hitrust cyberaid security program - hitrust alliance · © 2017 hitrust alliance. hitrust cyberaid...

17
© 2017 HITRUST Alliance. HITRUST CyberAid Security Program Extending cyber protections further into the continuum of care

Upload: trinhnguyet

Post on 27-Jul-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

HITRUST CyberAid Security Program

Extending cyber protections further into the continuum of care

Page 2: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

A QUICK OVERVIEW

Page 3: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Page 4: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

4

Patient

HITRUST

TrendMicro

Children’s Health

Community Practices

CyberAid Program

Page 5: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance. TrendMicro for CyberAid

Page 6: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Page 7: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Page 8: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Page 9: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Page 10: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Page 11: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Visit www.HITRUSTAlliance.net for more information

To view our latest documents, visit the Content Spotlight

Page 12: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

REFERENCE SLIDES

Page 13: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Common Questions What types of cyber threats will this address? Trend Micro Cloud Edge and End Point Security offer the combination of a Unified Threat Management (UTM) device that protects your organization’s web and email traffic with comprehensive end point protection for multiple platforms. This solution help combat all threats, including ransomware, malware, viruses, spyware, and bots. Additionally, Cloud Edge has email filtering, URL filtering, Web reputation, firewall, IPS, and VPN capabilities. What percentage of cyber threats will this address? This solution is designed to address a very high percentage of threats. Trend Micro consistently scores among the best in the industry in independent third party tests (see AV Test Performance) while also being a leader in solutions designed for small and mid sized organizations (see SMB Market Leadership).

Page 14: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Common Questions Can this be installed by a non-technician? Yes. The device can also be pre-configured before shipping to make installation even easier. Who should you call if you have an issue? This depends if your organization is participating in the managed service option or not. If you are participating in the managed service option, your certified MSP would be their your point of contact. Otherwise, you would contact your HITRUST/Trend Micro specific resource team. Why are HITRUST and industry organizations doing this? This program was created to help improve security capabilities and maturity for this segment of the industry. Ultimately, the industry as a whole will benefit from this added layer of protection.

Page 15: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Common Questions Why is this approach better than what is existing today? There are a number of significant differences that set this Cyber Aid apart: •  This program combines the security capabilities of an advanced UTM and End Point

solutions for comprehensive layered protection •  Trend Micro Cloud Edge off-loads resource-intensive inspection to the cloud, allowing for

superior performance •  The overall package is designed for small and mid-sized organizations irrespective of their

choice to manage themselves or have the solution managed for them •  The program supports and integrates with the industry IOC sharing program, HITRUST

CTX

Page 16: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Common Questions How will this program help the broader industry? The program helps the entire healthcare ecosystem by reducing cyber risks in a key component of the industry (i.e., smaller organizations), while enabling collection of IOCs that can be shared with the broader industry.

Page 17: HITRUST CyberAid Security Program - HITRUST Alliance · © 2017 HITRUST Alliance. HITRUST CyberAid Security Program ... © 2017 HITRUST Alliance. REFERENCE SLIDES © 2017 HITRUST

© 2017 HITRUST Alliance.

Visit www.HITRUSTAlliance.net for more information

To view our latest documents, visit the Content Spotlight