Interactive Demo

Watch 3-minute video tour

The Perfect Rx for HIPAA Compliance

AlienVault Unified Security Management (USM) provides all the essential security capabilities you need to prepare for your HIPAA audit, quickly and easily – right out of the box.

See below how AlienVault USM helps you cover key HIPAA requirements, or download the HIPAA compliance Solution Brief

Achieve HIPAA compliance fast. Reduce the cost of maintaining it.

Meeting and demonstrating compliance with HIPAA requirements presents a number of operational challenges for covered entities, whose ultimate goal is patient care. So when it comes to protecting the ePHI of those patients, and demonstrating that security controls are in place and working, it’s essential to do this as quickly, efficiently and accurately as possible. That way, the organization can focus on what matters.

Unlike traditional SIEM tools, AlienVault USM platform delivers all of the essential security capabilities you need to be ready for your audit—right out of the box. There is no need for purchasing, deploying, and integrating asset discovery, threat detection, vulnerability assessment, network analysis and reporting tools. Building in the essential security capabilities saves you the time, cost, and complexity of purchasing, configuring, and integrating those disparate data feeds and managing disparate management consoles. All you need to be ready for your audit is “instantly on” when you deploy the solution, and managed via a unified console.

Additionally, AlienVault’s security intelligence capability is backed by global threat research collected and analyzed by the AlienVault Labs and the AlienVault Open Threat Exchange (OTX), which benefits from the shared security intelligence of all of AlienVault’s clients and partners.

AlienVault USM Covers Key HIPAA Requirements

§164.308 – Risk Analysis

Conduct an accurate assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI.
Learn more about Risk Analysis
Relevant USM Capabilities Benefits of Unified Security Management
  • Asset discovery
  • Vulnerability assessment
  • Network intrusion detection (NIDS)
  • Host-based intrusion detection (HIDS)
  • Wireless IDS
  • File integrity monitoring
  • SIEM
  • Risk scoring & analysis
  • Built-in asset discovery, vulnerability assessment, threat detection, behavioral monitoring, and security intelligence—provides a complete picture of your risk posture, within hours of deployment.
  • Accurate and consolidated asset inventories combined with real-time vulnerability assessment data is essential for auditor reviews and assessments.
  • Accelerated audit procedures because integration is already completed—as soon as you install USM.

§164.308 – Information System Activity Review

Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. 
Learn more about Information System Activity Review
Relevant USM Capabilities Benefits of Unified Security Management
  • Vulnerability Assessment
  • Network Intrusion Detection (NIDS)
  • Host-based Intrusion Detection (HIDS)
  • Wireless IDS
  • File Integrity Monitoring
  • SIEM
  • Behavioral Monitoring
  • Log Management
  • Built-in asset discovery, vulnerability assessment, threat detection, behavioral monitoring, and security intelligence— reduces the cost and complexity of compliance.
  • Unified log review and analysis, with triggered alerts for high risk systems (containing ePHI).
  • Customized, action-oriented alerts which tell you exactly what to do, rather than add to the noise.
  • Integrated threat data backed by AlienVault Labs and the Open Threat Exchange.

§164.308 – Access Authorization, Establishment, and Modification

Implement policies and procedures that grant, establish, document, review, and modify a user’s access to assets.
Learn more about Access Authorization, Establishment, and Modification
Relevant USM Capabilities Benefits of Unified Security Management
  • Asset discovery
  • Host-based intrusion detection (NIDS)
  • File integrity monitoring
  • SIEM
  • Automatically discover all ePHI assets via built-in asset discovery—no costly and complicated integration required.
  • Monitor changes to critical files with built-in file integrity monitoring.

§164.308 – Log-in Monitoring 

Procedures for monitoring log-in attempts and reporting discrepancies.
Learn more about Log-in Monitoring
Relevant USM Capabilities Benefits of Unified Security Management
  • Host-based intrusion detection (HIDS)
  • SIEM
  • Built-in HIDS monitors all activity on critical files and systems.
  • Built-in SIEM correlates events that could signal policy violations such as unauthorized logins followed by additional security exposures such as data exfiltration.
  • Unified security management dashboards and reports facilitate audit reviews.

§164.308 – Protection from Malicious Software 

Procedures for guarding against, detecting, and reporting malicious software.
Learn more about Protection from Malicious Software
Relevant USM Capabilities Benefits of Unified Security Management
  • Vulnerability assessment
  • Network intrusion detection (NIDS)
  • Host-based intrusion detection (HIDS)
  • Wireless IDS
  • File integrity monitoring
  • SIEM
  • Behavioral monitoring
  • Built-in vulnerability assessment discovers hosts and applications that may be vulnerable to malware and other exploits.
  • Built-in threat detection (NIDS, HIDS, and Wireless IDS) detects and alerts on potential infections and exposures.
  • Built-in file integrity monitoring alerts on changes to critical files which could signal malicious intent or malware infection.
  • Unified essential security delivers the security intelligence required to respond to and contain malware outbreaks.

§164.308 – Password Management

Procedures for creating, changing, and safeguarding passwords.
Learn more about Password Management
Relevant USM Capabilities Benefits of Unified Security Management
  • Vulnerability assessment
  • Host-based intrusion detection (HIDS)
  • File integrity monitoring
  • SIEM
  • Built-in, automated vulnerability assessment identifies the use of weak and default passwords.
  • Built-in host-based intrusion detection and file integrity monitoring will signal when password files and other critical system files have been modified.
  • Unified security intelligence connects critical, yet related events across systems such as a password change followed by exfiltration of data from the same device.

§164.308 – Security Incident Response and Reporting

Identify and respond to suspected or known security incidents; mitigate harmful effects of known security incidents and document security incidents and their outcomes.
Learn more about Security Incident Response and Reporting
Relevant USM Capabilities Benefits of Unified Security Management
  • Vulnerability assessment
  • Network intrusion detection (NIDS)
  • Host-based intrusion detection (HIDS)
  • Wireless IDS
  • File integrity monitoring
  • SIEM
  • Behavioral monitoring
  • Log management
  • Situational awareness
  • Built-in asset discovery, vulnerability assessment, threat detection, behavioral monitoring, and security intelligence—accelerates the incident response process.
  • Unified log review and analysis, with triggered alerts for high risk systems (containing ePHI).
  • Customized, action-oriented alerts which tell you exactly what to do next when responding to incidents
  • Integrated threat data backed by AlienVault Labs and the Open Threat Exchange.

§164.310 – Device and Media Controls

Implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain ePHI.
Learn more about Device and Media Controls
Relevant USM Capabilities Benefits of Unified Security Management
  • Host-based intrusion detection (HIDS)
  • File integrity monitoring
  • SIEM
  • Built-in HIDS will alert on policy violations such as attempted use of external storage media on critical systems (e.g. USB drives).
  • Built-in file integrity monitoring captures anomalous changes to critical files containing ePHI.
  • Event correlation rules provide the situational awareness needed to identify the potential exfiltration of ePHI.

§164.312 – Encryption and Decryption 

Implement a mechanism to encrypt and decrypt ePHI.
Learn more about Encryption and Decryption
Relevant USM Capabilities Benefits of Unified Security Management
  • Asset discovery
  • Behavioral monitoring
  • Host-based intrusion detection (HIDS)
  • Network intrusion detection (NIDS)
  • Wireless IDS
  • Automatically discover all ePHI assets via built-in asset discovery—no costly and complicated integration required.
  • AlienVault’s USM will detect and alert when encryption or decryption procedures are not implemented correctly.

Next Steps

Test Drive

Free Trial

Download your free 30-day trial
Live Demo

Live Demo

Request a live demo and get your questions answered
Learn More

Learn More

Learn more about AlienVault Unified Security Management
Contact Us

Contact Us

1.855.425.4367
sales@alienvault.com