This book includes a plain text version that is designed for high accessibility. To use this version please follow this link.
tion Center and iNetSec Smart Finder that is designed to assist in detecting, identifying and authenticating devices on a network, but he, admittedly, had his initial doubts. “To be honest with you,” says Roberts, “I really didn’t think they would fi t with what we were doing, because we are not too concerned with outside devices being on our guest network. But I decided to beta test the devices to see what they could do.” One of the fi rst moves Roberts made using the iNetSec

products was to classify and label each hospital device with specifi c risk assessments attached. He also decided to create a very restrictive policy relative to who can bring their own device and what network those devices can access. Roberts says, “I know in a lot of healthcare facilities, they

have their BYOD on their production network. We don’t do that. Other facilities have physicians bringing in their tablets and other personal devices, and they run clinical software on those devices. We don’t allow that here. We have only a few physicians bring in their own tablets, and they access clinical applications through a remote portal. By doing this, we do not have to actively monitor those devices at the level of detail that a lot of the other facilities may. T e Fujitsu products give us that much-needed freedom.” Roberts can now identify, monitor and prevent poten-

tial threats that are introduced from internal and external devices without causing probl ems for his end-users and extra IT work. “T e PFU products instantly classify our existing, as well

as any new, devices to our network by what type they are, like a computer, printer, tablet, etc. We are able to build in rules in the products that say, ‘Okay, if it’s a printer, we’ll automatically approve that device.’ A printer is okay, it does not have to have a manual intervention. But if it’s a Windows device, or a Mac device, it has to have a manual approve process. In these instances, we get notifi ed via email that there’s a new device detected, and it is a such-and-such model. T en we can manually approve this device and say, ‘T is device is okay.’” Typically, there are no surprises for Roberts when going

through this process, because most devices detected are owned by the hospital. However, if there is a device that gets noticed by the iNetSec products and Roberts cannot recognize it as being deployed by his staff, he can then take a further look at that foreign device to determine its model and the type of work the end-user is trying to accomplish. “For instance,” says Roberts, “if someone is trying to plug a computer into an open Ethernet port, we will know about that immediately and we can take appropriate ac- tion.”

Another activity the iNetSec products allow is an ap- praisal of the total amount of data that is transferred for each application. “That’s pretty useful,” says Roberts. “We pull a report once a week to take a look at where our bandwidth is go-

ing and what data is going out as far as applications, and whether it’s a concern or not. If we have a lot of usage of a certain app – specifically from the guest access portal – we look for certain things, and Fujitsu uses a risk-level rating scale for each application. The products rate these differ- ent apps, so we can quickly take a look and see if there is something we might need to be concerned about. If we are seeing a lot of traffic, we can deal with that appropriately. We can block it or take a closer look and see why those particular apps are being used in our facility. Over the last couple of months, we found quite a few P2P apps that were problematic that I did not realize were being used in the facility on the guest side. With the new information in hand, we were able to take the appropriate actions.” While the journey has not been without its perils, Rob-

erts believes his facility has found the answer to its BYOD concerns with the iNetSec suite of products. “The devices are very user-friendly. They are very ‘fire

and forget.’ That level of ease is important to us, because we really don’t have the resources of many other facilities. We had to find a solution that made our end users happy and enabled my tech and me to concentrate on our work rather than taking extra time for special training or to spend hours

iNetsec Smart Finder HEALTH MANAGEMENT TECHNOLOGY March 2014 15

Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28