CheckPoint Software > Case Studies > Enhancing Healthcare Security and Compliance: Independence Care System Case Study

Enhancing Healthcare Security and Compliance: Independence Care System Case Study

CheckPoint Software Logo
Technology Category
  • Cybersecurity & Privacy - Security Compliance
  • Networks & Connectivity - Gateways
Applicable Industries
  • Glass
  • National Security & Defense
Applicable Functions
  • Quality Assurance
Use Cases
  • Leasing Finance Automation
  • Tamper Detection
Services
  • System Integration
About The Customer
Independence Care System (ICS) is a nonprofit organization that operates a Medicaid managed long-term healthcare plan. Founded in 2000, ICS serves more than 6,000 adults with physical disabilities and chronic conditions in the New York City area. The organization is committed to serving members whose needs are unmet in other long-term care facilities. ICS works closely with local healthcare providers to serve members of the community with severe disabilities or mobility issues. The organization has made regulatory compliance a top business priority to protect member privacy and its own reputation.
The Challenge
Independence Care System (ICS), a nonprofit Medicaid managed long-term healthcare plan serving residents in the New York City area, faced several challenges. The organization needed to improve its security to meet strict HIPAA compliance requirements, maximize business continuity to keep core healthcare applications up and running, and simplify network management to help staff stay productive. ICS was seeking a complete security solution that would simplify regulatory compliance, and protect the organization against security threats that could impact network performance. The solution would have to be easy to expand and modify to meet changing needs, and provide centralized management to simplify and streamline network administration for the firm’s IT staff.
The Solution
ICS decided to replace its aging firewalls with Check Point 4600 and 2200 Next Generation Security Appliances. ICS added a full array of Check Point Software Blades to protect the organization against suspicious web threats, viruses, bots and other security issues. Each appliance also includes the Check Point Compliance Software Blade, a dedicated solution to help ensure compliance best practices. The Check Point Compliance Software Blade monitors management, software blades and security gateways to constantly validate that the ICS Check Point environment is configured in the best way possible. The blade provides 24/7 security monitoring, security alerts on policy violations and out-of-the-box audit reports. To further enhance its proactive threat protection, ICS is also adding the Check Point SmartEvent Software Blade to its solution. SmartEvent correlates events on the firm’s network for greater visibility and faster remediation.
Operational Impact
  • The Check Point solution has provided ICS with a flexible appliance that ensures compliance and protects against advanced threats. The Compliance Software Blade helps ICS comply with healthcare industry regulations. The IPS, URL Filtering, Anti-Bot, and Antivirus Blades provide up-to-date security against threats. The SmartEvent discovers and alerts IT about potential security issues. The easy-to-use dashboard simplifies management and improves network insight. IT professionals can examine all network activity through a centralized view. Reporting and logging assist in the event of audits. The scalable solution makes it easy to support new applications. The Software Blade architecture accommodates new blades to meet changing requirements. The agile architecture can quickly expand services without adding management complexity.
Quantitative Benefit
  • 24/7 security monitoring provided by the Check Point Compliance Software Blade
  • Single dashboard for monitoring all network activity
  • Out-of-the-box audit reports provided by the Compliance Software Blade

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.