SlideShare une entreprise Scribd logo
1  sur  4
IBM Software
Security
Healthcare
A World-Class Pediatric
Medical Center
Centralizing security and compliance management
with IBM Security QRadar SIEM
Overview
The need
As the number of patients served is
expected to increase, this world-class
pediatric medical center needed a
solution that would help centralize its
security and compliance programs,
and that could scale security operations
for comprehensive visibility into the
network architecture.
The solution
An advanced security information
and event management solution that
centralizes and correlates logs and
events to provide staff with integrated
security intelligence.
The benefit
Provided deep insight into network
environment; detected malware that
previously hadn’t been identified;
saved administrators time.
With incredible growth across hospital information systems, this
medical center’s security administration team realized it had a challenge
with managing data for compliance, as well as maintaining a secure
environment. With limited staff and resources, the team needed to
find a way of better managing the dramatically growing logs of data.
The organization recognized that centralizing its log collection without
a unifying solution was becoming burdensome in the quest to identify
potential offenses on its network. With so many log sources producing
disparate silos of information, the security team struggled with correlating
meaningful alert information and effectively identifying potential offenses
in real time.
“Prior to implementing QRadar® software [now IBM® Security
QRadar software], we were filtering logs from multiple sources
through Syslog, which wasn’t ideal,” says a security administrator for
this world-class medical center. “We understood the capabilities a
next-generation SIEM [security information and event management]
product would provide, but we needed to educate ourselves and the
management team on the solutions that would make sense for us.”
2
Security
HealthcareIBM Software
“The biggest benefit
to deploying QRadar
software was that after
the initial mplementation,
we were up and running
immediately.”
—Security Administrator, A World-Class
Pediatric Medical Center
Extracting intelligence and helping the Security
Administration team scale
With the data environment growing daily, it was clear that scale would
play an enormous factor in the decision to deploy QRadar software,
especially where the number of logs was escalating to millions every day.
What the team at the medical center found was that QRadar software
offered robust integration with so many of today’s network and security
components so that it could correlate data from all the log-producing
sources already deployed.
“Part of the decision to deploy the solution was that our team believed
we would extract more intelligence from more components with QRadar
software, as compared with other market solutions,” says the security
administrator. “Our goal was to centralize the location for where we
could correlate logs and events so we could run reports out of one
solution to provide us with the integrated intelligence we have been
looking for.”
Flow data delivers real-time intelligence
By leveraging flow data from QRadar software, this medical center can
gain deep insight into its network environment that it was unable to with
any solution it previously used, or was considering.
“As we deployed QRadar, I wasn’t even aware of the behavioral analysis
capabilities in the product,” says the security administrator. “QRadar’s
behavioral anomaly detection functionality enables us to correlate
misconfigured systems and detect malware that we weren’t previously
identifying. For example, this provided us with the ability to detect
whether a specific machine is infected by something like a botnet.”
3
Security
HealthcareIBM Software
Solution components
Software
●●
IBM® Security QRadar® SIEM
“Part of the decision to
deploy the solution was
that our team believed
we would extract more
intelligence from more
components with QRadar
software, as compared
with other market
solutions.”
—Security Administrator, A World-Class
Pediatric Medical Center
As the team continues to scale up security operations with IBM Security
QRadar SIEM, it is able to effectively streamline overall security
processes so staff can use the solution to pull the actionable information
necessary from logs and events. Centralizing its program through
IBM Security QRadar SIEM helps save the time it took pulling logs from
multiple sources, as well as event information that a small team could not
afford to spend the manual time analyzing.
“With a SIEM deployment, being able to collect logs upon deployment
was unheard of with any other solution,” says the security administrator.
“I didn’t have to spend a lot of time or money on professional services to
start getting results, and I didn’t have to coordinate extensive training for
my staff because QRadar is intuitive and is easy to use.”
For more information
To learn more about IBM security solutions, please contact your
IBM representative or IBM Business Partner, or visit the following
website: ibm.com/security
To increase the business value of your IBM security solutions,
participate in an online community. Join the IBM security
community at: http://instituteforadvancedsecurity.com
Additionally, IBM Global Financing can help you acquire the software
capabilities that your business needs in the most cost-effective and
strategic way possible. We’ll partner with credit-qualified clients to
customize a financing solution to suit your business and development
goals, enable effective cash management, and improve your total cost of
ownership. Fund your critical IT investment and propel your business
forward with IBM Global Financing. For more information, visit:
ibm.com/financing
© Copyright IBM Corporation 2013
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States of America
February 2013
IBM, the IBM logo, ibm.com, and QRadar are trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and
service names might be trademarks of IBM or other companies. A current list of
IBM trademarks is available on the web at “Copyright and trademark information”
at ibm.com/legal/copytrade.shtml
This document is current as of the initial date of publication and may be changed by
IBM at any time.
The performance data and client examples cited are presented for illustrative
purposes only. Actual performance results may vary depending on specific configurations
and operating conditions. It is the user’s responsibility to evaluate and verify the
operation of any other products or programs with IBM products and programs.
THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS”
WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING
WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR
A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF
NON-INFRINGEMENT. IBM products are warranted according to the terms and
conditions of the agreements under which they are provided.
The client is responsible for ensuring compliance with laws and regulations applicable
to it. IBM does not provide legal advice or represent or warrant that its services or
products will ensure that the client is in compliance with any law or regulation.
Statement of Good Security Practices: IT system security involves protecting systems
and information through prevention, detection and response to improper access from
within and outside your enterprise. Improper access can result in information being
altered, destroyed or misappropriated or can result in damage to or misuse of your
systems, including to attack others. No IT system or product should be considered
completely secure and no single product or security measure can be completely effective
in preventing improper access. IBM systems and products are designed to be part of a
comprehensive security approach, which will necessarily involve additional operational
procedures, and may require other systems, products or services to be most effective.
IBM does not warrant that systems and products are immune from the malicious or
illegal conduct of any party.
WGC12347-USEN-01	
Please Recycle

Contenu connexe

Plus de IBM Security

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 

Plus de IBM Security (20)

Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 

Dernier

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

A World Class Pediatric Medical Center

  • 1. IBM Software Security Healthcare A World-Class Pediatric Medical Center Centralizing security and compliance management with IBM Security QRadar SIEM Overview The need As the number of patients served is expected to increase, this world-class pediatric medical center needed a solution that would help centralize its security and compliance programs, and that could scale security operations for comprehensive visibility into the network architecture. The solution An advanced security information and event management solution that centralizes and correlates logs and events to provide staff with integrated security intelligence. The benefit Provided deep insight into network environment; detected malware that previously hadn’t been identified; saved administrators time. With incredible growth across hospital information systems, this medical center’s security administration team realized it had a challenge with managing data for compliance, as well as maintaining a secure environment. With limited staff and resources, the team needed to find a way of better managing the dramatically growing logs of data. The organization recognized that centralizing its log collection without a unifying solution was becoming burdensome in the quest to identify potential offenses on its network. With so many log sources producing disparate silos of information, the security team struggled with correlating meaningful alert information and effectively identifying potential offenses in real time. “Prior to implementing QRadar® software [now IBM® Security QRadar software], we were filtering logs from multiple sources through Syslog, which wasn’t ideal,” says a security administrator for this world-class medical center. “We understood the capabilities a next-generation SIEM [security information and event management] product would provide, but we needed to educate ourselves and the management team on the solutions that would make sense for us.”
  • 2. 2 Security HealthcareIBM Software “The biggest benefit to deploying QRadar software was that after the initial mplementation, we were up and running immediately.” —Security Administrator, A World-Class Pediatric Medical Center Extracting intelligence and helping the Security Administration team scale With the data environment growing daily, it was clear that scale would play an enormous factor in the decision to deploy QRadar software, especially where the number of logs was escalating to millions every day. What the team at the medical center found was that QRadar software offered robust integration with so many of today’s network and security components so that it could correlate data from all the log-producing sources already deployed. “Part of the decision to deploy the solution was that our team believed we would extract more intelligence from more components with QRadar software, as compared with other market solutions,” says the security administrator. “Our goal was to centralize the location for where we could correlate logs and events so we could run reports out of one solution to provide us with the integrated intelligence we have been looking for.” Flow data delivers real-time intelligence By leveraging flow data from QRadar software, this medical center can gain deep insight into its network environment that it was unable to with any solution it previously used, or was considering. “As we deployed QRadar, I wasn’t even aware of the behavioral analysis capabilities in the product,” says the security administrator. “QRadar’s behavioral anomaly detection functionality enables us to correlate misconfigured systems and detect malware that we weren’t previously identifying. For example, this provided us with the ability to detect whether a specific machine is infected by something like a botnet.”
  • 3. 3 Security HealthcareIBM Software Solution components Software ●● IBM® Security QRadar® SIEM “Part of the decision to deploy the solution was that our team believed we would extract more intelligence from more components with QRadar software, as compared with other market solutions.” —Security Administrator, A World-Class Pediatric Medical Center As the team continues to scale up security operations with IBM Security QRadar SIEM, it is able to effectively streamline overall security processes so staff can use the solution to pull the actionable information necessary from logs and events. Centralizing its program through IBM Security QRadar SIEM helps save the time it took pulling logs from multiple sources, as well as event information that a small team could not afford to spend the manual time analyzing. “With a SIEM deployment, being able to collect logs upon deployment was unheard of with any other solution,” says the security administrator. “I didn’t have to spend a lot of time or money on professional services to start getting results, and I didn’t have to coordinate extensive training for my staff because QRadar is intuitive and is easy to use.” For more information To learn more about IBM security solutions, please contact your IBM representative or IBM Business Partner, or visit the following website: ibm.com/security To increase the business value of your IBM security solutions, participate in an online community. Join the IBM security community at: http://instituteforadvancedsecurity.com Additionally, IBM Global Financing can help you acquire the software capabilities that your business needs in the most cost-effective and strategic way possible. We’ll partner with credit-qualified clients to customize a financing solution to suit your business and development goals, enable effective cash management, and improve your total cost of ownership. Fund your critical IT investment and propel your business forward with IBM Global Financing. For more information, visit: ibm.com/financing
  • 4. © Copyright IBM Corporation 2013 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America February 2013 IBM, the IBM logo, ibm.com, and QRadar are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. WGC12347-USEN-01 Please Recycle