SlideShare a Scribd company logo
1 of 2
Download to read offline
Atris Technology Services
Security Information and Event Management (SIEM)
Why Atris SIEM Service?
•	 Follows HHS OCR recommended best
practices for information technology.
•	 No hardware deployments - start in days, not months.
•	 Integrated monitoring of user activity to identify
careless or malicious insider behavior.
•	 Realize hospital-size functionality but
with the affordability needs of community
clinics and private offices.
•	 A monthly cloud subscription means you
can add/remove functionality as needed
with no configuration required onsite.
•	 Leverage our nearly two decades of proven
technology automation experience.
OCR HIPAA Compliance
Atris SIEM Service provides real-time monitoring, alerting
and reporting of insider threats to Protected Health
Information (PHI). This facilitates the OCR requirement
for IT systems and applications that contain confidential
customer information. IT administrators and security
officers have access to the entire suite of monitoring tools
but confidential patient information remains secure.
Atris SIEM provides effective oversight of your PHI
controls by tracking user log activity linked to these
controls. Key personnel have access to both summary
reporting and comprehensive audit trails. Custom
distribution lists can be scheduled to deliver ongoing audit
data to management as desired and available to OCR
examiners in minutes.
Atris Security Information  Event Management (SIEM)
An integrated approach to tracking user activity across multiple systems, providing data security,
compliance and an audit trail for HIPAA auditors, all deployed as a service from the cloud.
ATRIS TECHNOLOGY SIEM SERVICE is an automation solution designed to quickly provide information technology
security and immediately meet key compliance requirements including the OCR HIPAA Audit program. Unlike basic log
archival systems, Atris SIEM Service automatically learns your network security trends to perform real-time analysis and deliver
immediate response to potential threats across your network devices. Key personnel have comprehensive access to monitoring
tools and rely on a well-defined process to satisfy rigorous compliance examinations.
www.atris.com
How does Atris SIEM Service fortify your
OCR HIPAA compliance requirements?
•	 Track logons/logoffs: Monitor activity including
unauthorized access as well as unusual
activity from authorized personnel.
•	 Track failed logons: When excessive, failed logon
attempts serve as separate triggers for real-time alerts
and reporting. An automated notification can be
sent to your help-desk as an alert to take action.
•	 Identify changes to management access rights, such
as increased privileges, modified user accounts or
adding/ removing members from a user group.
•	 Monitor access to audit logs and protect against
audit log manipulation. Automated, real-time
monitoring of information system trace log data
will generate alerts for proactive management.
•	 Audit system event changes: Monitor and report
instances where local system processes have
changed (i.e. system startups/shutdowns, edits
attempted on scheduled processes, etc.).
No Impact to Customer Data
Atris SIEM Service is cloud-based with all data protected
by 256-bit encryption and secure authentication. We only
track user log activity related to insider threat (or user
negligence) and no customer data leaves your datacenter:
The risk to exposing customer data is nullified!
Try a fully-functional free version of Atris
SIEM for 30 days
We are convinced our approach to SIEM for HIPAA and
mission-critical applications, offered at an attractive price
point, is ideally suited to hospitals, clinics and private
practices. To fully appreciate the benefits of Atris SIEM
Service, we provide complimentary 30-day evaluations
utilizing your data for real-time monitoring.
Take advantage of our 30-day trial offer today by visiting
www.atris.com.
www.atris.com | Sales: sales@atris.com | General: info@atris.com
ATRIS TECHNOLOGY
3405 NW 97th BLVD
Building A, Suite 200, Gainesville, FL 32606
Direct: (352) 331-3100
Toll free: (800) 393-1079
Atris Technology Services
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) datasheet

More Related Content

What's hot

Webinar on Digitising Compliance Management for Greater Control and Lower Pen...
Webinar on Digitising Compliance Management for Greater Control and Lower Pen...Webinar on Digitising Compliance Management for Greater Control and Lower Pen...
Webinar on Digitising Compliance Management for Greater Control and Lower Pen...TeamLease Regtech Pvt Ltd
 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTControlCase
 
Main features of the program NRJ Access
Main features of the program NRJ Access Main features of the program NRJ Access
Main features of the program NRJ Access NRJ Soft
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
PD_CL_HIPAACompliantCloud_0116
PD_CL_HIPAACompliantCloud_0116PD_CL_HIPAACompliantCloud_0116
PD_CL_HIPAACompliantCloud_0116Ryan Busch
 
Shivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagementShivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagementshivanishuks
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset managementJackie Luo
 
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?Shahid Shah
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001ControlCase
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...ControlCase
 
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case StudyRackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case StudySylvain Reiter
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) ControlCase
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase
 

What's hot (20)

Isms4
Isms4Isms4
Isms4
 
Webinar on Digitising Compliance Management for Greater Control and Lower Pen...
Webinar on Digitising Compliance Management for Greater Control and Lower Pen...Webinar on Digitising Compliance Management for Greater Control and Lower Pen...
Webinar on Digitising Compliance Management for Greater Control and Lower Pen...
 
IS audit checklist
IS audit checklistIS audit checklist
IS audit checklist
 
Healthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUSTHealthcare Compliance: HIPAA and HITRUST
Healthcare Compliance: HIPAA and HITRUST
 
Main features of the program NRJ Access
Main features of the program NRJ Access Main features of the program NRJ Access
Main features of the program NRJ Access
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
PD_CL_HIPAACompliantCloud_0116
PD_CL_HIPAACompliantCloud_0116PD_CL_HIPAACompliantCloud_0116
PD_CL_HIPAACompliantCloud_0116
 
Shivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagementShivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagement
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset management
 
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Audit
AuditAudit
Audit
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
 
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case StudyRackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
Rackspace Unlocked 2014 - Cyber-Duck's PCI Compliance Case Study
 
A11 part 1
A11 part 1A11 part 1
A11 part 1
 
GridWorks SOS
GridWorks SOSGridWorks SOS
GridWorks SOS
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSS
 

Viewers also liked

Newsletter dated 23rd February 2017
Newsletter dated 23rd February 2017Newsletter dated 23rd February 2017
Newsletter dated 23rd February 2017Rajiv Bajaj
 
Newsletter dated 22nd February 2017
Newsletter dated 22nd February 2017Newsletter dated 22nd February 2017
Newsletter dated 22nd February 2017Rajiv Bajaj
 
Prospero jose posada ( la antigua)
Prospero jose posada ( la antigua)Prospero jose posada ( la antigua)
Prospero jose posada ( la antigua)alcaldia municipal
 
Circle H&S WT21 (June 2006)
Circle H&S WT21 (June 2006)Circle H&S WT21 (June 2006)
Circle H&S WT21 (June 2006)Edgepedia
 
CURRICCULUM VITAE FOR VIMBAI DHLIWAYO GAMASHAMTANE VILLAGE BUGERSFORT
CURRICCULUM VITAE FOR VIMBAI DHLIWAYO GAMASHAMTANE VILLAGE BUGERSFORTCURRICCULUM VITAE FOR VIMBAI DHLIWAYO GAMASHAMTANE VILLAGE BUGERSFORT
CURRICCULUM VITAE FOR VIMBAI DHLIWAYO GAMASHAMTANE VILLAGE BUGERSFORTVIMBAI DHLIWAYO
 

Viewers also liked (12)

Newsletter dated 23rd February 2017
Newsletter dated 23rd February 2017Newsletter dated 23rd February 2017
Newsletter dated 23rd February 2017
 
Sierramonsalvesaradaniela103
Sierramonsalvesaradaniela103Sierramonsalvesaradaniela103
Sierramonsalvesaradaniela103
 
Newsletter dated 22nd February 2017
Newsletter dated 22nd February 2017Newsletter dated 22nd February 2017
Newsletter dated 22nd February 2017
 
Reliability copy
Reliability   copyReliability   copy
Reliability copy
 
Prospero jose posada ( la antigua)
Prospero jose posada ( la antigua)Prospero jose posada ( la antigua)
Prospero jose posada ( la antigua)
 
торговля
торговляторговля
торговля
 
Bio data 80
Bio data 80Bio data 80
Bio data 80
 
Circle H&S WT21 (June 2006)
Circle H&S WT21 (June 2006)Circle H&S WT21 (June 2006)
Circle H&S WT21 (June 2006)
 
CURRICCULUM VITAE FOR VIMBAI DHLIWAYO GAMASHAMTANE VILLAGE BUGERSFORT
CURRICCULUM VITAE FOR VIMBAI DHLIWAYO GAMASHAMTANE VILLAGE BUGERSFORTCURRICCULUM VITAE FOR VIMBAI DHLIWAYO GAMASHAMTANE VILLAGE BUGERSFORT
CURRICCULUM VITAE FOR VIMBAI DHLIWAYO GAMASHAMTANE VILLAGE BUGERSFORT
 
Bio data 80
Bio data 80Bio data 80
Bio data 80
 
Tugasan 3
Tugasan 3Tugasan 3
Tugasan 3
 
Криптография
КриптографияКриптография
Криптография
 

Similar to Atris SIEM Service Datasheet NoBleed - HIPAA

Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iiiAshish Desai
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features rver21
 
Siem pdf
Siem pdfSiem pdf
Siem pdfkmehul
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityNexlar Security
 
Access Control and Maintenance.pptx
Access Control and Maintenance.pptxAccess Control and Maintenance.pptx
Access Control and Maintenance.pptxKinetic Potential
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperDavid J Rosenthal
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRAbhishek Sood
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)rver21
 
TROIA e-catalogue_EN
TROIA e-catalogue_ENTROIA e-catalogue_EN
TROIA e-catalogue_ENSaraLampret
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDITRos Dina
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business AccountsAnayaGrewal
 
Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfaotmp2600
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 

Similar to Atris SIEM Service Datasheet NoBleed - HIPAA (20)

Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
LTS Secure SIEM Features
LTS Secure SIEM Features LTS Secure SIEM Features
LTS Secure SIEM Features
 
Siem pdf
Siem pdfSiem pdf
Siem pdf
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
 
audit_it_250759.pdf
audit_it_250759.pdfaudit_it_250759.pdf
audit_it_250759.pdf
 
Access Control and Maintenance.pptx
Access Control and Maintenance.pptxAccess Control and Maintenance.pptx
Access Control and Maintenance.pptx
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 Whitepaper
 
Get your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPRGet your Enterprise Ready for GDPR
Get your Enterprise Ready for GDPR
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 
TROIA e-catalogue_EN
TROIA e-catalogue_ENTROIA e-catalogue_EN
TROIA e-catalogue_EN
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
 
Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdf
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 

Atris SIEM Service Datasheet NoBleed - HIPAA

  • 1. Atris Technology Services Security Information and Event Management (SIEM) Why Atris SIEM Service? • Follows HHS OCR recommended best practices for information technology. • No hardware deployments - start in days, not months. • Integrated monitoring of user activity to identify careless or malicious insider behavior. • Realize hospital-size functionality but with the affordability needs of community clinics and private offices. • A monthly cloud subscription means you can add/remove functionality as needed with no configuration required onsite. • Leverage our nearly two decades of proven technology automation experience. OCR HIPAA Compliance Atris SIEM Service provides real-time monitoring, alerting and reporting of insider threats to Protected Health Information (PHI). This facilitates the OCR requirement for IT systems and applications that contain confidential customer information. IT administrators and security officers have access to the entire suite of monitoring tools but confidential patient information remains secure. Atris SIEM provides effective oversight of your PHI controls by tracking user log activity linked to these controls. Key personnel have access to both summary reporting and comprehensive audit trails. Custom distribution lists can be scheduled to deliver ongoing audit data to management as desired and available to OCR examiners in minutes. Atris Security Information Event Management (SIEM) An integrated approach to tracking user activity across multiple systems, providing data security, compliance and an audit trail for HIPAA auditors, all deployed as a service from the cloud. ATRIS TECHNOLOGY SIEM SERVICE is an automation solution designed to quickly provide information technology security and immediately meet key compliance requirements including the OCR HIPAA Audit program. Unlike basic log archival systems, Atris SIEM Service automatically learns your network security trends to perform real-time analysis and deliver immediate response to potential threats across your network devices. Key personnel have comprehensive access to monitoring tools and rely on a well-defined process to satisfy rigorous compliance examinations. www.atris.com
  • 2. How does Atris SIEM Service fortify your OCR HIPAA compliance requirements? • Track logons/logoffs: Monitor activity including unauthorized access as well as unusual activity from authorized personnel. • Track failed logons: When excessive, failed logon attempts serve as separate triggers for real-time alerts and reporting. An automated notification can be sent to your help-desk as an alert to take action. • Identify changes to management access rights, such as increased privileges, modified user accounts or adding/ removing members from a user group. • Monitor access to audit logs and protect against audit log manipulation. Automated, real-time monitoring of information system trace log data will generate alerts for proactive management. • Audit system event changes: Monitor and report instances where local system processes have changed (i.e. system startups/shutdowns, edits attempted on scheduled processes, etc.). No Impact to Customer Data Atris SIEM Service is cloud-based with all data protected by 256-bit encryption and secure authentication. We only track user log activity related to insider threat (or user negligence) and no customer data leaves your datacenter: The risk to exposing customer data is nullified! Try a fully-functional free version of Atris SIEM for 30 days We are convinced our approach to SIEM for HIPAA and mission-critical applications, offered at an attractive price point, is ideally suited to hospitals, clinics and private practices. To fully appreciate the benefits of Atris SIEM Service, we provide complimentary 30-day evaluations utilizing your data for real-time monitoring. Take advantage of our 30-day trial offer today by visiting www.atris.com. www.atris.com | Sales: sales@atris.com | General: info@atris.com ATRIS TECHNOLOGY 3405 NW 97th BLVD Building A, Suite 200, Gainesville, FL 32606 Direct: (352) 331-3100 Toll free: (800) 393-1079 Atris Technology Services SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) datasheet