Welcome!

News Feed Item

Trend Micro Selected by Adventist Health System to Secure Web Apps and Keep Patient Data Safe

Innovative offering provides comprehensive web app vulnerability detection and protection

DALLAS, Feb. 13, 2014 /PRNewswire/ -- With the increase of high-profile attacks on sensitive Web applications, Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software, recognized the need to develop innovative security solutions to address and mitigate these threats. Now available globally, Trend Micro™ Deep Security for Web Apps is being used by forward-thinking organizations such as Adventist Health System (AHS), a faith-based health care organization, to provide vulnerability detection and protection for Web applications, keeping data safe while helping with regulatory compliance. As a result, the organization has realized lower costs, and increased efficiencies while securing sensitive Web applications from escalating attacks.

"Deep Security for Web Apps' proactive approach gives us greater visibility into our vulnerabilities while reducing administrative costs and effort dramatically," said Mark Dunkerley, messaging and domain services team lead, Adventist Health Information Services. "With the Health Information Technology for Economic and Clinical Health Act (HITECH), combined with HIPAA regulations, it was crucial for us to find an easy-to-use solution to keep patient information safe and secure. Working with Trend Micro helps us address our current challenges posed by increasing threats and while still enabling IT agility."

The solution helps AHS improve security through comprehensive monitoring and centralized management capabilities across multiple locations. AHS supports 45 campuses and employs 70,000 individuals, providing care to 4.5 million patients each year with inpatient, outpatient and emergency room visits. A detailed case study about how AHS benefits from Trend Micro is available here.

"The high value of data in Web applications makes them a favorite target for hackers, and several recent high-profile breaches have shown how easily app vulnerabilities can be exploited," said Bill McGee, senior vice president and general manager, cloud and data center security, Trend Micro. "Organizations need specialized, application-aware security to combat these attacks. With Deep Security for Web Apps, we've combined vulnerability detection with multi-layered protection to deliver a holistic application security solution."

Powered by the Trend Micro Deep Security platform, Deep Security for Web Apps is an integrated SaaS-based solution that continuously monitors for application vulnerabilities and provides real-time protection, while helping to meet government and PCI requirements. With both automated and expert scanning, resources can be concentrated on security risks, not false positives. Virtual patching along with Web Application Firewall (WAF) rule generation allows for high-risk vulnerabilities to be quickly remediated. It also features unlimited, globally trusted SSL certificates, including Extended Validation (EV) at no extra cost.

To learn more about Trend Micro's Deep Security for Web Apps, please visit: https://webappsecurity.trendmicro.com.

About Adventist Health System
Adventist Health System is a faith-based health care organization headquartered in Altamonte Springs, Florida. A national leader in quality, safety and patient satisfaction, Adventist Health System's nearly 70,000 employees maintain a tradition of whole-person health by caring for the physical, emotional and spiritual needs of every patient. 

With 45 hospital campuses and nearly 8,300 licensed beds in ten states, Adventist Health System facilities incorporate the latest technological advancements and clinical research to serve more than 4.5 million patients annually. The full continuum of integrated care also includes urgent care centers, home health and hospice agencies, and skilled nursing facilities.

Each Adventist Health System facility operates independently in delivering care and services to best meet the needs of the local communities they serve. While each entity is unique, all remain united in one mission: to extend the healing ministry of Christ.

About Trend Micro
Trend Micro Incorporated, a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe.  For more information, visit TrendMicro.com.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.