Welcome!

News Feed Item

Trend Micro Selected by Adventist Health System to Secure Web Apps and Keep Patient Data Safe

Innovative offering provides comprehensive web app vulnerability detection and protection

DALLAS, Feb. 13, 2014 /PRNewswire/ -- With the increase of high-profile attacks on sensitive Web applications, Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software, recognized the need to develop innovative security solutions to address and mitigate these threats. Now available globally, Trend Micro™ Deep Security for Web Apps is being used by forward-thinking organizations such as Adventist Health System (AHS), a faith-based health care organization, to provide vulnerability detection and protection for Web applications, keeping data safe while helping with regulatory compliance. As a result, the organization has realized lower costs, and increased efficiencies while securing sensitive Web applications from escalating attacks.

"Deep Security for Web Apps' proactive approach gives us greater visibility into our vulnerabilities while reducing administrative costs and effort dramatically," said Mark Dunkerley, messaging and domain services team lead, Adventist Health Information Services. "With the Health Information Technology for Economic and Clinical Health Act (HITECH), combined with HIPAA regulations, it was crucial for us to find an easy-to-use solution to keep patient information safe and secure. Working with Trend Micro helps us address our current challenges posed by increasing threats and while still enabling IT agility."

The solution helps AHS improve security through comprehensive monitoring and centralized management capabilities across multiple locations. AHS supports 45 campuses and employs 70,000 individuals, providing care to 4.5 million patients each year with inpatient, outpatient and emergency room visits. A detailed case study about how AHS benefits from Trend Micro is available here.

"The high value of data in Web applications makes them a favorite target for hackers, and several recent high-profile breaches have shown how easily app vulnerabilities can be exploited," said Bill McGee, senior vice president and general manager, cloud and data center security, Trend Micro. "Organizations need specialized, application-aware security to combat these attacks. With Deep Security for Web Apps, we've combined vulnerability detection with multi-layered protection to deliver a holistic application security solution."

Powered by the Trend Micro Deep Security platform, Deep Security for Web Apps is an integrated SaaS-based solution that continuously monitors for application vulnerabilities and provides real-time protection, while helping to meet government and PCI requirements. With both automated and expert scanning, resources can be concentrated on security risks, not false positives. Virtual patching along with Web Application Firewall (WAF) rule generation allows for high-risk vulnerabilities to be quickly remediated. It also features unlimited, globally trusted SSL certificates, including Extended Validation (EV) at no extra cost.

To learn more about Trend Micro's Deep Security for Web Apps, please visit: https://webappsecurity.trendmicro.com.

About Adventist Health System
Adventist Health System is a faith-based health care organization headquartered in Altamonte Springs, Florida. A national leader in quality, safety and patient satisfaction, Adventist Health System's nearly 70,000 employees maintain a tradition of whole-person health by caring for the physical, emotional and spiritual needs of every patient. 

With 45 hospital campuses and nearly 8,300 licensed beds in ten states, Adventist Health System facilities incorporate the latest technological advancements and clinical research to serve more than 4.5 million patients annually. The full continuum of integrated care also includes urgent care centers, home health and hospice agencies, and skilled nursing facilities.

Each Adventist Health System facility operates independently in delivering care and services to best meet the needs of the local communities they serve. While each entity is unique, all remain united in one mission: to extend the healing ministry of Christ.

About Trend Micro
Trend Micro Incorporated, a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe.  For more information, visit TrendMicro.com.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you ...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
China Unicom exhibit at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE FDD, TD-LTE), fixed-line broadband, ICT, data communica...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, will discuss some of the security challenges of the IoT infrastructure and relate how these aspects impact Smart Living. The material will be delivered i...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, represent...
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningf...