A New Approach to Healthcare Security

| December 12, 2017

article image
Electronic patient care and health insurance systems contain millions of valuable records, making them an attractive target for intruders seeking to mine sensitive information. The FBI estimates that each health record is worth $50. Some sources quote even more, upwards of $200. More than 80 percent of healthcare Chief Information Ofcers (CIOs), Chief Technology Ofcers (CTOs), and other security leaders polled by KPMG say their organizations have been victimized by at least one cyber attack in the past two years—and many still feel like sitting ducks. The reality for most healthcare CIOs and Chief Information Security Ofcers (CISOs) is this: today, it is not a question of if, but rather when, their systems will be attacked.

Spotlight

Securonix

Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management.

OTHER ARTICLES

8 reasons to consider hyperconverged infrastructure for your data center

Article | March 1, 2020

Demand for on-premises data center equipment is shrinking as organizations move workloads to the cloud. But on-prem is far from dead, and one segment that’s thriving is hyperconverged infrastructure (HCI). HCI is a form of scale-out, software-integrated infrastructure that applies a modular approach to compute, network and storage capacity. Rather than silos with specialized hardware, HCI leverages distributed, horizontal blocks of commodity hardware and delivers a single-pane dashboard for reporting and management. Form factors vary: Enterprises can choose to deploy hardware-agnostic hyperconvergence software from vendors such as Nutanix and VMware, or an integrated HCI appliance from vendors such as HP Enterprise, Dell, Cisco, and Lenovo.

Read More

Can AI bring down network energy costs?

Article | February 25, 2020

Data volumes in mobile networks are increasing at an unprecedented rate. In our latest mobility report, we forecast that mobile data traffic will grow fourfold by 2025, reaching up to 160 exabytes (EB) per month. This is amazing of course and offers all kinds of opportunities for communications service providers, but there is also a potential downside to this rapid surge in data traffic: its impact on the energy consumption and carbon footprint of mobile networks. That’s not the only downside for communications service providers, as it also raises a significant cost concern. The energy consumption of today’s networks accounts for 10 percent of annual operation expenditure (OPEX). As we found in our AI report, the demand to reduce operational costs already ranks among the top priorities for today’s operators. With the deployment of 5G and a spike in data traffic forecast, suddenly this demand becomes even more relevant.

Read More

Successful Cloud Migrations Made Easy

Article | March 16, 2020

TransAlta, an energy producer with gas, hydro, solar, wind, and coal facilities across the U.S., Canada, and Australia, leveraged data virtualization with the company’s cloud strategy. A few years ago, TransAlta decided to move 100% of its data to the cloud. The company centralized its data to reduce infrastructure, simplify data access, and scale storage. The biggest hidden challenge many companies face when trying to be completely cloud based is connecting the applications they accumulate over time. Whether they were developed and configured for on-premises environments, have specific security requirements, or are too old and complex to connect to data in the cloud, this presents a challenge.

Read More

Getting Above the Silos: The Rise of the Logical Data Fabric

Article | April 2, 2020

With so much valuable data potentially available, it can be frustrating for organizations to discover that they can’t easily work with it because it’s stuck in disconnected silos. Limited data access is a problem when organizations need timely, complete views of all relevant data about customers, supply chains, business performance, public health, and more, to make informed decisions. We need only look at the current COVID-19 pandemic to understand the importance of being able to view and share data across silos. One of the hottest topics in data architecture right now is data fabric. The notion of a data fabric is becoming important as organizations put more data in multiple cloud-based storage platforms, which can add to existing on-premises data silo problems. TDWI research finds that disconnected data silos are one of the biggest obstacles organizations face as they try to enable faster data insights. In the industry, “data fabric” is variously called an architecture, a framework – and of course, a fabric. With data fabric, adherents aim to provide a more universal and holistic approach to integrating diverse components of physically distributed data environments. Ideally, a data fabric will use services to integrate the necessary components so that data flows more easily and users and applications do not have to use specialized code to access each data silo.

Read More

Spotlight

Securonix

Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management.

Events