Medigate and Palo Alto Networks Integration

Similar documents
THE ACCENTURE CYBER DEFENSE SOLUTION

BUILDING A NEXT-GENERATION FIREWALL

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

AKAMAI CLOUD SECURITY SOLUTIONS

Designated Cyber Security Protection Solution for Medical Devices

RiskSense Attack Surface Validation for IoT Systems

Infoblox as Part of the Ecosystem

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

McAfee epolicy Orchestrator

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

Security. Made Smarter.

Manufacturing security: Bridging the gap between IT and OT

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Agile Security Solutions

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

PALANTIR CYBERMESH INTRODUCTION

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

ForeScout Extended Module for Palo Alto Networks Next Generation Firewall

A New Security Model for the IoE World. Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE.

ForeScout Extended Module for Carbon Black

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Go mobile. Stay in control.

A Modern Framework for Network Security in Government

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

McAfee Advanced Threat Defense

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Aerohive and IntelliGO End-to-End Security for devices on your network

FIREWALL BEST PRACTICES TO BLOCK

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Cisco Firepower NGFW. Anticipate, block, and respond to threats

APP-ID. A foundation for visibility and control in the Palo Alto Networks Security Platform

Cisco Start. IT solutions designed to propel your business

Secure Access & SWIFT Customer Security Controls Framework

THREAT REPORT Medical Devices

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations

8 Must Have. Features for Risk-Based Vulnerability Management and More

Addressing Cybersecurity in Infusion Devices

A Comprehensive CyberSecurity Policy

Build Your Zero Trust Security Strategy With Microsegmentation

McAfee Endpoint Threat Defense and Response Family

AlgoSec. Managing Security at the Speed of Business. AlgoSec.com

Automating the Top 20 CIS Critical Security Controls

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Securing Your Amazon Web Services Virtual Networks

Tenable for Palo Alto Networks

Deception: Deceiving the Attackers Step by Step

HEALTHCARE IT NETWORK SURVEY REPORT

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

5 Steps to Government IT Modernization

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

SIEMLESS THREAT DETECTION FOR AWS

IMPLEMENTING A SOLUTION FOR ASSURING KEYS AND CERTIFICATES

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

TRUE SECURITY-AS-A-SERVICE

Office 365 Buyers Guide: Best Practices for Securing Office 365

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

align security instill confidence

CyberFence Protection for DNP3

Ensuring a Consistent Security Perimeter with CloudGenix AppFabric

One Hospital s Cybersecurity Journey

The Top 6 WAF Essentials to Achieve Application Security Efficacy

How Vectra Cognito enables the implementation of an adaptive security architecture

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Paloalto Networks PCNSA EXAM

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

The Cognito automated threat detection and response platform

Kaspersky Security Network

Crash course in Azure Active Directory

Vulnerability Assessments and Penetration Testing

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

CyberEdge Group 2018 Cyberthreat Defense Report

An Investment Checklist

Xerox and Cisco Identity Services Engine (ISE) White Paper

OSSIR. 8 Novembre 2005

Virtualizing Networks:

SIEM Solutions from McAfee

HIPAA Regulatory Compliance

Cognito Detect is the most powerful way to find and stop cyberattackers in real time

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

Outnumbered, but not outsmarted A 2-step solution to protect IoT and mobile devices

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

THE EVOLUTION OF SIEM

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Transcription:

Medigate and Palo Alto Networks Integration A Superior Security Solution for Connected Medical Devices Medigate and Palo Alto Networks have teamed together to deliver a best-in-class solution that addresses the security risks generated by connecting medical devices to clinical networks. Features Fingerprint connected medical devices with granular detail Tag devices to easily set rule-based security policies Automated rule-based, clinically-driven security policies Benefits Identify and manage connected medical devices security Mitigate security flaws and reduce risk of successful cyberattack Prevent infected medical devices from compromising other systems

Securing medical devices is a multi-faceted problem which is why it has proven difficult for the industry to solve. Protecting the Invisible: Securing medical devices requires detailed knowledge of each manufacturer and their proprietary protocols, and a comprehensive understanding of medical workflows. Without such knowledge, a security solution cannot accurately identify a device and indicate an out-of-scope activity. The diversity of device types, manufacturers, operating systems, software versions and protocols render standard NAC or firewall solutions inefficient and make achieving full visibility a true challenge. Moreover, many medical devices were not designed to be network-managed and cannot be secured by end-point security solutions, further handicapping traditional security solutions ability to identify and secure them. Managing the Undetected: Equally challenging to fingerprinting connected medical devices, is the clinical domain expertise needed to detect devices suspicious behavior. Only a deep understanding of both clinically valid workflows and medical device protocols, stemming from meticulous research of device communications, can result in efficient detection of suspicious network behavior of medical devices. Without clinical expertise, security solutions cannot prioritize risks and contribute to providers risk management plans. Informed Protection: Hospitals rely on firewalls, NACs and generic IoT security solutions to protect their networks. These security solutions are indeed a necessity, but unfortunately, insufficient on their own in dealing with the complexity and diversity of medical devices. By integrating these existing IoT security products with a dedicated medical device security platform that enriching them with accurate device identification and clinical anomaly detection, providers can achieve a well-rounded protection strategy for their networks. Taking Action Through Integration Medigate s Medical Device Security Platform and Palo Alto Networks Next-Generation Security Platform share user, device and application information to protect medical devices by only allowing communications designated in the scope defined in the manufacturer s protocol. Coupling Medigate s innovative security solution for the Internet of Medical Things (IoMT) and Palo Alto Networks proven Next-Generation Firewall (NGFW) capabilities provides healthcare delivery organizations with comprehensive clinical network cybersecurity while leveraging their Palo Alto Networks firewall investment. Medigate s physical appliance is easily installed and integrated onsite with Palo Alto Networks Next-Generation Firewalls. It then analyzes network traffic, identifies connected medical devices and enriches the Palo Alto Networks firewall to enable efficient, clinically-informed security policies.

How It Works CLIENT CLIENT CLIENT CLIENT Palo Alto Networks Next-Generation Firewall INTEGRATION ENGINE EMR PACS ROUTER NETWORK TAP NETWORK TAP DEPARTMENT A DEPARTMENT B The process begins with enhanced visibility of all medical devices on the network. Once identified, Medigate s platform matches every device s IP with tags based on its type, vendor and model. It then transfers the tag-to-ip matching to the firewall through Palo Alto Networks API. Medigate s accurate tagging and classification then enable the creation of rule-based, clinicallydriven security policies, which only allows approved traffic. Additionally, Medigate s platform detects both network and security anomalies, generating alerts for version control, vulnerabilities, security issues, changes, and much more. Leveraging Medigate s knowledge of clinical domain applications and Palo Alto Networks unparalleled traffic control ability, the integrated solution can automatically create detailed, zero-trust policies based on network communications The tagging mechanism opens a whole new domain of security policy management capabilities for healthcare providers. Previously, firewall rules had to rely on network zones and IP addresses and ranges. Tagging devices based on functionality and vendor adds new levels of granularity, enabling far more specific policies. Furthermore, Medigate monitors changes in devices network properties such as IP addresses and software versions and incorporates them to update tags continuously.

Medigate s unparalleled clinical domain expertise can be applied by Palo Alto Networks Next Generation Security Platform in four ways: 1 2 3 4 Zone Authorize and block access between network zones tailored to device types (e.g. restrict medical device access to Internet zone). Tag-to-Tag Authorize connections between specific devices, such as an MRI device and its dedicated imaging server, while blocking all communication out of manufacturer scope. Port Leverage Medigate s clinical domain expertise to control a device s authorized ports and enforce only vendor-approved communications. Protocol Reach the deepest level of network traffic inspection, authorizing only proprietary device protocols and block threatening communication methods. For example, providers can deny the access of a device tagged as an MRI to the Internet or other network zones in their clinical network. They may also allow it to communicate only with its dedicated imaging server. Moreover, the Port and Protocol features allows to control not only with which devices the MRI could communicate, but ensure it communicates only in pre-defined ports and proprietary protocols set by the manufacturer. As such, the MRI could communicate with its imaging server in DICOM protocol, while SMB packets will be intercepted. Exemplary Enforcement Policy Set-up 1 CLIENT CLIENT 1 Medigate identifies connected medical devices. 2 2 Medigate adds type and vendor tags to each device and sends the information to PAN firewall. 5 Palo Alto Networks Next-Generation Firewall ROUTER 3 4 PACS 3 A security policy is set in the firewall automatically by Medigate to allow the MRI to communicate only with the PACS. Additionally, rules are added to deny communication to the internet. 4 The MRI successfully manages to connect to the PACS. NETWORK TAP 5 A forbidden connection attempt from the MRI to the internet is blocked. MRI

A Security Solution for Today s Healthcare Cyberthreats Understanding what s on the network is first step to protecting it. To secure clinical networks require special understanding of medical workflow and unique consideration for identifying, detecting and preventing attacks on medical devices specifically. Medigate s Medical Device Security Platform integrated with Palo Alto Networks Next-Generation Security Platform provides the most effective approach. With integrated core security capabilities and flexible segmentation based on application identification (via App-ID) and user identification (via User-ID), healthcare organizations can support their ever-expanding internet of medical things, effectively mitigate many of the threats facing their devices, all while maintaining the high quality of care patients expect. Next Step Contact your local Palo Alto Networks or Medigate sales representative to schedule a demo today and discover how the joint solution can provide a new level of security for your IoMT. About Medigate Medigate provides the industry s first and leading dedicated medical device security platform, enabling providers to deliver secure, connected care. Only Medigate fuses the knowledge and understanding of medical workflow and device identity and protocols with the reality of today s cybersecurity threats. With Medigate, you can more safely operate all medical devices on your network, enabling you to deploy existing and new devices to patients while ensuring their privacy and safety. About Palo Alto Networks We are the global cybersecurity leader, known for always challenging the security status quo. Our mission is to protect our way of life in the digital age by preventing successful cyberattacks. This has given us the privilege of safely enabling tens of thousands of organizations and their customers. Our pioneering Security Operating Platform emboldens their digital transformation with continuous innovation that seizes the latest breakthroughs in security, automation, and analytics. By delivering a true platform and empowering a growing ecosystem of change-makers like us, we provide highly effective and innovative cybersecurity across clouds, networks, and mobile devices.