You can't protect what you can't see
Endpoint Discovery and Control
Internet of Things in the Modern Hospital
If you walk through the corridors of a hospital today, in addition to desktops, laptops, and mobile devices, you will inevitably be surrounded by the Internet of Things (IoT). From X-ray machines to heart monitors, and even to HVAC units and refrigerators, healthcare organizations are turning to connected devices and machines to provide better care and an improved “patient experience.” Because of this, the IoT’s presence within the industry is expected to increase rapidly for the immediate future: The IoT healthcare market is growing 30.8 percent every year and is projected to reach just over $158 billion by 2022, up from $41.22 billion this year, according to research from MarketsandMarkets.
Hackers are well aware that IoT brings new vulnerabilities, and they are eager to exploit them. Given the developments, healthcare CISOs and their teams should consider the following actions:
The CISO’s mantra, “You can’t protect what you can’t see,” is more relevant than ever. It’s difficult to protect the enterprise, after all, if you don’t know what is connected or trying to connect. Merlin’s experience is that most organizations do not have an accurate count of devices. And, after implementing a visibility solution, they find 30% to 40% more devices than they expected. Through the effective, organization-wide agentless, continuous visibility of all systems activity, including cloud-based devices, you will also receive notifications every time new devices show up.
Once visibility is guaranteed, access from new or misbehaving endpoints can be controlled. Whether creating a virtual firewall, automatically moving to a dedicated VLAN or gracefully quarantining a new device until it can be made compliant.
The value of the visibility data and the detection of new endpoints can drive increased value from existing security tools. For example, the visibility data can keep CMDB tools current; newly connecting endpoints can be segmented until a vulnerability scan is complete; tickets can be created in incident management systems; etc.