HIPAA Compliance discussion

Similar documents
Next Generation Authentication

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Welcome! Ready To Secure Access to Your Microsoft Applications?

Duo End User Education Templates

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

How Next Generation Trusted Identities Can Help Transform Your Business

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

LEVEL 3 SM WEB MEETING

Are You Flirting with Risk?

Are You Flirting with Risk?

Cloud sicherung durch Adaptive Multi-factor Authentication

Protect Yourself Against VPN-Based Attacks: Five Do s and Don ts

Modern two-factor authentication: Easy. Affordable. Secure.

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Quick Heal Mobile Device Management. Available on

Two Factor Authentication

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

Key Authentication Considerations for Your Mobile Strategy

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Censornet. CensorNet Unified Security Service (USS) FREEDOM. VISIBILITY. PROTECTION. Lars Gotlieb Regional Manager DACH

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

White Paper How to Get Control of Your Access Management. How to Get Control of Your Access Management.

The Device Has Left the Building

Virtual Machine Encryption Security & Compliance in the Cloud

The Telemedicine Opportunity

SECURING PATIENT DATA

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Secure single sign-on for cloud applications

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

Enterprise Security Solutions by Quick Heal. Seqrite.

Welcome. Security: First Line of Defense. Chris Riley Director x4331

Choosing the right two-factor authentication solution for healthcare

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Adaptive Authentication Adapter for Juniper SSL VPNs. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Streamline IT with Secure Remote Connection and Password Management

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

BIDMC Multi-Factor Authentication Enrollment Guide Table of Contents

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Enterprise Security Solutions by Quick Heal. Seqrite.

Helping Attendees Get Started for Webinars. efile Support Basic QRG

Evaluating Encryption Products

Authentication Options

Maximize your move to Microsoft in the cloud

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Securing Your Salesforce Org: The Human Factor. February 2016 User Group Meeting

Keep the Door Open for Users and Closed to Hackers

Securing Office 365 with MobileIron

The Cloud Meeting Company

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

Paystar Remittance Suite Tokenless Two-Factor Authentication

Security Guide Zoom Video Communications Inc.

2013 InterWorks, Page 1

ips.insight.com/healthcare Identifying mobile security challenges in healthcare

Aerohive and IntelliGO End-to-End Security for devices on your network

GDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED.

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

The First Six Steps to Securing Remote Locations 1

Duo Enrollment for DA Employees

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Dr. Jassine Boulkheir International Sales and Marketing Manager

ManageEngine ADSelfService Plus

Cloud Connect. Gain highly secure, performance-optimized access to third-party public and private cloud providers

How NOT To Get Hacked

SxS Authentication solution. - SXS

Addressing Credential Compromise & Account Takeovers: Bearersensitive. Girish Chiruvolu, Ph.D., CISSP, CISM, MBA ISACA NTX April 19

Certificate Enrollment for the Atlas Platform

BlackBerry 2FA. Datasheet. BlackBerry 2FA

Resilient WAN and Security for Distributed Networks with Cisco Meraki MX

ADC im Cloud - Zeitalter

Duo Security Enrollment Guide

Challenges and. Opportunities. MSPs are Facing in Security

Make security part of your client systems refresh

Multi-Factor Authentication FAQs

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Securing Multiple Mobile Platforms

Help Desk Guide. Originally released June 22, 2016 Revised July 24, 2017

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

SurePassID ServicePass User Guide. SurePassID Authentication Server 2017

Health Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx

Using CSE Cisco Anyconnect with 2FA

Securing Your Most Sensitive Data

A NEW MODEL FOR AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Encrypting PHI for HIPAA Compliance on IBM i. All trademarks and registered trademarks are the property of their respective owners.

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

Part 2: How to Detect Insider Threats

Teradata and Protegrity High-Value Protection for High-Value Data

Enabling Compliance for Physical and Cyber Security in Mobile Devices. Chip Epps & Daniel Bailin HID Global

Transcription:

HIPAA Compliance discussion

GoToWebinar Housekeeping: attendee participation Open and hide your control panel Join audio: Choose Mic & Speakers to use VoIP Choose Telephone and dial using the information provided Submit questions and comments via the Questions panel Note: Today s presentation is being recorded and will be provided within 48 hours. Send questions via Twitter at @duosec and #duotalk

All Breaches Involve Stolen Credentials Strong two-factor authentication stops breaches February 2013

Malware and cybercrime success AV-Test Malware Samples Delaware FINCEN SARs

HIPAA isn t the biggest risk The total economic impact of medical identity theft is $30.9 billion annually, up from $28.6 billion in 2010. Ponemon Institute, Second Annual Survey on Medical Identity Theft. (2011)

HIPAA compliance isn t the easiest task Administrative Physical Technical

Barriers for two-factor success Complex User Enrollment/User management Complex Deployment and Administration Terrible End User Experience Lack of 2nd factor authentication options Expensive (Cost and Time)

Solution: two-factor authentication Something you know + something you have (are/do) Regulatory standard (PCI, HIPAA, FFIEC, CJIS, SOX) and industry best-practice, even for consumer accounts

A nightmare for users and admins Two factors: Cost & Complexity! Customers & users hate Defeated 20-year old tech Phishing email used in RSA breach:

Duo: Making Your First Line of Defense Easy Your User Your System + Duo Security Industry-Leading Security Easy to Deploy: Scale in the cloud Easy to Manage: Users enroll themselves Easy to Use: Your phone is your key

Duo s Mission We do this by... Solve the biggest problems in security today: Account Takeover and Online Fraud. Making security easy and scalable, eliminating the cost and complexity of traditional two-factor solutions Leveraging and securing mobile devices Pro-actively securing your BYOD environment... for enterprise, provider, and consumer web

Easy to Use: Your Phone is Your Key Duo verifies users after their regular login 1 2 3 Using any phone, mobile device, or standard token Duo Push Passcodes SMS Phone call Tokens

Duo s Primary Benefits Intuitive User Experience Friendly, interactive login process Flexible, convenient form factors Customizable user interface Easy Setup & Administration Administrator & developer friendly Simple, fast, self-service user enrollment Affordable, Scalable & Best TCO Mobile security and control 2012 Pay-as-you-grow, free for personal use No hardware requirements, no token overhead Industry-Leading Security Secure by design, externally audited Security is in our DNA

Easy to Deploy - 15 minute setup 1 Sign-up 2 Configure Application

Easy to Manage - users enroll themselves 1 Inline self-enrollment 2 One-click app install

Industry-Leading Security Duo Push: Public key protocol secure by design Out-of-band verification defeats Man-in-the-Middle, Man-in-the- Browser, other endpoint attacks Support for tamper-resistant mobile HSM / secure element BYOD visibility, audit, and control 99.995% availability since 2010

Outlook Web Access

Step 1: primary login

Step 1: primary login

Step 2: Duo login

Online: Duo Push

Online: Duo Push

Online: Duo Push Login Approved

Logged In

Offline: Passcodes

Offline: Passcodes

Offline: Passcodes

Offline: Passcodes

Logged In

royal victorian ear & eye hospital Business Challenge Failed IT audit: lack of two-factor authentication for remote employees Using both webmail and VPN Non tech-savvy user base primarily located in Australia Duo Solution Duo 2FA Cloud Service Citrix Access Gateway and Microsoft Outlook Web Access integrations Auth factors: primarily SMS Employee self-enrollment Results Hosted solution with Citrix and Outlook support made Duo their top pick User base is happy with the solution especially those using Duo Push Administration has been straight-forward. IT department easily handles requests for phone number changes, re-enrollment via email link, and log monitoring

Online Tech Upcoming Events July 30 - How to Achieve Maximum ROI and Patient Satisfaction via EMR Webinar Contact Online Tech Email: contactus@onlinetech.com Phone: 877.740.5028 Web: www.onlinetech.com White Papers: www.onlinetech.com/resources/white-papers

Q&A Thank you for participating in today s webinar! Try Duo Security s solution yourself with a free trial: http://duo.sc/duopricing Download Evaluation Guide for two-factor solutions: http://duo.sc/evalguide Duo Security Diane Sheldon-Ku (734) 418-8623 diane@duosecurity.com InCommon and Duo Security offer affordable campus licenses for phone-based second-factor authentication. Download our white paper: http://duo.sc/duowhitepaper Duo Security's two-factor authentication is easy to integrate and use on a wide variety of systems. They are raising the bar for login security. www.incommon.org/duo http://duo.sc/incommon Steve Weis, computer security expert and creator of the Google Authenticator online account protection.