CyberDefense for Information
Risk Management

CyberDefense is an integrated solution that combines best of breed practices and components into a robust cyber defense program. CyberDefense combines asset discovery, vulnerability assessment, intrusion detection, behavioral monitoring, and security information and event management (SIEM) as well as integrated threat intelligence. CyberDefense offers platform that enables Intersect to quickly detect, prioritize, and respond to threats in our customer's networks.

Asset Discovery

Asset discovery produces an inventory of authorized and unauthorized devices on the network. Through this process, only authorized devices will be given access, and unauthorized and unmanaged devices are discovered and prevented from gaining access. Critical security controls incorporated into Asset Discovery include:

  1. Authorized Assets
  2. Unauthorized Assets
  3. Passive Network Monitoring
  4. Active Network Scanning
  5. Inventory of Authorized and Unauthorized Software
  6. Traffic Pattern Detection

Vulnerability Assessments

Vulnerability assessments identify assets with unpatched software, insecure configurations and other vulnerabilities on your network. With that knowledge, you can take steps to improve your security posture. Security controls built-in to the assessment tool include:

  1. Vulnerability Assessment and Remediation
  2. Secure Configurations for Hardware and Software
  3. Host Intrusion Detection and File Integrity Monitoring
  4. Controlled Use of Administrative Privileges
  5. Log Analysis - Custom Events Fired on Certain Logins

Intrusion Detection

Intrusion Detection is an important component of the CyberDefense platform. The following security controls are a portion of those incorporated into the solution:

  1. Boundary Defense
  2. Data Protection
  3. Controlled Access Based on the Need to Know
  4. Wireless Access Control
  5. Account Monitoring and Control
  6. Application Software Security
  7. Incident Response and Management
  8. Event Correlation and Integrated Threat Intelligence

SIEM Technology

  1. The CyberDefense Platform
  2. Email and Web Browser Protections
  3. Malware Defenses
  4. Limitation and Control of Network Ports, Protocols, and Services
  5. Data Recovery Capability
  6. Secure Configurations for Network Devices such as Firewalls, Routers and Switches

All services are offered on a subscription basis to enable their cost to be categorized as operating expense. Subscriptions are tiered to enable healthcare organizations to choose the plan most appropriate for them.

The intersection of health and technology

CONTACT

230 Northgate Street #145,
Lake Forest, IL 60045
(888) 772-2685
info@intersecthealth.net

LATEST TWEETS