The healthcare organizations face numerous challenges in maintaining the privacy of their patients’ Electronic Health Record (EHR) and meeting various compliances by HIPAA. The recent attack on Alhambra Hospital Medical Center (AHMC) healthcare office near Los Angeles resulted in the leak of 700,000 patient records, which necessitated increased security against data threats in this sector. This industry vertical is lately getting overloaded with patient data, clinical data, claim data, hospital systems, financial data, pharmacy data, and other forms of data from wearable technology sources. Therefore, this industry vertical is shifting to electronic health records and periodically updating the reporting methods and data storage, with the advent of advanced analytical technologies for decision-making. Due to such advancements and threat instances, big data security solutions are said to be rapidly gaining traction in the healthcare industry vertical for securing data and improving the patient care. Further, the adoption of data security measures has helped big healthcare organizations in maintaining their reputation. Moreover, owing to the worldwide acceptance of real-time EHRs, the need for securing the data in motion has led to the increasing adoption of big data security solutions.
Big Data Security Solutions in Healthcare and Life Sciences
Voltage SecureData Enterprise is data-centric protection for big data. It protects the world’s largest brands and neutralizes breach impact by securing sensitive data-at-rest, in-use, and in motion. It provides advanced encryption, tokenization, and secure key management that protect sensitive data across enterprise applications, data processing IT, cloud, payments ecosystems, mission-critical transactions, storage, and big data platforms.
Proofpoint solutions are built on a flexible, cloud-based platform and control many proprietary technologies, including Big Data analytics, machine learning, deep content inspection, secure storage and advanced encryption to address today’s rapidly changing threat landscape. The Proofpoint security-as-a-service platform addresses enterprise IT security by protecting data as it flows into and out of the enterprise through on-premise and cloud-based email, instant messaging, social media, and other web-based applications. The platform also securely archives these communications for compliance and eDiscovery.
Hortonworks helps customers maintain the high levels of protection their enterprise data demands by creating centralized security administration and management into the DNA of the Hortonworks Data Platform (HDP). HDP provides an enterprise-ready data platform with rich competences spanning security, governance, and operations. By executing security at the platform level, Hortonworks ensures that security is consistently administered to any application built on top of the data platform, and makes it easier to build or retire data application without impacting security. To be consistent with its mission to develop, distribute and support 100% open-source Apache Hadoop data platform, Hortonworks immediately incorporated the XA Secure technology into the Hortonworks Data Platform (HDP), while also converting the commercial solution into an open Apache community project called Apache Ranger.
FireEye is changing detection and incident investigation with its cloud-based Threat Analytics Platform (TAP). TAP provides enterprise-wide visibility, codified detection expertise, and guided investigation workflows to amplify the defense against today’s most sophisticated cyber-attacks. FireEye built TAP from the ground up — by security practitioners, for security practitioners. TAP combines threat insights gained from responding to the worlds’ most consequential breaches with big data security analytics and codified security expertise so you can quickly identify and investigate cyber threats.
- NetFlow/IPFIX records
- URL/URI information
- SIP request information
- HTTP response codes
- DNS queries
- DHCP queries (future)
- Certificate information (future)
- Custom data (future)
LogRhythm 6.1 Big Data Security Analytics Platform is an award-winning Security Information and Event Management (SIEM) 2.0 security analytics platform, which provides the industry’s first multi-dimensional behavioral analytics tool. The platform allows organizations of all sizes to detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before, the platform provides the channel with a solution to cross-sell with traditional security point products to exploit additional revenue opportunities.
Rapid7 InsightIDR controls both User and Attacker Behavior Analytics to detect intruder activity, cutting down false positives and days’ worth of work for security professionals. It searches all the top attack vectors behind breaches: the use of stolen credentials, malware, and phishing, and alerts on stealthy intruder behavior as early as possible in the attack chain. Unlike most SIEMs and technologies designed primarily for compliance, InsightIDR extends monitoring to include endpoints, logs, and cloud services, leaving attackers nowhere to hide.
Zettaset is a distribution-agnostic management platform that already delivers a robust and comprehensive enterprise-ready Big Data security suite, and automates Hadoop configuration and management. BDEncrypt Plus encryption solution is certified with the MapR Converged Data Platform, the industry’s only converged data platform that integrates the power of Hadoop and Spark with global event streaming, real-time database capabilities, and enterprise storage. With this certification, Zettaset has completed a detailed evaluation and test process with MapR Converged Data Platform, ensuring that sensitive data-in-motion and data-at-rest is protected with fine-grained, role-based access control.
The Pivotal approach to threat detection centers on cybersecurity analytics at scale. It is a data lake-centric approach, which permits Pivotal to improve its threat detection models using additional data sources most traditional security providers overlook. Along with network flows, Pivotal’s approach also merges data such as Active Directory logs, human resources data and LDAP data.
FortiGate high-performance data center firewalls are based on purpose-built FortiASIC technology that meets the most demanding Big Data performance environments. To provide visibility for east-west traffic and the enforcement of security and segmentation between virtual machines (VMs), Fortinet provides a wide range of virtual appliances, from virtual firewalls, through virtual Web Application Firewall (WAF) to Application Delivery Controller (ADC), that integrates into all major virtualized environments.