Compliance tool the cure for university's health records

 

Connecting state and local government leaders

The new Compliance Software Blade lets USF Health easily answer the question, "How are we doing on compliance?"

The University of South Florida Health has clinics, research and education facilities in seven locations around the state in addition to its main campus in Tampa, all of them subject to privacy regulations under the Health Insurance Portability and Accountability Act.

More Info

Are you in compliance?

Many regulatory requirements are supported by the Check Point Compliance Software Blade. Check the list.

“We have to meet HIPAA requirements, that’s the first challenge,” said Tim Bulu, information security officer at USF Health. Having firewalls in place to secure the systems is important, but there was only one person to monitor the firewalls in eight locations and to answer the question, “how are we doing on compliance?” he said.

When Bulu heard last year that firewall vendor Check Point Software Technologies was looking for test sites for its new governance, risk management and compliance monitoring tool, “both of my hands were in the air,” he said. “When they showed that dashboard, to me that was a beautiful thing. We’re all about dashboards here.”

Four months into the testing of Check Point’s Compliance Software Blade, Bulu remains enthusiastic about the tool, which provides a single window on policies and regulatory requirements across multiple devices at multiple locations.

“It saves on staff,” he said. Although the USF Health system is not as large or complex as some other enterprises, the firewall administrator also is busy with other jobs, including security analysis, managing desktops and internal security. “He doesn’t have all day to set there and comb through logs.” Now, compliance reports for audits can be printed on demand, the administrator is alerted to changes in security posture and the possible regulatory impact of changes to firewall policy are flagged automatically with suggestions for maintaining compliance.

The Compliance Software Blade, general availability of which was announced in March, is the product of Check Point’s 2011 acquisition of Dynasec, a privately held vendor of governance, risk management and compliance (GRC) technology.

“The compliance world is relatively new,” said Mati Ram, head of GRC at Check Point. Privacy and security concerns are being translated into an increasing number of industry and government regulations for sensitive industries, critical infrastructures and universities, as well as government agencies. Implementing security controls and policies to meet these requirements can be challenging, but it is only the first step in compliance. Systems must be monitored or regularly checked to ensure they remain in compliance and documented for reporting and auditing.

The new compliance tool is part of the company’s software blade architecture, a collection of logical components that lets users enable and configure specific tools and functionality in an appliance as needed. The compliance blade assesses the status of other Check Point gateways and security blades against a catalog of best security practices, regulatory requirements and guidelines, including the recommended security controls from the National Institute of Standards and Technology. Once the initial assessment has been made, changes to policy and configuration are monitored and users are alerted to the possible impact. If security or compliance is threatened, corrections are suggested. It also can produce automated reports.

The compliance blade supports Check Point’s firewall, IPsec, VPN, mobile access, IPS, anti-bot antivirus and anti-spam, identity awareness, application control, URL filtering and data loss prevention software blades.

Check Point hosts a database of best practices and regulatory requirements that keeps products updated with current information. The challenge in developing the tool was creating the architecture to rationalize data across a variety of tools to link with best practices and regulations. “It took us a year-and-a-half to do that,” Ram said.

USF Health is an umbrella health sciences center that includes the University of South Florida’s colleges of medicine, nursing, public health and pharmacy and its schools of physical therapy and biomedical sciences. The Compliance Software Blade was a good option for the school because it already had Check Point products in place.

“We’ve been a Check Point partner for about 13 years now,” Bulu said. The company introduced the concept of stateful firewalls that inspect and block traffic based on the type of connection, giving it more granularity and flexibility. This made configuring and managing the firewalls more intuitive, which was a big convenience, Bulu said. The ability to manage multiple devices through a central console also is a big advantage for a small shop with limited manpower for administering the tools, he said.

USF Health installed the compliance blade in December and got a day of training on using it from the developers.

“It wasn’t tough to get it installed and running,” Bulu said. But he admits that his shop is not taking full advantage of all of the features. “There is more than one way to skin a cat with this blade, to get the information you want when you drill down deep.” At present, it is used to mainly to identify problems and potential problems on the dashboard, which codes devices and functions with green, yellow and red, drilling down only on the problem areas to get suggested fixes.

“We’ve found a couple of problems,” he said. “Nothing big; they were yellow things, not red things.”

Just as important as the ability to spot and solve problems is the ability to know and document the status of the security system. “If you have a need to know that you are in compliance and you don’t have the staff to constantly audit, this is a great tool,” he said.

As an early tester of the product, Bulu had one suggestion for tool: Make the dashboard accessible through the Web, which would make it easier to keep upper management informed. “C-level people want to know, ‘are we in compliance?’” With Web access they could check it out themselves rather than ask him.

Regulatory requirements supported by the Check Point Compliance Software Blade

Regulation Description
ISO 27001

International Standards Organization framework for information security management.

ISO 27002

Implementation guidelines for the 133 control objectives in ISO 27001.

HIPAA

U.S. Health Insurance Portability and Accountability Act.

PCI DSS

Payment Card Industry Data Security Standards.

DSD

Top 35 IT security mitigation strategies from Australia’s Defense Signals Directorate.

GLBA

Gramm-Leach-Bliley Act Financial Privacy Requirements.

NIST SP 800-41

NIST guidelines on Firewalls and Firewall Policy.

NIST SP 800-53

NIST recommended security controls for FISMA and FIPS 200 requirements.

COBIT 4.1 (IT SOX)

Control Objectives for Information and Related Technology, for system security.

UK Data Protection Act

U.K. law that governs the protection of personal data.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.