SlideShare a Scribd company logo
1 of 2
Download to read offline
Healthcare System Switches to Agentless
Trend Micro VDI Security
Trend Micro™ Deep Security maximizes the returns on virtualization investments with
virtualization-aware protection and simplicity.
“ Everyone else is at least 18 months behind Trend Micro, as far as securing virtual environments...
 Trend Micro is taking VDI security in the right direction.”
           —Roland J. Anderson, Manager, IT Infrastructure Support Team, Baptist Hospitals of Southeast Texas



                                                   Challenge
EXECUTIVE SUMMARY                                  For more than 50 years, the Baptist Hospitals of Southeast Texas have served the
Customer Name: Baptist Hospitals of                communities of the “Golden Triangle.” In the dynamic world of patient care, the physicians
Southeast Texas                                    and staff at these hospitals have a history of embracing change to drive continual
Industry: Healthcare                               improvements into the delivery of life-impacting services.
Location: Beaumont, Texas                          Last year, the technology team that supports the Baptist Hospitals’ infrastructure
Web site: www.mhbh.org                             convinced management to invest in virtualization solutions that could ultimately drive
Number of Employees: 3,000                         down server and endpoint costs at both sites. Of course, as a healthcare organization,
                                                   compliance with data privacy regulations is a major priority.
CHALLENGE:
• Maximize the consolidation of server and         “Our existing endpoint security solution purportedly supported virtualized environments,
  endpoint hardware                                but when we installed it on our VMware virtual servers, it brought the systems to their
• Minimize the time and cost of managing user      knees,” said Roland Anderson, manager of the IT infrastructure support team at Baptist
  sessions and desktops                            Hospitals of Southeast Texas. “We needed a security solution that could protect the
• Maintain compliance with HIPAA and other         virtual layer and not impact server performance. McAfee’s solution had to be installed on
  healthcare regulations                           each server and the footprint was too big to be practical.”
• Align security with virtualization initiatives
                                                   Solution
SOLUTION:
                                                   Besides virtualizing servers, Baptist Hospitals also wanted to introduce a virtual desktop
• Switch to Trend Micro Deep Security for
  protecting virtual servers and endpoints
                                                   infrastructure (VDI). The IT team turned to INX Inc., its technology consultants, to
                                                   overcome the challenges of securing virtual servers and VDI endpoints. The virtualization
BUSINESS RESULTS:                                  experts at INX recommended a Trend Micro solution.
• Better security on virtual platforms, compared
  to pre-existing endpoint security solution       “Trend Micro is definitely the leader when it comes to securing virtualized environments,”
  (fewer incidents)                                said Michael Brown, senior virtualization consultant at INX. “The Trend Micro management
                                                   consoles are very easy to use—very intuitive. Trend Micro Deep Security is a great
• Excellent server performance, even during
  security scans or updates, with agentless        product, right out of the box.”
  security                                         Deep Security is the only security solution currently available that integrates with
• Automatic extension of security to all new       VMware’s vShield Endpoint Security (EPSEC) APIs. With true agentless virus protection
  virtual machines and user sessions               that is automatically extended to each virtual desktop and server, Baptist Hospitals
• Highly integrated security, leveraging VMware    does not have to compromise on security, performance, or return on investment for its
  vShield APIs                                     virtualization investments.
                                                   By leveraging the threat intelligence of the Trend Micro™ Smart Protection Network™
                                                   infrastructure, Deep Security provides sophisticated cloud-based reputation technologies,
                                                   feedback loops, and the expertise of TrendLabsSM researchers to deliver real-time
                                                   protection from emerging threats.



HEALTHCARE I CASE STUDY                                                                                                              Page 1 of 2
TREND MICRO I BApTIST HoSpITAlS of SoUTHEAST TExAS




“Everyone else is at least 18 months behind Trend Micro, as far as securing virtual           DEPLOYMENT ENVIRONMENT
environments,” said Anderson. “We deployed Deep Security and that was it—it helped            2 sites
solve all of the performance problems we had with McAfee and the Trend Micro solution         100 servers; 2,100 PCs
is easier to manage. Now we can move forward and deploy more VDI endpoints while
                                                                                              1,000 VDI sessions, with plans to virtualize
maintaining compliance with HIPAA and other healthcare-related regulations. Trend
                                                                                              90% of endpoints
Micro is taking VDI security in the right direction.”
                                                                                              VMware ESX servers (Cisco hardware)
Today, Baptist Hospitals has switched to Deep Security for its VMware servers and VMware      VMware View
View VDI environment. In the future, when its previous endpoint security solution licenses
                                                                                              VMware vCenter
are up for renewal, the IT team plans to switch completely to Trend Micro™ Enterprise
                                                                                              Trend Micro Deep Security
Security for an integrated virtual and traditional endpoint security solution.
                                                                                              Customer Profile
Results                                                                                       The Baptist Hospitals of Southeast Texas are
The immediate benefit from Deep Security has been improved security. “Our virtual             not-for-profit, community-owned, health care
environments are now very secure and stable, with no incidents,” said Anderson. “On           facilities with spiritual values, dedicated to
                                                                                              providing high quality health services in a
the McAfee endpoints, there had been three or four security incidents involving viruses,
                                                                                              Christian environment. With hospitals in
malware, or spyware that were not blocked.”                                                   Beaumont and Orange, the Baptist Hospitals
With the critical security issues resolved by introducing Deep Security, Baptist Hospitals’   are affiliates of the Memorial Hermann Heath-
                                                                                              care System. Leading-edge research capabili-
virtualization initiatives are moving forward. Approximately 90% of all applications are
                                                                                              ties and state-of-the-art technology help the
now deployed on virtual servers, and the organization plans to deploy about the same
                                                                                              physicians at Baptist Hospitals provide supe-
percentage of desktops.                                                                       rior patient care and rank the hospitals among
“Our VMware servers and VDI platforms have allowed us to cost-effectively consolidate         the leaders in the healthcare field.
hardware,” said Anderson. “VDI is a good model for us since we have multiple shifts of        Partner Profile
employees that share desktop systems. Eventually we can give each employee access             INX Inc. is a leading U.S. provider of IP
to their desktop from any endpoint. VMware View lets us support a single desktop image,       communications and data center solutions
which greatly simplifies the management of user sessions.”                                    for enterprise organizations. INX offers a suite
                                                                                              of advanced technology solutions focused
Switching to Trend Micro VDI security has also simplified management for security.            around the entire lifecycle of enterprise IP
“Deep Security handles updates on a system level—and a single instance protects all of        network communications and data center
the virtual machines,” said Anderson.                                                         infrastructure. Services are centered on
                                                                                              the design, implementation, and support
Any VDI session or server application immediately benefits from Deep Security protection.     of network infrastructure, including routing
Scans are performed in a serialized fashion, avoiding “AV storms” that would otherwise        and switching, wireless, security, unified
slow all of the virtual machines on the server.                                               communications, and data center solutions
                                                                                              such as storage and server virtualization.
“Baptist Hospitals now has a very cost-effective VDI model in place,” said Brown. “As         Customers include enterprise organizations
the organization converts other departments from traditional PCs to thin clients, they        and federal, state, and local governmental
can reduce long-term desktop hardware costs as well as ongoing cost of ownership for          agencies. Additional information about INX
managing PC system software and security. We are seeing a huge increase in the number         can be found at www.inxi.com.
of organizations of all sizes that are migrating to VMware’s VDI platform—it makes sense
considering the current economy where everyone is looking for ways to reduce costs.”          Trend Micro Security
                                                                                              • Trend Micro Deep Security
                                                                                                http://us.trendmicro.com/us/solutions/
                                                                                                enterprise/security-solutions/virtualization/
“ No one can come close to Trend Micro, in terms of                                             deep-security/index.html

  integration with VMware… Trend Micro Deep Security                                          Trend Micro Enabling Technology

  is a great product, right out of the box.”                                                  • Trend Micro Smart Protection Network
                                                                                                http://us.trendmicro.com/us/trendwatch/
                                                                                                core-technologies/smart-protection-network/
     — Michael Brown, Senior Virtualization Consultant,
       INX Inc. (technology partner, Baptist Hospitals of Southeast Texas)




                                                                                              © 2011 Trend Micro Incorporated. All rights reserved. All Trend Micro
                                                                                              company, product and service names and slogans are trademarks or
                                                                                              registered trademarks of Trend Micro Incorporated. Other names and
                                                                                              marks are the property of their respective owners.
                                                                                              CS_BAPTISTHOSP_DS_VDI_MAY2011

                                                                                              www.trendmicro.com




HEALTHCARE I CASE STUDY                                                                                                                                   Page 2 of 2

More Related Content

What's hot

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityAndrew Wong
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Cryptika cybersecurity - company profile
Cryptika cybersecurity - company profileCryptika cybersecurity - company profile
Cryptika cybersecurity - company profileSafwan Talab
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Securitynmullen
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computingBharat Gupta
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defenseZsolt Nemeth
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsZsolt Nemeth
 

What's hot (20)

Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep SecurityIntroduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Cryptika cybersecurity - company profile
Cryptika cybersecurity - company profileCryptika cybersecurity - company profile
Cryptika cybersecurity - company profile
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computing
 
Moving target-defense
Moving target-defenseMoving target-defense
Moving target-defense
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
SCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systemsSCIT Labs - intrusion tolerant systems
SCIT Labs - intrusion tolerant systems
 

Similar to [Case Study ~ 2011] Baptist Hospitals of Southest Texas

Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationVMware
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Is Your Distributed Workforce Future Ready?
Is Your Distributed Workforce Future Ready?Is Your Distributed Workforce Future Ready?
Is Your Distributed Workforce Future Ready?Insight
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threatswhite paper
 
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study patmisasi
 
Sunnybrook Health Sciences - Scalar customer case study
Sunnybrook Health Sciences - Scalar customer case studySunnybrook Health Sciences - Scalar customer case study
Sunnybrook Health Sciences - Scalar customer case studyScalar Decisions
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxSonaliG6
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudInsight
 
Trend Micro & VMware Datasheet
Trend Micro & VMware DatasheetTrend Micro & VMware Datasheet
Trend Micro & VMware DatasheetArrow ECS UK
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)VMware
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXColloqueRISQ
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Private Cloud
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9VMware
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemSymantec
 

Similar to [Case Study ~ 2011] Baptist Hospitals of Southest Texas (20)

Infographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network VirtualizationInfographic: Why Businesses are Adopting Network Virtualization
Infographic: Why Businesses are Adopting Network Virtualization
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 
Meander Medisch Centrum
Meander Medisch CentrumMeander Medisch Centrum
Meander Medisch Centrum
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Is Your Distributed Workforce Future Ready?
Is Your Distributed Workforce Future Ready?Is Your Distributed Workforce Future Ready?
Is Your Distributed Workforce Future Ready?
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Protecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest ThreatsProtecting Dynamic Datacenters From the Latest Threats
Protecting Dynamic Datacenters From the Latest Threats
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study Scalar Decisions Sunnybrook Health Sciences VDI Case Study
Scalar Decisions Sunnybrook Health Sciences VDI Case Study
 
Sunnybrook Health Sciences - Scalar customer case study
Sunnybrook Health Sciences - Scalar customer case studySunnybrook Health Sciences - Scalar customer case study
Sunnybrook Health Sciences - Scalar customer case study
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Guide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public CloudGuide to Sharpening Security in the Public Cloud
Guide to Sharpening Security in the Public Cloud
 
Trend Micro & VMware Datasheet
Trend Micro & VMware DatasheetTrend Micro & VMware Datasheet
Trend Micro & VMware Datasheet
 
Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)Moving Forward with Network Virtualization (VMware NSX)
Moving Forward with Network Virtualization (VMware NSX)
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSXComment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 

More from Trend Micro

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesTrend Micro
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeTrend Micro
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Trend Micro
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Trend Micro
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaTrend Micro
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)Trend Micro
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsTrend Micro
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeTrend Micro
 

More from Trend Micro (20)

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, Vulnerabilities
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at Large
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in Asia
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Security Best Practices for Health Information Exchange
Security Best Practices for Health Information ExchangeSecurity Best Practices for Health Information Exchange
Security Best Practices for Health Information Exchange
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

[Case Study ~ 2011] Baptist Hospitals of Southest Texas

  • 1. Healthcare System Switches to Agentless Trend Micro VDI Security Trend Micro™ Deep Security maximizes the returns on virtualization investments with virtualization-aware protection and simplicity. “ Everyone else is at least 18 months behind Trend Micro, as far as securing virtual environments... Trend Micro is taking VDI security in the right direction.” —Roland J. Anderson, Manager, IT Infrastructure Support Team, Baptist Hospitals of Southeast Texas Challenge EXECUTIVE SUMMARY For more than 50 years, the Baptist Hospitals of Southeast Texas have served the Customer Name: Baptist Hospitals of communities of the “Golden Triangle.” In the dynamic world of patient care, the physicians Southeast Texas and staff at these hospitals have a history of embracing change to drive continual Industry: Healthcare improvements into the delivery of life-impacting services. Location: Beaumont, Texas Last year, the technology team that supports the Baptist Hospitals’ infrastructure Web site: www.mhbh.org convinced management to invest in virtualization solutions that could ultimately drive Number of Employees: 3,000 down server and endpoint costs at both sites. Of course, as a healthcare organization, compliance with data privacy regulations is a major priority. CHALLENGE: • Maximize the consolidation of server and “Our existing endpoint security solution purportedly supported virtualized environments, endpoint hardware but when we installed it on our VMware virtual servers, it brought the systems to their • Minimize the time and cost of managing user knees,” said Roland Anderson, manager of the IT infrastructure support team at Baptist sessions and desktops Hospitals of Southeast Texas. “We needed a security solution that could protect the • Maintain compliance with HIPAA and other virtual layer and not impact server performance. McAfee’s solution had to be installed on healthcare regulations each server and the footprint was too big to be practical.” • Align security with virtualization initiatives Solution SOLUTION: Besides virtualizing servers, Baptist Hospitals also wanted to introduce a virtual desktop • Switch to Trend Micro Deep Security for protecting virtual servers and endpoints infrastructure (VDI). The IT team turned to INX Inc., its technology consultants, to overcome the challenges of securing virtual servers and VDI endpoints. The virtualization BUSINESS RESULTS: experts at INX recommended a Trend Micro solution. • Better security on virtual platforms, compared to pre-existing endpoint security solution “Trend Micro is definitely the leader when it comes to securing virtualized environments,” (fewer incidents) said Michael Brown, senior virtualization consultant at INX. “The Trend Micro management consoles are very easy to use—very intuitive. Trend Micro Deep Security is a great • Excellent server performance, even during security scans or updates, with agentless product, right out of the box.” security Deep Security is the only security solution currently available that integrates with • Automatic extension of security to all new VMware’s vShield Endpoint Security (EPSEC) APIs. With true agentless virus protection virtual machines and user sessions that is automatically extended to each virtual desktop and server, Baptist Hospitals • Highly integrated security, leveraging VMware does not have to compromise on security, performance, or return on investment for its vShield APIs virtualization investments. By leveraging the threat intelligence of the Trend Micro™ Smart Protection Network™ infrastructure, Deep Security provides sophisticated cloud-based reputation technologies, feedback loops, and the expertise of TrendLabsSM researchers to deliver real-time protection from emerging threats. HEALTHCARE I CASE STUDY Page 1 of 2
  • 2. TREND MICRO I BApTIST HoSpITAlS of SoUTHEAST TExAS “Everyone else is at least 18 months behind Trend Micro, as far as securing virtual DEPLOYMENT ENVIRONMENT environments,” said Anderson. “We deployed Deep Security and that was it—it helped 2 sites solve all of the performance problems we had with McAfee and the Trend Micro solution 100 servers; 2,100 PCs is easier to manage. Now we can move forward and deploy more VDI endpoints while 1,000 VDI sessions, with plans to virtualize maintaining compliance with HIPAA and other healthcare-related regulations. Trend 90% of endpoints Micro is taking VDI security in the right direction.” VMware ESX servers (Cisco hardware) Today, Baptist Hospitals has switched to Deep Security for its VMware servers and VMware VMware View View VDI environment. In the future, when its previous endpoint security solution licenses VMware vCenter are up for renewal, the IT team plans to switch completely to Trend Micro™ Enterprise Trend Micro Deep Security Security for an integrated virtual and traditional endpoint security solution. Customer Profile Results The Baptist Hospitals of Southeast Texas are The immediate benefit from Deep Security has been improved security. “Our virtual not-for-profit, community-owned, health care environments are now very secure and stable, with no incidents,” said Anderson. “On facilities with spiritual values, dedicated to providing high quality health services in a the McAfee endpoints, there had been three or four security incidents involving viruses, Christian environment. With hospitals in malware, or spyware that were not blocked.” Beaumont and Orange, the Baptist Hospitals With the critical security issues resolved by introducing Deep Security, Baptist Hospitals’ are affiliates of the Memorial Hermann Heath- care System. Leading-edge research capabili- virtualization initiatives are moving forward. Approximately 90% of all applications are ties and state-of-the-art technology help the now deployed on virtual servers, and the organization plans to deploy about the same physicians at Baptist Hospitals provide supe- percentage of desktops. rior patient care and rank the hospitals among “Our VMware servers and VDI platforms have allowed us to cost-effectively consolidate the leaders in the healthcare field. hardware,” said Anderson. “VDI is a good model for us since we have multiple shifts of Partner Profile employees that share desktop systems. Eventually we can give each employee access INX Inc. is a leading U.S. provider of IP to their desktop from any endpoint. VMware View lets us support a single desktop image, communications and data center solutions which greatly simplifies the management of user sessions.” for enterprise organizations. INX offers a suite of advanced technology solutions focused Switching to Trend Micro VDI security has also simplified management for security. around the entire lifecycle of enterprise IP “Deep Security handles updates on a system level—and a single instance protects all of network communications and data center the virtual machines,” said Anderson. infrastructure. Services are centered on the design, implementation, and support Any VDI session or server application immediately benefits from Deep Security protection. of network infrastructure, including routing Scans are performed in a serialized fashion, avoiding “AV storms” that would otherwise and switching, wireless, security, unified slow all of the virtual machines on the server. communications, and data center solutions such as storage and server virtualization. “Baptist Hospitals now has a very cost-effective VDI model in place,” said Brown. “As Customers include enterprise organizations the organization converts other departments from traditional PCs to thin clients, they and federal, state, and local governmental can reduce long-term desktop hardware costs as well as ongoing cost of ownership for agencies. Additional information about INX managing PC system software and security. We are seeing a huge increase in the number can be found at www.inxi.com. of organizations of all sizes that are migrating to VMware’s VDI platform—it makes sense considering the current economy where everyone is looking for ways to reduce costs.” Trend Micro Security • Trend Micro Deep Security http://us.trendmicro.com/us/solutions/ enterprise/security-solutions/virtualization/ “ No one can come close to Trend Micro, in terms of deep-security/index.html integration with VMware… Trend Micro Deep Security Trend Micro Enabling Technology is a great product, right out of the box.” • Trend Micro Smart Protection Network http://us.trendmicro.com/us/trendwatch/ core-technologies/smart-protection-network/ — Michael Brown, Senior Virtualization Consultant, INX Inc. (technology partner, Baptist Hospitals of Southeast Texas) © 2011 Trend Micro Incorporated. All rights reserved. All Trend Micro company, product and service names and slogans are trademarks or registered trademarks of Trend Micro Incorporated. Other names and marks are the property of their respective owners. CS_BAPTISTHOSP_DS_VDI_MAY2011 www.trendmicro.com HEALTHCARE I CASE STUDY Page 2 of 2