SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
LANDesk White Paper




                      Mobile Device Management
                      for Healthcare
                      Discover, Extend, Secure and Empower
LANDesk White Paper | Mobile Device Management for Healthcare




To the maximum extent permitted under applicable law, LANDesk assumes no liability whatsoever, and disclaims any express or implied warranty, relating to the sale and/or use of LANDesk products including liability or warranties relating to fitness for a
particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right, without limiting the rights under copyright.

LANDesk retains the right to make changes to this document or related product specifications and descriptions, at any time, without notice. LANDesk makes no warranty for the use of this document and assumes no responsibility for any errors that can
appear in the document nor does it make a commitment to update the information contained herein. For the most current product information, please visit www.landesk.com.

Copyright © 2012, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks of LANDesk Software, Inc. and its affiliates in the United States and/or other countries. Other brands and
names may be claimed as the property of others.

LSI-1017-EN      02/12 MS/BB/AZUU




2                                                                                                                                                                                                                   www.landesk.com
LANDesk White Paper | Mobile Device Management for Healthcare




                             Contents
                             Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
                             Daunting Challenges for Healthcare IT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
                             The Solution: Discover, Extend, Secure and Empower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
                                Policy, Tools and Education. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
                                    Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
                                    Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
                                    Mobile Device Management Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
                             LANDesk Advantages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
                             Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8




www.landesk.com                                                                                                                                                                        3
LANDesk White Paper | Mobile Device Management for Healthcare



    Introduction                                                                                  Daunting Challenges for Healthcare IT
    Mobile devices have taken off in healthcare organizations,                                    Mobile devices and platforms represent significant challenges
    where doctors and other medical staff use smart phones and                                    for healthcare IT, however. Regulations such as HIPAA
    tablets to access everything from email to health reference                                   and HITECH require healthcare organizations to take
    materials, electronic health records, medical imaging, and                                    responsibility for managing, securing, and protecting
    patient survey applications. Mobile devices perform a host of                                 confidential patient information and for reporting any
    medical, technical, and administrative functions, including                                   breaches that take place. The consequences of a breach can be
    communicating medical information to patients and families.                                   immense, including steep fines and devastating publicity, not
    Thanks to the freedom and fast information access enabled by                                  to mention the significant costs incurred in understanding
    wireless communications, tablets have even begun to replace                                   what was breached, who saw the data, risks, and remediation.
    patient workstations for accessing and entering patient care
                                                                                                  Unfortunately, without the right kind of guidance and
    information in IT healthcare applications.
                                                                                                  management, personal mobile devices can cause absolute
    A recent survey by Manhattan Research found that 75                                           chaos when it comes to confidentiality. Challenges include:
    percent of American physicians own some kind of Apple
                                                                                                  Asset Lifecycle Management—When users feel free to bring
    mobile device and 81 percent use some kind of smart
                                                                                                  their own devices to work, it can be difficult or sometimes
    phone—Apple or non-Apple—up from 72 percent the
                                                                                                  impossible to discover, track, and secure them against the
    previous year.1 Thirty percent of doctors use iPads to access
                                                                                                  constantly changing threat landscape.
    EHRs (electronic health records), view radiology images, and
    communicate with patients. An additional 28 percent plan                                      User Management—IT can’t depend on doctors and staff to
    to buy an iPad within the next six months, according to                                       use their devices wisely, as many are ignorant of device security,
    the report. Other studies have found similar results among                                    privacy, and compliance risks, not to mention how to protect
    nurses and other healthcare employees and have linked use of                                  mobile devices and the information stored on them from
    mobile devices with job satisfaction.                                                         hackers and theft.
    The benefits of mobile devices in healthcare are significant.                                 Many unwittingly store confidential information on their
    Healthcare professionals can collaborate and access                                           tablets or smart phones without any encryption or other
    information wherever and whenever the need arises, rather                                     form of protection, or use them to send and receive email
    than having to wait to get to a conference room desk phone,                                   and file attachments containing sensitive information. Others
    PC, workstation, or file cabinet. The result is faster, often                                 use file sharing applications such as DropBox to store and
    better decisions and more efficient patient care.                                             transmit information or unsecured personal email services
                                                                                                  that lie outside of the institution’s messaging and security
    As with business enterprises, healthcare institutions are
                                                                                                  infrastructure. Users may also take advantage of unsecured
    undergoing the consumerization of IT. Rather than looking
                                                                                                  wireless WiFi connections in coffee shops, hotels, and other
    to IT for mobile devices and connectivity, healthcare
                                                                                                  environments to transmit information, not knowing that
    professionals increasingly take their personal iPhones, iPads,
                                                                                                  hackers regularly frequent these establishments to penetrate
    and other mobile devices to work and expect to be able to
                                                                                                  the devices of unwitting users.
    use them freely in the medical care environment. Corporate-
    procured Blackberry smart phones and even workstations,                                       Other hazards are caused by users unknowingly downloading
    laptops, and desktops are giving way to user-owned iPhones                                    malware-laden mobile applications, accessing infected Web
    and iPads. With more and more medical schools integrating                                     sites, or using text messaging in ways that introduce malware
    mobile devices into the curriculum as well, it’s likely that                                  into their devices or open doors for hackers to penetrate
    mobile device use in healthcare environments will continue to                                 devices, networks, and centralized data stores.
    grow and job choice and satisfaction among younger health
    professionals will increasingly be tied partially to the use of the                           Device Loss and Theft—Mobile device loss and theft,
    latest mobile technology.                                                                     including those involving laptops, are the single greatest cause
                                                                                                  of data breaches at large healthcare organizations, far more
                                                                                                  common than hacking incidents.
    1 Taking the Pulse U.S. Annual Market Research Study v11.0, Manhattan Research, May 4, 2011




4                                                                                                                                                www.landesk.com
LANDesk White Paper | Mobile Device Management for Healthcare



   Platform Complexity—While servers, PCs, and laptops                Know your data—What healthcare information must have
   run on a few longstanding, seasoned operating systems              maximum protection? Where is it stored, and how is it
   familiar to IT, mobile devices run on a variety of newer,          accessed? What data needs a medium level of protection? Who
   less seasoned operating systems, including iOS and                 should have access to this data and who should not?
   Android. The newness and openness of Android represents
                                                                      Know your infrastructure and its vulnerabilities—How
   a particularly thorny security problem for IT, with Android
                                                                      does the organization protect confidential information today?
   devices under increasing attack in the past several months.
                                                                      Where are the unique vulnerabilities posed by mobile devices
  The Solution: Discover, Extend, Secure                              and which of these are the most hazardous?
  and Empower                                                         Know the risks—What are the overall and unique security
   Unfortunately, simply forbidding or severely restricting mobile    risks of each mobile device platform? What are the risks of
   or personal devices in the work place is not an option for         patient information breaches caused by storing user data on
   healthcare institutions if they seek to hire and retain younger,   mobile devices, or by using personal email, public WiFi, or
   tech-savvy doctors and medical personnel or compete with           personal applications? What are the likely threats to your
   their more technologically advanced cohorts. Not to mention        organization’s mobile devices and confidential information?
   that many employees are likely to bring in their mobile devices    If a breach were to happen, what would the likely costs be to
   anyway and use them as they wish. Simply forbidding these          the organization? It’s important to factor in less tangible yet
   devices makes it impossible to manage and secure them–and          genuine costs such as damage to the institution’s reputation or
   the information they contain.                                      remediation costs of a breach.

   Instead, the solution for most healthcare organizations today is   Policy, Tools, and Education
   to embrace their employees’ mobile devices and platforms and
                                                                      Once IT has a handle on the use and risks of mobile platforms
   use the right combination of policy education and effective
                                                                      in the organization, the next step is to craft a strategy for
   tools to manage, secure, and protect confidential information.
                                                                      mobile platform security and data protection.
   In order to do so, IT needs to accomplish several tasks:
                                                                      Sometimes the best way to craft a strategy that balances the
   Know what you have—First, IT must have a clear picture of          mobile needs of employees with the compliance, security, and
   what mobile devices and mobile device platforms are used by        data privacy needs of the organization is to form a mobile
   employees. This can be a difficult task when workers bring in      security strategy task force that includes representatives from
   personal devices for both work and personal use. Most likely       IT, affected departments, and legal counsel.
   IT will need to meet with each department in the organization
                                                                      Most effective mobile device security strategies consist of a
   to get a feel for what devices are being used. It’s important to
                                                                      combination of policy, education, and tools.
   strike a positive attitude that lets users know that the goal is
   to embrace, empower, and secure mobile devices, not restrict       Policy
   them or punish their users.
                                                                      Your mobile security policy should integrate with your overall
   Know how mobile devices are used—Are employees using               organizational security strategy. Organizations should already
   their mobile devices to access organization email, electronic      have policies in place that spell out which employees and
   medical records, private patient information, patient surveys?     employee roles are permitted access to which categories of
   Are they accessing personal email services, social networks,       information and what they are allowed to do with it, including
   potentially insecure Web sites? Are they storing patient           emailing or sharing it digitally in other ways.
   information on their devices? Are they downloading consumer        Your mobile security policy should add policies that spell out:
   applications? Do they have any awareness of the need for and
                                                                         Which mobile platforms, such as laptops, tablets, and
   ways to protect confidential patient information on these
                                                                         smart phones, and which operating systems, such as iOS
   devices? Are they using public WiFi services?
                                                                         and Android, are permitted in the healthcare environment
                                                                         and who is permitted to use them.




www.landesk.com                                                                                                                         5
LANDesk White Paper | Mobile Device Management for Healthcare



        Requirements for users to register their mobile devices         of device loss and theft, data leakage, and malware, as well as the
        with IT.                                                        data security and privacy requirements and related penalties of
       What information if any can be stored on employees’              HIPAA, HITECH, and any other relevant regulations.
       mobile devices and what protections such as passwords,           It’s important to demonstrate in a tangible way just
       encryption, VPNs, backup, etc. need to be implemented            how damaging breaches can be by relating stories about
       to protect this information.                                     organizations that have been breached and the actual
        Rules for accessing the Web over mobile devices and             devastating financial and other impacts of those breaches.
        downloading and using health and non-health related             Keep users aware of breaches that make the news. Make sure
        applications. Some organizations may want to publish a          you repeat education on an ongoing basis and educate new
        list of approved and unacceptable mobile applications or        employees and mobile platform users as soon as possible.
        even provide their own organization app store where users
                                                                        Users must also be educated at least annually about
        can download new applications.
                                                                        your organization’s mobile security policies and the user
    Users should also be put on notice to:                              responsibilities spelled out by them, as well as any penalties that
       Always keep mobile devices within their sight.                   can result from disobeying security policies. If you don’t want
                                                                        users simply tuning out and doing as they please, make sure you
        Report device loss or theft to appropriate staff                balance this education with a positive attitude that recognizes
        immediately. Mobile device users are known to spend             users’ needs and the obvious benefits of mobile platforms.
        hours or even days trying to locate missing devices before
        reporting their loss.                                           Mobile Device Management Tools
        Never share their devices or device passwords with              Policies must not only be spelled out, they must be enforced.
        anyone else.                                                    Unfortunately, users tend to do things for the sake of
        Never connect to the corporate network or transmit              convenience that run counter to your organization’s security
        healthcare information of any type over insecure WiFi           policies. That’s why it’s important to put the appropriate tools
        networks without using virtual private networking or            in place to enforce company policies and to discover, manage,
        other tools that secure data in transit.                        and secure mobile platforms.

        Never transmit sensitive information over unsecured             The first line of defense in any environment incorporating
        personal email or data sharing services, either in the form     mobile devices and platforms is an enterprise mobile device
        of text, attachments, or information cut and pasted from        management (MDM) solution. MDM systems provide a
        sensitive documents.                                            host of tools for identifying, managing, and securing mobile
        Keep Bluetooth out of discovery mode when not in use.           platforms of all types and their users. Some of the features of
                                                                        an effective mobile device management platform include:
        Understand that jailbroken smart phones or tablets will
        never be allowed in the organization.                           Discovery—The ability to discover all mobile devices and
    IT should also have policies for locating and wiping lost or        platforms that connect to the corporate network and create
    stolen mobile devices and protecting mobile devices from            a device inventory database that can be used to manage these
    malware. As with any other IT assets, policies should be in place   platforms over their entire lifecycle. The application should
    for addressing security when employees leave the organization.      not permit users to connect their devices to the network
                                                                        or messaging systems until they are approved and properly
    Education                                                           registered with the MDM system. The MDM system should
    Policy is not very useful if it’s not backed up with an effective   be able to easily grandfather existing platforms as well.
    employee education program. Mobile device users must be             Extended Hardware and Software Inventory—including
    educated in depth about the security challenges posed by mobile     memory, batteries, installed applications, policies, and
    devices in the work environment and proper measures they            network information.
    must take to address them. They should understand the hazards




6                                                                                                                       www.landesk.com
LANDesk White Paper | Mobile Device Management for Healthcare



   Mobile Platform Diversity—The best mobile device                   Remote Notification—that can alert all device users to the
   management systems cover all the most popular mobile               availability of new resources and any required user actions
   platforms and operating systems, including Blackberry, Apple,      through its own application portal.
   and Android tablets and smart phones, and can take advantage
                                                                      Jailbreak and Rooting Detection—The ability to detect
   of each mobile platform’s native OS policies, security features,
                                                                      jailbroken or rooted mobile devices to determine if the device
   and other capabilities.
                                                                      is compliant, if any action should be taken, or any policies
   Easy Self Enrollment—Users are able to enroll with the             should be invoked.
   network directory, such as Active Directory, and the MDM
                                                                      A Controlled Browser—for launching links and limiting sites
   system themselves after which the system configures the user
                                                                      users can access based on corporate policy and security and
   and device and implements appropriate security policies
                                                                      compliance requirements.
   automatically. Some MDM systems provide access to a
   company app store, similar to Apple’s app store, where users       Encryption—of any sensitive information in transit and at rest.
   can download a management agent and other approved
   applications and enroll without the help of IT.                    LANDesk Advantages
   Zero-Touch Management—The ability to execute                       Several MDM solutions are available on the market today,
                                                                      each with its own set of features and capabilities. LANDesk®
   management functions, including software distribution, WiFi
                                                                      Mobility Manager stands out as a market-leading solution
   and messaging configuration, and administrator updates across
                                                                      from a software vendor that can boast 25 years of stability,
   mobile platforms from a central console, without any need for
                                                                      experience, and IT systems management expertise controlling
   physical access to the devices themselves.
                                                                      and managing desktops and laptops—and more recently the
   Workforce Segmentation—based on user roles,                        multiple mobile devices users increasingly carry.
   responsibilities, and corporate policies, with appropriate
                                                                      LANDesk Mobility Manager offers the best of both worlds—
   control of access to corporate information, content, and
                                                                      the ability to apply discovery, inventory, security, and
   applications based on these roles. This MDM solutions
                                                                      management capabilities to mobile devices from a single,
   element helps organizations implement a solution that is not a
                                                                      easy-to-use console, while enabling IT to offer self-service
   one-size-fits-all model, allowing effective segmentation based
                                                                      options to users within the LANDesk application portal.
   on the role of the end user within your organization.
                                                                      This portal serves as a repository for apps, files, videos, and
   Self Service Application and Content Portal—Some                   other corporate resources that your users can access without
   MDM platforms offer secure corporate portals that enable           submitting to, or resorting to the horizontal app stores
   employees to access approved and in-house applications, as         such as iTunes and Android Marketplace. This capability
   well as files, videos, and other safe information and resources    is essential to controlling and securing applications in a
   the organization desires to make available to mobile users.        healthcare environment.
   In environments that require the absolute highest level of
                                                                      Organizations can use the same LANDesk console and
   confidentiality, it’s useful for the MDM system to have
                                                                      database to manage smart phones and tablets that they use
   the option of streaming all content to each device so that
                                                                      to manage desktops and laptops. This level of integration
   confidential information is never stored there and susceptible
                                                                      translates into significant total-cost-of-ownership advantages.
   to theft or loss.
                                                                      According to IDC, the use of LANDesk as a comprehensive
   Phone Location—The ability to track and report device              hardware and end-user management system can save more
   locations and provide a location history that can be useful in     than $23,000 per 100 users per year.2
   tracing the device in case of loss or theft.
                                                                      There’s no need for IT to develop a relationship with another
   Remote Lock, Password Reset, and Wipe—The ability                  management vendor and provide the requisite training and
   to automatically lock a lost or stolen device remotely and         resources for an entirely new platform, with its own unique
   eliminate any sensitive information stored on it.                  issues and quirks.

                                                                      2 Gaining Business Value and ROI with LANDesk Software: Automated Change and Configuration
                                                                        Management, IDC, January 2011




www.landesk.com                                                                                                                                                    7
LANDesk White Paper | Mobile Device Management for Healthcare



    As shown below, LANDesk Mobility Manager simply installs
    on top of a LANDesk Management Suite 9 core server, plus
    the addition of the cloud-facing components in the DMZ and
    the LANDesk mobile device management server. The same,
    familiar console is used to manage the new devices.




    Conclusion
    Mobile device platforms in medical environments are here to
    stay given the advantages for patient care that are impossible
    to ignore. At the same time, patient privacy and confidentiality
    requirements of HIPAA, HITECH, and other regulations
    present significant challenges to the use of mobile platforms
    in a secure fashion that protects patient confidentiality and
    ensures compliance.

    Mobile Device Management platforms provide one of the
    principal ways to meet these challenges while empowering
    healthcare employees with all the convenience and patient care
    advantages today’s mobile platforms offer. With LANDesk,
    the user is the endpoint, not the device. A user-centered,
    policy-based approach is more logical and far less cumbersome
    than a device-centered approach in today’s typical work
    environments where each user connects to the network with
    multiple devices.

    LANDesk Mobility Manager provides a full-featured,
    integrated mobile platform management solution. Healthcare
    institutions can manage and secure all their users’ desktops,
    laptops, and mobile devices effectively for the lowest possible
    capital and operating costs.




8                                                                      www.landesk.com

Weitere ähnliche Inhalte

Was ist angesagt?

Dell Venue Pro 11 Windows 8 tablet within a Healthcare facility_Microsoft Hea...
Dell Venue Pro 11 Windows 8 tablet within a Healthcare facility_Microsoft Hea...Dell Venue Pro 11 Windows 8 tablet within a Healthcare facility_Microsoft Hea...
Dell Venue Pro 11 Windows 8 tablet within a Healthcare facility_Microsoft Hea...Eric Van 't Hoff
 
Medical imaging in_the_cloud
Medical imaging in_the_cloudMedical imaging in_the_cloud
Medical imaging in_the_cloudAccenture
 
Cloud eHealth in Medical Imaging & Radiology
Cloud eHealth in Medical Imaging & RadiologyCloud eHealth in Medical Imaging & Radiology
Cloud eHealth in Medical Imaging & RadiologyCarestream
 
Power of Health IT Touch
Power of Health IT TouchPower of Health IT Touch
Power of Health IT TouchIntel IT Center
 
An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis IJECEIAES
 
Webinar: Overcoming it challenges
Webinar: Overcoming it challengesWebinar: Overcoming it challenges
Webinar: Overcoming it challengesModern Healthcare
 
Storage economics for healthcare providers webinar
Storage economics for healthcare providers webinarStorage economics for healthcare providers webinar
Storage economics for healthcare providers webinarHitachi Vantara
 
Meaningful Use in Radiology
Meaningful Use in RadiologyMeaningful Use in Radiology
Meaningful Use in RadiologyCarestream
 
Imaging in the Cloud: A New Era for Radiology
Imaging in the Cloud: A New Era for RadiologyImaging in the Cloud: A New Era for Radiology
Imaging in the Cloud: A New Era for RadiologyCarestream
 
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...EMC
 
Whitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging Strategy
Whitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging StrategyWhitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging Strategy
Whitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging StrategyCarestream
 
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...Citrix
 
DICOM Medical Imaging by Cloud Medical Imaging,LLC
DICOM Medical Imaging by Cloud Medical Imaging,LLCDICOM Medical Imaging by Cloud Medical Imaging,LLC
DICOM Medical Imaging by Cloud Medical Imaging,LLCCloud Medical Imaging
 
How the internet of things is impacting healthcare
How the internet of things is impacting healthcareHow the internet of things is impacting healthcare
How the internet of things is impacting healthcarePinta Partners
 
Liquidware-Labs-Willis-Knighton
Liquidware-Labs-Willis-KnightonLiquidware-Labs-Willis-Knighton
Liquidware-Labs-Willis-KnightonBrandon Graves
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 
Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2CitiusTech
 

Was ist angesagt? (20)

Laserfiche empowercon302 2016
Laserfiche empowercon302 2016Laserfiche empowercon302 2016
Laserfiche empowercon302 2016
 
Dell Venue Pro 11 Windows 8 tablet within a Healthcare facility_Microsoft Hea...
Dell Venue Pro 11 Windows 8 tablet within a Healthcare facility_Microsoft Hea...Dell Venue Pro 11 Windows 8 tablet within a Healthcare facility_Microsoft Hea...
Dell Venue Pro 11 Windows 8 tablet within a Healthcare facility_Microsoft Hea...
 
Medical imaging in_the_cloud
Medical imaging in_the_cloudMedical imaging in_the_cloud
Medical imaging in_the_cloud
 
Block MDaaS
Block MDaaSBlock MDaaS
Block MDaaS
 
Cloud eHealth in Medical Imaging & Radiology
Cloud eHealth in Medical Imaging & RadiologyCloud eHealth in Medical Imaging & Radiology
Cloud eHealth in Medical Imaging & Radiology
 
Power of Health IT Touch
Power of Health IT TouchPower of Health IT Touch
Power of Health IT Touch
 
An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis
 
Webinar: Overcoming it challenges
Webinar: Overcoming it challengesWebinar: Overcoming it challenges
Webinar: Overcoming it challenges
 
Storage economics for healthcare providers webinar
Storage economics for healthcare providers webinarStorage economics for healthcare providers webinar
Storage economics for healthcare providers webinar
 
Meaningful Use in Radiology
Meaningful Use in RadiologyMeaningful Use in Radiology
Meaningful Use in Radiology
 
Imaging in the Cloud: A New Era for Radiology
Imaging in the Cloud: A New Era for RadiologyImaging in the Cloud: A New Era for Radiology
Imaging in the Cloud: A New Era for Radiology
 
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
Improve Patient Care and Reduce IT Costs with Vendor Neutral Archiving and Cl...
 
Whitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging Strategy
Whitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging StrategyWhitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging Strategy
Whitepaper: Leveraging the Cloud to Enhance an Enterprise Imaging Strategy
 
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
 
DICOM Medical Imaging by Cloud Medical Imaging,LLC
DICOM Medical Imaging by Cloud Medical Imaging,LLCDICOM Medical Imaging by Cloud Medical Imaging,LLC
DICOM Medical Imaging by Cloud Medical Imaging,LLC
 
How the internet of things is impacting healthcare
How the internet of things is impacting healthcareHow the internet of things is impacting healthcare
How the internet of things is impacting healthcare
 
Liquidware-Labs-Willis-Knighton
Liquidware-Labs-Willis-KnightonLiquidware-Labs-Willis-Knighton
Liquidware-Labs-Willis-Knighton
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2
 
Health Information Technology Implementation Challenges and Responsive Soluti...
Health Information Technology Implementation Challenges and Responsive Soluti...Health Information Technology Implementation Challenges and Responsive Soluti...
Health Information Technology Implementation Challenges and Responsive Soluti...
 

Andere mochten auch

Webinar lab + ous presentation may10
Webinar lab + ous presentation may10Webinar lab + ous presentation may10
Webinar lab + ous presentation may10guestbb908d
 
Mobile application (in)security - 2nd Integrity Smart Executive Breakfast
Mobile application (in)security - 2nd Integrity Smart Executive BreakfastMobile application (in)security - 2nd Integrity Smart Executive Breakfast
Mobile application (in)security - 2nd Integrity Smart Executive BreakfastCláudio André
 
Cooleaf intro from cutler
Cooleaf intro from cutlerCooleaf intro from cutler
Cooleaf intro from cutlerJames A. Morin
 
This is the secure droid you are looking for
This is the secure droid you are looking forThis is the secure droid you are looking for
This is the secure droid you are looking forCláudio André
 
Hacker, you shall not pass!
Hacker, you shall not pass!Hacker, you shall not pass!
Hacker, you shall not pass!Cláudio André
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentesterCláudio André
 
Ships in the Night: GMOs and Consumer Perceptions
Ships in the Night: GMOs and Consumer PerceptionsShips in the Night: GMOs and Consumer Perceptions
Ships in the Night: GMOs and Consumer PerceptionsCami Ryan
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android ApplicationsCláudio André
 
beaconstreetpartners-theintegratedemployeeexperience-151026011852-lva1-app6892
beaconstreetpartners-theintegratedemployeeexperience-151026011852-lva1-app6892beaconstreetpartners-theintegratedemployeeexperience-151026011852-lva1-app6892
beaconstreetpartners-theintegratedemployeeexperience-151026011852-lva1-app6892James A. Morin
 

Andere mochten auch (18)

Mobile (in)security ?
Mobile (in)security ?Mobile (in)security ?
Mobile (in)security ?
 
Webinar lab + ous presentation may10
Webinar lab + ous presentation may10Webinar lab + ous presentation may10
Webinar lab + ous presentation may10
 
Snoy
SnoySnoy
Snoy
 
Is my app secure?
Is my app secure?Is my app secure?
Is my app secure?
 
Gmn full ad_mini-1
Gmn full ad_mini-1Gmn full ad_mini-1
Gmn full ad_mini-1
 
Mind the gap between the new portfolio and the so-called old systems
Mind the gap between the new portfolio and the so-called old systemsMind the gap between the new portfolio and the so-called old systems
Mind the gap between the new portfolio and the so-called old systems
 
Mobile application (in)security - 2nd Integrity Smart Executive Breakfast
Mobile application (in)security - 2nd Integrity Smart Executive BreakfastMobile application (in)security - 2nd Integrity Smart Executive Breakfast
Mobile application (in)security - 2nd Integrity Smart Executive Breakfast
 
Harvard Law Bulletin
Harvard Law BulletinHarvard Law Bulletin
Harvard Law Bulletin
 
Busca Integrada ao Acervo UFPR
Busca Integrada ao Acervo UFPRBusca Integrada ao Acervo UFPR
Busca Integrada ao Acervo UFPR
 
Cooleaf intro from cutler
Cooleaf intro from cutlerCooleaf intro from cutler
Cooleaf intro from cutler
 
This is the secure droid you are looking for
This is the secure droid you are looking forThis is the secure droid you are looking for
This is the secure droid you are looking for
 
Hacker, you shall not pass!
Hacker, you shall not pass!Hacker, you shall not pass!
Hacker, you shall not pass!
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentester
 
Ships in the Night: GMOs and Consumer Perceptions
Ships in the Night: GMOs and Consumer PerceptionsShips in the Night: GMOs and Consumer Perceptions
Ships in the Night: GMOs and Consumer Perceptions
 
Acesso remoto
Acesso remotoAcesso remoto
Acesso remoto
 
Wikispace page
Wikispace pageWikispace page
Wikispace page
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
beaconstreetpartners-theintegratedemployeeexperience-151026011852-lva1-app6892
beaconstreetpartners-theintegratedemployeeexperience-151026011852-lva1-app6892beaconstreetpartners-theintegratedemployeeexperience-151026011852-lva1-app6892
beaconstreetpartners-theintegratedemployeeexperience-151026011852-lva1-app6892
 

Ähnlich wie Mobile Device Mgmt Healthcare Whitepaper

Healthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of futureHealthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of futureVARUN KESAVAN
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"Stephen Allan Weitzman
 
Smartphones in Healthcare
Smartphones in HealthcareSmartphones in Healthcare
Smartphones in HealthcareSunil Malhotra
 
F&S Award and Report
F&S Award and Report F&S Award and Report
F&S Award and Report Su Ahmad
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
Digital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyDigital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyPaul Gulbin
 
Data Management - a top Priority for Healthcare Practices
Data Management - a top Priority for Healthcare PracticesData Management - a top Priority for Healthcare Practices
Data Management - a top Priority for Healthcare PracticesData Dynamics Inc
 
Wearable Technology Software Solutions.pdf
Wearable Technology Software Solutions.pdfWearable Technology Software Solutions.pdf
Wearable Technology Software Solutions.pdfChetu
 
7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...
7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...
7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...TheEntrepreneurRevie
 
Smart devices in healthcare
Smart devices in healthcareSmart devices in healthcare
Smart devices in healthcareICON
 
Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Sungard Availability Services
 
Clinical Nursing Information System
Clinical Nursing Information SystemClinical Nursing Information System
Clinical Nursing Information SystemJack Frost
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerAmer Nazar
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care managementmohamedmoosa2
 
7 Pitfalls to Avoid in mHealth Web or App Design— White Paper
7 Pitfalls to Avoid in mHealth Web or App Design— White Paper7 Pitfalls to Avoid in mHealth Web or App Design— White Paper
7 Pitfalls to Avoid in mHealth Web or App Design— White PaperUBM Canon
 

Ähnlich wie Mobile Device Mgmt Healthcare Whitepaper (20)

Healthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of futureHealthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of future
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"Adequate directions for use "In the Age of AI and Watson"
Adequate directions for use "In the Age of AI and Watson"
 
Smartphones in Healthcare
Smartphones in HealthcareSmartphones in Healthcare
Smartphones in Healthcare
 
F&S Award and Report
F&S Award and Report F&S Award and Report
F&S Award and Report
 
HP Whitepaper BYOD in Healthcare
 HP Whitepaper BYOD in Healthcare  HP Whitepaper BYOD in Healthcare
HP Whitepaper BYOD in Healthcare
 
My back up brain
My back up brainMy back up brain
My back up brain
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
Digital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyDigital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences July
 
Data Management - a top Priority for Healthcare Practices
Data Management - a top Priority for Healthcare PracticesData Management - a top Priority for Healthcare Practices
Data Management - a top Priority for Healthcare Practices
 
Wearable Technology Software Solutions.pdf
Wearable Technology Software Solutions.pdfWearable Technology Software Solutions.pdf
Wearable Technology Software Solutions.pdf
 
7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...
7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...
7 Best Points of The Future of Digital Technology in Healthcare | The Entrepr...
 
Smart devices in healthcare
Smart devices in healthcareSmart devices in healthcare
Smart devices in healthcare
 
Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
 
Clinical Nursing Information System
Clinical Nursing Information SystemClinical Nursing Information System
Clinical Nursing Information System
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_Amer
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 
7 Pitfalls to Avoid in mHealth Web or App Design— White Paper
7 Pitfalls to Avoid in mHealth Web or App Design— White Paper7 Pitfalls to Avoid in mHealth Web or App Design— White Paper
7 Pitfalls to Avoid in mHealth Web or App Design— White Paper
 

Mobile Device Mgmt Healthcare Whitepaper

  • 1. LANDesk White Paper Mobile Device Management for Healthcare Discover, Extend, Secure and Empower
  • 2. LANDesk White Paper | Mobile Device Management for Healthcare To the maximum extent permitted under applicable law, LANDesk assumes no liability whatsoever, and disclaims any express or implied warranty, relating to the sale and/or use of LANDesk products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right, without limiting the rights under copyright. LANDesk retains the right to make changes to this document or related product specifications and descriptions, at any time, without notice. LANDesk makes no warranty for the use of this document and assumes no responsibility for any errors that can appear in the document nor does it make a commitment to update the information contained herein. For the most current product information, please visit www.landesk.com. Copyright © 2012, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks of LANDesk Software, Inc. and its affiliates in the United States and/or other countries. Other brands and names may be claimed as the property of others. LSI-1017-EN 02/12 MS/BB/AZUU 2 www.landesk.com
  • 3. LANDesk White Paper | Mobile Device Management for Healthcare Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Daunting Challenges for Healthcare IT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 The Solution: Discover, Extend, Secure and Empower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Policy, Tools and Education. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Mobile Device Management Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 LANDesk Advantages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 www.landesk.com 3
  • 4. LANDesk White Paper | Mobile Device Management for Healthcare Introduction Daunting Challenges for Healthcare IT Mobile devices have taken off in healthcare organizations, Mobile devices and platforms represent significant challenges where doctors and other medical staff use smart phones and for healthcare IT, however. Regulations such as HIPAA tablets to access everything from email to health reference and HITECH require healthcare organizations to take materials, electronic health records, medical imaging, and responsibility for managing, securing, and protecting patient survey applications. Mobile devices perform a host of confidential patient information and for reporting any medical, technical, and administrative functions, including breaches that take place. The consequences of a breach can be communicating medical information to patients and families. immense, including steep fines and devastating publicity, not Thanks to the freedom and fast information access enabled by to mention the significant costs incurred in understanding wireless communications, tablets have even begun to replace what was breached, who saw the data, risks, and remediation. patient workstations for accessing and entering patient care Unfortunately, without the right kind of guidance and information in IT healthcare applications. management, personal mobile devices can cause absolute A recent survey by Manhattan Research found that 75 chaos when it comes to confidentiality. Challenges include: percent of American physicians own some kind of Apple Asset Lifecycle Management—When users feel free to bring mobile device and 81 percent use some kind of smart their own devices to work, it can be difficult or sometimes phone—Apple or non-Apple—up from 72 percent the impossible to discover, track, and secure them against the previous year.1 Thirty percent of doctors use iPads to access constantly changing threat landscape. EHRs (electronic health records), view radiology images, and communicate with patients. An additional 28 percent plan User Management—IT can’t depend on doctors and staff to to buy an iPad within the next six months, according to use their devices wisely, as many are ignorant of device security, the report. Other studies have found similar results among privacy, and compliance risks, not to mention how to protect nurses and other healthcare employees and have linked use of mobile devices and the information stored on them from mobile devices with job satisfaction. hackers and theft. The benefits of mobile devices in healthcare are significant. Many unwittingly store confidential information on their Healthcare professionals can collaborate and access tablets or smart phones without any encryption or other information wherever and whenever the need arises, rather form of protection, or use them to send and receive email than having to wait to get to a conference room desk phone, and file attachments containing sensitive information. Others PC, workstation, or file cabinet. The result is faster, often use file sharing applications such as DropBox to store and better decisions and more efficient patient care. transmit information or unsecured personal email services that lie outside of the institution’s messaging and security As with business enterprises, healthcare institutions are infrastructure. Users may also take advantage of unsecured undergoing the consumerization of IT. Rather than looking wireless WiFi connections in coffee shops, hotels, and other to IT for mobile devices and connectivity, healthcare environments to transmit information, not knowing that professionals increasingly take their personal iPhones, iPads, hackers regularly frequent these establishments to penetrate and other mobile devices to work and expect to be able to the devices of unwitting users. use them freely in the medical care environment. Corporate- procured Blackberry smart phones and even workstations, Other hazards are caused by users unknowingly downloading laptops, and desktops are giving way to user-owned iPhones malware-laden mobile applications, accessing infected Web and iPads. With more and more medical schools integrating sites, or using text messaging in ways that introduce malware mobile devices into the curriculum as well, it’s likely that into their devices or open doors for hackers to penetrate mobile device use in healthcare environments will continue to devices, networks, and centralized data stores. grow and job choice and satisfaction among younger health professionals will increasingly be tied partially to the use of the Device Loss and Theft—Mobile device loss and theft, latest mobile technology. including those involving laptops, are the single greatest cause of data breaches at large healthcare organizations, far more common than hacking incidents. 1 Taking the Pulse U.S. Annual Market Research Study v11.0, Manhattan Research, May 4, 2011 4 www.landesk.com
  • 5. LANDesk White Paper | Mobile Device Management for Healthcare Platform Complexity—While servers, PCs, and laptops Know your data—What healthcare information must have run on a few longstanding, seasoned operating systems maximum protection? Where is it stored, and how is it familiar to IT, mobile devices run on a variety of newer, accessed? What data needs a medium level of protection? Who less seasoned operating systems, including iOS and should have access to this data and who should not? Android. The newness and openness of Android represents Know your infrastructure and its vulnerabilities—How a particularly thorny security problem for IT, with Android does the organization protect confidential information today? devices under increasing attack in the past several months. Where are the unique vulnerabilities posed by mobile devices The Solution: Discover, Extend, Secure and which of these are the most hazardous? and Empower Know the risks—What are the overall and unique security Unfortunately, simply forbidding or severely restricting mobile risks of each mobile device platform? What are the risks of or personal devices in the work place is not an option for patient information breaches caused by storing user data on healthcare institutions if they seek to hire and retain younger, mobile devices, or by using personal email, public WiFi, or tech-savvy doctors and medical personnel or compete with personal applications? What are the likely threats to your their more technologically advanced cohorts. Not to mention organization’s mobile devices and confidential information? that many employees are likely to bring in their mobile devices If a breach were to happen, what would the likely costs be to anyway and use them as they wish. Simply forbidding these the organization? It’s important to factor in less tangible yet devices makes it impossible to manage and secure them–and genuine costs such as damage to the institution’s reputation or the information they contain. remediation costs of a breach. Instead, the solution for most healthcare organizations today is Policy, Tools, and Education to embrace their employees’ mobile devices and platforms and Once IT has a handle on the use and risks of mobile platforms use the right combination of policy education and effective in the organization, the next step is to craft a strategy for tools to manage, secure, and protect confidential information. mobile platform security and data protection. In order to do so, IT needs to accomplish several tasks: Sometimes the best way to craft a strategy that balances the Know what you have—First, IT must have a clear picture of mobile needs of employees with the compliance, security, and what mobile devices and mobile device platforms are used by data privacy needs of the organization is to form a mobile employees. This can be a difficult task when workers bring in security strategy task force that includes representatives from personal devices for both work and personal use. Most likely IT, affected departments, and legal counsel. IT will need to meet with each department in the organization Most effective mobile device security strategies consist of a to get a feel for what devices are being used. It’s important to combination of policy, education, and tools. strike a positive attitude that lets users know that the goal is to embrace, empower, and secure mobile devices, not restrict Policy them or punish their users. Your mobile security policy should integrate with your overall Know how mobile devices are used—Are employees using organizational security strategy. Organizations should already their mobile devices to access organization email, electronic have policies in place that spell out which employees and medical records, private patient information, patient surveys? employee roles are permitted access to which categories of Are they accessing personal email services, social networks, information and what they are allowed to do with it, including potentially insecure Web sites? Are they storing patient emailing or sharing it digitally in other ways. information on their devices? Are they downloading consumer Your mobile security policy should add policies that spell out: applications? Do they have any awareness of the need for and Which mobile platforms, such as laptops, tablets, and ways to protect confidential patient information on these smart phones, and which operating systems, such as iOS devices? Are they using public WiFi services? and Android, are permitted in the healthcare environment and who is permitted to use them. www.landesk.com 5
  • 6. LANDesk White Paper | Mobile Device Management for Healthcare Requirements for users to register their mobile devices of device loss and theft, data leakage, and malware, as well as the with IT. data security and privacy requirements and related penalties of What information if any can be stored on employees’ HIPAA, HITECH, and any other relevant regulations. mobile devices and what protections such as passwords, It’s important to demonstrate in a tangible way just encryption, VPNs, backup, etc. need to be implemented how damaging breaches can be by relating stories about to protect this information. organizations that have been breached and the actual Rules for accessing the Web over mobile devices and devastating financial and other impacts of those breaches. downloading and using health and non-health related Keep users aware of breaches that make the news. Make sure applications. Some organizations may want to publish a you repeat education on an ongoing basis and educate new list of approved and unacceptable mobile applications or employees and mobile platform users as soon as possible. even provide their own organization app store where users Users must also be educated at least annually about can download new applications. your organization’s mobile security policies and the user Users should also be put on notice to: responsibilities spelled out by them, as well as any penalties that Always keep mobile devices within their sight. can result from disobeying security policies. If you don’t want users simply tuning out and doing as they please, make sure you Report device loss or theft to appropriate staff balance this education with a positive attitude that recognizes immediately. Mobile device users are known to spend users’ needs and the obvious benefits of mobile platforms. hours or even days trying to locate missing devices before reporting their loss. Mobile Device Management Tools Never share their devices or device passwords with Policies must not only be spelled out, they must be enforced. anyone else. Unfortunately, users tend to do things for the sake of Never connect to the corporate network or transmit convenience that run counter to your organization’s security healthcare information of any type over insecure WiFi policies. That’s why it’s important to put the appropriate tools networks without using virtual private networking or in place to enforce company policies and to discover, manage, other tools that secure data in transit. and secure mobile platforms. Never transmit sensitive information over unsecured The first line of defense in any environment incorporating personal email or data sharing services, either in the form mobile devices and platforms is an enterprise mobile device of text, attachments, or information cut and pasted from management (MDM) solution. MDM systems provide a sensitive documents. host of tools for identifying, managing, and securing mobile Keep Bluetooth out of discovery mode when not in use. platforms of all types and their users. Some of the features of an effective mobile device management platform include: Understand that jailbroken smart phones or tablets will never be allowed in the organization. Discovery—The ability to discover all mobile devices and IT should also have policies for locating and wiping lost or platforms that connect to the corporate network and create stolen mobile devices and protecting mobile devices from a device inventory database that can be used to manage these malware. As with any other IT assets, policies should be in place platforms over their entire lifecycle. The application should for addressing security when employees leave the organization. not permit users to connect their devices to the network or messaging systems until they are approved and properly Education registered with the MDM system. The MDM system should Policy is not very useful if it’s not backed up with an effective be able to easily grandfather existing platforms as well. employee education program. Mobile device users must be Extended Hardware and Software Inventory—including educated in depth about the security challenges posed by mobile memory, batteries, installed applications, policies, and devices in the work environment and proper measures they network information. must take to address them. They should understand the hazards 6 www.landesk.com
  • 7. LANDesk White Paper | Mobile Device Management for Healthcare Mobile Platform Diversity—The best mobile device Remote Notification—that can alert all device users to the management systems cover all the most popular mobile availability of new resources and any required user actions platforms and operating systems, including Blackberry, Apple, through its own application portal. and Android tablets and smart phones, and can take advantage Jailbreak and Rooting Detection—The ability to detect of each mobile platform’s native OS policies, security features, jailbroken or rooted mobile devices to determine if the device and other capabilities. is compliant, if any action should be taken, or any policies Easy Self Enrollment—Users are able to enroll with the should be invoked. network directory, such as Active Directory, and the MDM A Controlled Browser—for launching links and limiting sites system themselves after which the system configures the user users can access based on corporate policy and security and and device and implements appropriate security policies compliance requirements. automatically. Some MDM systems provide access to a company app store, similar to Apple’s app store, where users Encryption—of any sensitive information in transit and at rest. can download a management agent and other approved applications and enroll without the help of IT. LANDesk Advantages Zero-Touch Management—The ability to execute Several MDM solutions are available on the market today, each with its own set of features and capabilities. LANDesk® management functions, including software distribution, WiFi Mobility Manager stands out as a market-leading solution and messaging configuration, and administrator updates across from a software vendor that can boast 25 years of stability, mobile platforms from a central console, without any need for experience, and IT systems management expertise controlling physical access to the devices themselves. and managing desktops and laptops—and more recently the Workforce Segmentation—based on user roles, multiple mobile devices users increasingly carry. responsibilities, and corporate policies, with appropriate LANDesk Mobility Manager offers the best of both worlds— control of access to corporate information, content, and the ability to apply discovery, inventory, security, and applications based on these roles. This MDM solutions management capabilities to mobile devices from a single, element helps organizations implement a solution that is not a easy-to-use console, while enabling IT to offer self-service one-size-fits-all model, allowing effective segmentation based options to users within the LANDesk application portal. on the role of the end user within your organization. This portal serves as a repository for apps, files, videos, and Self Service Application and Content Portal—Some other corporate resources that your users can access without MDM platforms offer secure corporate portals that enable submitting to, or resorting to the horizontal app stores employees to access approved and in-house applications, as such as iTunes and Android Marketplace. This capability well as files, videos, and other safe information and resources is essential to controlling and securing applications in a the organization desires to make available to mobile users. healthcare environment. In environments that require the absolute highest level of Organizations can use the same LANDesk console and confidentiality, it’s useful for the MDM system to have database to manage smart phones and tablets that they use the option of streaming all content to each device so that to manage desktops and laptops. This level of integration confidential information is never stored there and susceptible translates into significant total-cost-of-ownership advantages. to theft or loss. According to IDC, the use of LANDesk as a comprehensive Phone Location—The ability to track and report device hardware and end-user management system can save more locations and provide a location history that can be useful in than $23,000 per 100 users per year.2 tracing the device in case of loss or theft. There’s no need for IT to develop a relationship with another Remote Lock, Password Reset, and Wipe—The ability management vendor and provide the requisite training and to automatically lock a lost or stolen device remotely and resources for an entirely new platform, with its own unique eliminate any sensitive information stored on it. issues and quirks. 2 Gaining Business Value and ROI with LANDesk Software: Automated Change and Configuration Management, IDC, January 2011 www.landesk.com 7
  • 8. LANDesk White Paper | Mobile Device Management for Healthcare As shown below, LANDesk Mobility Manager simply installs on top of a LANDesk Management Suite 9 core server, plus the addition of the cloud-facing components in the DMZ and the LANDesk mobile device management server. The same, familiar console is used to manage the new devices. Conclusion Mobile device platforms in medical environments are here to stay given the advantages for patient care that are impossible to ignore. At the same time, patient privacy and confidentiality requirements of HIPAA, HITECH, and other regulations present significant challenges to the use of mobile platforms in a secure fashion that protects patient confidentiality and ensures compliance. Mobile Device Management platforms provide one of the principal ways to meet these challenges while empowering healthcare employees with all the convenience and patient care advantages today’s mobile platforms offer. With LANDesk, the user is the endpoint, not the device. A user-centered, policy-based approach is more logical and far less cumbersome than a device-centered approach in today’s typical work environments where each user connects to the network with multiple devices. LANDesk Mobility Manager provides a full-featured, integrated mobile platform management solution. Healthcare institutions can manage and secure all their users’ desktops, laptops, and mobile devices effectively for the lowest possible capital and operating costs. 8 www.landesk.com