**This post was originally published on IronBow’s Blog, here.
For many industries, business pressure is such that technology innovations might get deployed before any thorough security assessment gets conducted. It’s never on purpose, but the omission is mostly due to limited resources or budget constraints and pressure from the business to meet the demand of a competitive market. The best example is BYOD: many of us access business assets on devices that are either not protected or are outside the control of our IT organization.
Healthcare is a great example of an industry that finds itself at the crossroads of much needed technology innovations and improved security:
What can be done? To healthcare network and security professionals, it can be a daunting task especially if you start from a place where your network architecture is mostly flat, with all assets and systems almost treated equally from a security standpoint.
You can opt to maintain the status quo while you build a master security plan that will never get executed. Or, starting today, you can take action and progressively put your organization in a much better position. Here is the first recommendation: get a better understanding of your network traffic.
Nobody will argue that for heavy-loaded areas of your network that carry access to critical applications, you cannot introduce any risk of disruption. A completely transparent, non-disruptive step is to deploy a next-generation firewall in tap mode and start analyzing traffic. Many customers have told us that it gave them immediate visibility into all traffic and allowed them to craft an informed and pragmatic plan to improve security. They gained visibility into:
For a more thorough view of what “full traffic and application visibility” means at Palo Alto Networks, you can download the latest version of our Application Usage and Threat Report. You can easily get the same level of data for your enterprise network and start taking action today.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.