This webinar provided an overview of the latest changes to healthcare data security and what technologies are needed to comply. Major changes discussed included expanded obligations for business associates under HIPAA, new requirements for breach notification, and increased enforcement and penalties. The webinar emphasized the importance of a defense-in-depth security approach using integrated technologies like encryption, access controls, and intrusion prevention to deliver a secure and compliant healthcare environment.
1. Healthcare Data Security Update
Latest Changes and What Technologies You
Need to Comply
Live Webinar
August 25, 2009
Sponsored by 3COM
2. informed Healthcare Data Security Update:
Latest Changes and What
Technologies You Need to Comply
Healthcare Informatics Webinar
August 25, 2009
www.morganlewis.com
26. Defense in Depth Security Solutions
Integrated End-to-End Security
Sean Newman, Global Product Manager, Security
3Com Confidential, NDA Required
3Com Confidential, NDA Required
26
27. 3Com Delivers “No Compromise” Enterprise Networking
Data Center Campus Branch
Ultra Modern Lower TCO Defense
Architecture By Design In Depth
Ease of integration, future Lower operational and End to end defense-in-
proof investment protection, capital costs depth, fewer incidents
“green,” faster time to service per dollar spent
delivery/enablement
3Com Confidential
3Com
27
Security
28. Defense in Depth – The Secure Network Fabric
3Com Enterprise Security
› Accommodates large customers › End to end solution for branch office,
(e.g. CNPC - 10K VPN locations) LAN and Data Center
› Standalone and embedded › Integrated best of breed technologies
› Multi-core processing › Internal and External Comprehensive
architecture for high scaling Perimeter protection
Defense
in
Depth
Architecture
Easier to install
and Manage
› NOC/SOC experience
with IMC Integration
› Comware enterprise
class OS
› Proactive security
with IPS/iMC/NAC
3Com Confidential
3Com
28
Security
32. Integrated Flexible IPS Deployment
TippingPoint Centralized Policy and
Digital Vaccine Configuration Management
Service Integrates with IMC
• INTERNAL ATTACKS AGAINST
– WIRED / WIRELESS LAN
INFRASTRUCTURE
– DATA CENTER
• INTERNAL & EXTERNAL ATTACKS
– MAJOR NETWORK SEGMENTS
• EXTERNAL ATTACKS THROUGH
– CORPORATE WAN PERIMETER
– WEB APPLICATION INFRASTUCTURE
– ROBO
– SERVICE PROVIDER / PARTNER PERRING POINTS
3Com Confidential
3Com
32
Security