade. The perimeter will always be needed, but as computing resources evolve to virtual and cloud computing environments, security needs to be able to mobilize with those resources, and our server-based technology does exactly that.
BIDMC deployed Third Brigade using a typical 3-stage deployment process: deploy agents, activate detection and then lock down resources using intrusion prevention. Olson also indicated there continues to be a learning curve to determine the proper server configuration and intrusion prevention policy. Legacy web applications and compliance with HIPAA and other audit requirements were noted as reasons for selecting Third Brigades server and application protection system. Olson continued, When it comes down to HIPAA, it is much nicer to be able to say: here are the machines that are able to talk to and get data out of this system. I know that there is no client workstation on the floor that has direct access to this SQL database, and thus access to patient data. I can guarantee it.
About Third Brigade Third Brigade (www.thirdbrigade.com) specializes in server and application protection for dynamic datacenters. Our advanced software and vulnerability response service allows virtual machines and physical servers to become self-defending; safe from the latest online threats. This comprehensive, proven protection helps customers prevent data breaches and business disruptions. It enables compliance, supports operational cost reductions and addresses the dynamic nature of datacenters, including virtualization and consolidation, new service delivery models, or cloud computing. Third Brigade also owns and maintains OSSEC, the Open Source Host Intrusion Detection Project actively used in 50 countries around the world. Third Brigade. Thats control.
Note: Third Brigade, Deep Security Solutions, and the Third Brigade logo are trademarks of Third Brigade, Inc. and may be registered in certain jurisdictions. All other company and product names are trademarks or registered trademarks of their respective owners.
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024