Medigate has been talking with the industry for more than a year about the importance of bringing manufacturers, EMRs, providers, and cybersecurity vendors together to solve the device security challenge. The roles have traditionally been silo’d but as more devices are connected to the network, the silos are slowly breaking down and new relationships are being forged to protect patients and hospitals from cyberattacks through their vulnerable medical devices.
I was excited to see Cerner’s post today. We share similar visions for the market. As a leader in the industry, they have spent the last 40 years connecting people and systems within the healthcare industry. As a new comer, we share in their mantra, “work for today and think for tomorrow,”. We have dedicated ourselves to helping healthcare delivery organizations (HDOs) discover, manage and protect their operations from today’s attacks and tomorrow’s threats.
The Medigate platform can continuously, unobtrusively monitor network activity to create a current, detailed medical and IoT device inventory for the clinical network. As soon as something connects, it will be identified and analyzed. With the biggest medical and IoT device signature database in the industry, we are able to not only uncover a device’s technical attributes, including its operating system (OS), manufacturer, model, and serial number, but also its location and utilization.
We also determine how the device fits within clinical workflows and its manufacturer-intended communication patterns on the clinical network, so we know which behavior is normal, and which isn’t, so we can quickly flag anything that may need to be looked at more closely. All of which can be used to optimize the security, procurement, patching and maintenance of these devices.
Because of the in-depth visibility and clinical workflows the Medigate platform delivers, it is easy to identify potential security risks and ensure an appropriate response to effectively protect the integrity and privacy of the clinical network. Policies and segmentation designed to limit an HDO’s exposure to risk can be implemented, based on the attributes and function of the device, which is extremely precise and effective.
Given our focus on HDO’s, the insights we provide into clinical networks make it easy to improve the efficiency and security of existing IT and biomed infrastructures. We can ensure appropriate remediation, using most NAC, firewall, security incident and event management (SIEM), vulnerability management and network administration products, as well as market-leading clinical asset management systems (CMMS), to mitigate threats and keep the delivery of patient care safe.
By quickly identifying anomalous device communications and behaviors that could be indicative of an attack and providing pre-defined, clinical-based policy enforcement, micro-segmentation, and other enforcement integrations, we can immediately address risks to minimize attack impacts and strengthen the HDO’s security stance.
As we continue down this era of connected healthcare technology, it will be extremely important that HDO’s have visibility and control over what’s going on in their clinical network.
We are excited to see Cerner entering the space. It’s another piece of the puzzle to help HDOs protect their ongoing operations and patient care. For more information, please read Cerner’s blog post: Protect your medical devices from cyber threats.