APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • IBM
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Beautifully Autistic - Enabled To Make A Difference What Did My Children Teach Me About Life, Business, And Innovation?

    Ahmed Abukhater, CIO - Chief Innovation Office Boeing

    Fusing Business and Technology to Create Value

    Bob Hennessy, Group CIO, Lendlease [ASX: LLC]

    Data Security across the Enterprise

    Kas Nader, CIO & SVP of Global Technology, Atlanticus Holding

    Evolving Data Security Involves Database Architecture

    Tom Basiliere, CIO, Provant

    Hybrid Intelligence

    Sharam Hekmat, CIO, IOOF Holdings, Australia

    New Technologies bringing Revolution to Remote Access Solutions

    Vijender Yadav, Director & CTO, Propalms Network

    Using digital simulation to inform sustainable growth

    Shaun Nesbitt, Chief Digital and Information Officer, Urban

    Dyno Nobel A Dose of Our Own Medicine

    Sabina Janstrom, IT Director,Dyno Nobel.

    right

    Fortifying the IT Infrastructure through IBM Solutions

    James Davenport, IT Director, MyEyeDR

    Tweet
    content-image

    James Davenport, IT Director, MyEyeDR

    Now, more than ever before, Personal Health Information, or PHI, has become a hot topic for patients, health care providers, and security experts. Why? Because PHI is much more valuable than typical financial information like credit card and banking information because it cannot be changed.

    Just three short years ago, MyEyeDr was a small company covering one small geographic region. Today, there are locations throughout much of the eastern United States. That rapid growth necessitated a shift in our approach to data security. We realized that automated tools would be needed, not only to analyze the large (overwhelming) volume of data that is generated daily, but also to protect the company’s assets as they were moved to a cloud environment. After investigating what was available in the marketplace, we found the solution in a group of IBM security products.

    We use several IBM products to secure our data and our network infrastructure.

    • Guardium

    • PIM

    • MaaS360

    • QRadar

    IBM Guardium-continually monitors and audits access to the database servers. It provides daily reports and alerts of privileged user access. These databases include those that run the primary point of sale system and those from legacy systems that have been converted into the new primary point of sale system. Guardium reports all activity within the databases.

    Then after filtering out application access, the logs are reviewed for suspicious activity. Once identified a team member investigates to determine the reason for the activity and if the alert needs to be escalated.

    Guardium also monitors large file transfers within the network, which can help identify movement of data to a less secure node on the network for exfiltration

    Finally, Guardium also monitors large file transfers within the network, which can help identify movement of data to a less secure node on the network for exfiltration.

    PIM- is used to manage user access and passwords and track administrators’ activities. MyEyeDr associates access a large number of insurance verification websites. Because PIM manages user access to all these sites, security is enhanced because the passwords are not known to the associates. As a result, when an associate leaves the company, the risk of unauthorized access is reduced significantly. Moreover, passwords for the insurance sites can be securely updated without providing them to users. Finally, because of the ever increasing concern for patient privacy and security, associates are not able to access these sites outside of the corporate network. They must be logged into the ESSO agent, and when they browse to one of the insurance sites, the PIM software prompts them to use shared credentials. The user simply selects “Yes” and the credentials for that site are entered for them automatically.

    MaaS360 -is our mobile device manager. The doctors use an iPad as part of the examination. The iPads are locked down to allow access only to the electronic health record system and they are geo fenced to work only within the office. One benefit of this program is that if an iPad is lost or stolen, it can be remotely wiped to prevent data loss or malicious activity. The iPad also is connected to the company account and cannot be used by anyone else, even after being wiped. MaaS360 does allow associates to bring their own devices on the network, but the company maintains security settings around any corporate data and intellectual property that is stored on the device.

    QRadar- brings everything together into a single dashboard view. It provides real time insight into all activity within and around the network. Offences are easily identified and researched and data trends across the entire network and other security applications are analyzed for suspicious behavior. With full access to the logs and network flow data it is possible to detect lateral movement of data within the organization that might indicate possible exfiltration from a less secured device and to launch appropriate countermeasures.

    This suite of IBM security products has made it possible to monitor and analyze data quickly and to respond to threats faster than was possible previously. Suspicious activity can now be identified and tracked as it happens rather than only when an issue was noticed and reported. Forensic activities also are considerably easier to conduct because the tools allow administrators to cull through all the data from all the systems quickly rather than having to perform analyses on each system individually. And compliance reporting and audits are much easier to handle.

    Patient Health Information (PHI) is always monitored, that allows MyEyeDr to be confident that the data is secure, who is accessing it and why. These tools allow for time savings of the IT staff and free them up to perform other necessary tasks. This allows the department to operate in a more efficient manner.

    tag

    Point of sale

    Financial

    Data Security

    Weekly Brief

    loading
    Top 10 IBM Solution Companies - 2019
    ON THE DECK

    IBM 2019

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Samuel Budianto, Head Of Information Technology, Time International
    Transforming Cybersecurity Leadership in Critical Industries

    Transforming Cybersecurity Leadership in Critical Industries

    Joel Earnshaw, Senior Manager, Cybersecurity, Perenti
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    Meeting Business Travel Demands with Intelligent Platforms

    Meeting Business Travel Demands with Intelligent Platforms

    Zamil Murji, Chief Technology Officer, Corporate Travel Management – Asia
    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    Cara Pring, Digital & Cx Director, Winc Australia
    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Cindy Chaimowitz, GM Wholesale & Customer Service and Karen Smith, Head of Customer Service, Foodstuffs North Island
    Why Compliance Needs a Seat at the Strategy Table

    Why Compliance Needs a Seat at the Strategy Table

    David Koh, Head, Legal & Compliance (Singapore) and Operational Risk Management Country Lead, Perpetual Limited
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://ibm.apacciooutlook.com/cxoinsights/fortifying-the-it-infrastructure-through-ibm-solutions-nwid-4289.html