AlienVault Unified Security Management™ (USM) helps you simplify and accelerate HIPAA compliance with a full set of essential security capabilities all built into one complete solution.
Traditional SIEM products aren’t sufficient for meeting HIPAA compliance requirements and keeping up with today’s changing cyber security landscape. They’re costly, complex, and take too long to deploy.
AlienVault USM™, with its unique unified approach, delivers a more comprehensive solution that costs less and delivers results in significantly less time.
AlienVault USM provides you with the functionality you need to measure HIPAA compliance, in a single platform:
IT teams of all sizes suffer from too much log data and not enough threat intelligence, as security tools generate a steady stream of alerts about important (and not so important) activity. Without deep security expertise you are then required to conduct research into each alarm to understand the significance of each alarm and what to do about it.
AlienVault USM’s integrated threat intelligence from AlienVault Labs eliminates the need for you to spend precious time conducting your own research. The AlienVault Labs team regularly delivers threat intelligence as a coordinated set of advanced correlation rules and product updates, including up-to-the-minute guidance on emerging threats and context-specific response advice, which accelerates and simplifies threat detection and remediation.
According to the Identity Theft Resource Center, healthcare organizations suffered 42.5% of breaches identified in 2014. It’s impossible to stop a dedicated, patient attacker from penetrating even the most secure network. Therefore, it’s essential to detect and respond to attacks as quickly as possible.
At AlienVault, we help healthcare organizations of all sizes achieve world-class threat detection and incident response without the headaches and huge expense of other solutions. Our unified approach puts hours back in your day with automated threat detection and integrated threat intelligence that eliminate manual, time-consuming log analysis and threat research.
AlienVault USM has helped healthcare organizations like Shriners Hospitals, Kaiser Permanente and Novo Nordisk accomplish these key tasks:
HIPAA Standard § 164.312(b) — Audit Controls states that you must “Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.” AlienVault USM is updated regularly with new compliance reports as these regulatory standards evolve, greatly reducing the time required to assess HIPAA compliance. In addition, USM’s intuitive reporting interface simplifies adherence to this standard with its easy-to-use interface and integrated scheduling functionality.
HIPAA Compliance Standard § 164.312(c)(2) deals with data integrity and requires that any covered organization “Implement electronic mechanisms to corroborate that electronic protected health information has not been altered or destroyed in an unauthorized manner.”
AlienVault USM helps entities satisfy this requirement by providing File Integrity Monitoring (FIM) on files as well as Windows registry entries and digitally signed audit logs. USM’s FIM feature performs regular audits on files (ePHI, security configuration, or other sensitive files) by comparing its current hash state with a recorded baseline, alerting you to changes to the files makeup as well as permissions, file owner, and last modified time.
To ensure that the logs themselves have not been tampered with, AlienVault USM includes a mechanism to validate the authenticity of stored logs by digitally signing them at the block or line level. This confirms that your logs have remained unaltered while stored in the USM logger and allows for them to be admissible in a court of law.
§164.308 – Risk AnalysisConduct an accurate assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI.
|Learn more about Risk Analysis|
§164.308 – Information System Activity ReviewImplement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
|Learn more about Information System Activity Review|
§164.308 – Access Authorization, Establishment, and ModificationImplement policies and procedures that grant, establish, document, review, and modify a user’s access to assets.
|Learn more about Access Authorization, Establishment, and Modification|
§164.308 – Log-in MonitoringProcedures for monitoring log-in attempts and reporting discrepancies.
|Learn more about Log-in Monitoring|
§164.308 – Protection from Malicious SoftwareProcedures for guarding against, detecting, and reporting malicious software.
|Learn more about Protection from Malicious Software|
§164.308 – Password ManagementProcedures for creating, changing, and safeguarding passwords.
|Learn more about Password Management|
§164.308 – Security Incident Response and ReportingIdentify and respond to suspected or known security incidents; mitigate harmful effects of known security incidents and document security incidents and their outcomes.
|Learn more about Security Incident Response and Reporting|
§164.310 – Device and Media ControlsImplement policies and procedures that govern the receipt and removal of hardware and electronic media that contain ePHI.
|Learn more about Device and Media Controls|
§164.312 – Encryption and DecryptionImplement a mechanism to encrypt and decrypt ePHI.
|Learn more about Encryption and Decryption|