Ransomware, advanced persistent threats, and insider threats affect the healthcare industry more than the rest. Ransomware attacks have graduated past local machine exploitation and are now sophisticated enough to spread payloads across the network undetected by leveraging unsecured network paths.
Users, devices, and applications at hospitals, clinics, and healthcare facilities in general, offer too much network access to medical devices and patient information. There is little-to-no East-West network security coupled with a lack of visibility of unmanaged devices and shadow IT applications within the same zone of IoMT and other clinical resources. Third-party vendors require access to specific resources, yet more often than not can access the whole network. There is limited control, often deployed away from the access layer, and it is spread across many solutions using legacy methodologies, which incurs high operation and capital costs to maintain.
Elisity elegantly addresses the network security concerns around lateral movement through a cloud-delivered software-first platform. Elisity Cognitive Trust delivers fast and simple identity-based microsegmentation and least privilege access of users, devices, and applications, with policies enforced at OSI L2, L3, and L4, leveraging existing switching infrastructure and identity sources.
“Within 24 hours of deploying Elisity Cognitive Trust on our Cisco Catalyst switches, we discovered devices of which we had no prior visibility, giving us insights into actions needed. With help from the Elisity team, we created simple and scalable policies to secure our assets, and we were able to enforce them in real-time. The potential of gaining East-West security for managed and unmanaged users and clinical devices without additional hardware in our campus network is absolutely game-changing for our organization.”
Business Information Security Officer
To reduce the attack surface.
Reduces risk by automatically discovering, classifying, and applying least privilege access policy to users, applications, and IoT, IoMT, and IT devices, including assets previously not managed in the network, thus isolating shadow IT and rogue devices from clinical resources.
To contain breaches
Minimizes the impact of breaches by keeping malicious traffic from moving laterally in the network and by enabling continuous threat detection. Security and networking defined by type of asset rather than lPs and ports, with simple policies that are identity-based.
The solution architecture can leverage pre-existing investments in Cisco, Dell, Extreme, and other vendor switches, by turning them into intelligent policy enforcement points with the use of containers, and makes use of hypervisors where edge computing is not available. Cognitive Trust passively gleans, and continuously verifies, the identity of IoMT devices, users, and applications traversing the network, to enforce policies as close to the clinical assets as possible. It integrates with user, application, and device identity sources so organizations can very quickly gain visibility into network assets and traffic flows, assess risks, and begin building policies, to secure healthcare resources from malicious network traffic.