By the end of December 2018, the HHS Office for Civil Rights received notifications that a staggering 13 million healthcare records had been exposed. Even with strict HIPAA regulations in place to prevent inappropriate access, we still read about attacks on sensitive information almost every day, making it even more critical that healthcare providers have security controls to protect their patients.
The requirements of HIPAA cover organizations that process information that affects the security of electronic patient health information (ePHI). Any organization that deals in ePHI must maintain it in accordance with HIPAA and also protect it from breaches and improper access. For companies with complex IT infrastructures, such as Linux production environments, this can be a challenge.
Today we announced how Capsule8 can help by:
- Protecting system services from unauthorized access to ePHI
- Reconfiguring access settings when there’s an emergency
- Allowing review and audit of key activity regarding access to ePHI
- Maintaining ePHI confidentiality
You don’t have to take our word for it. DirectDefense, a Cybersecurity Assessment Company, conducted an exhaustive third-party HIPAA assessment of Capsule8 Protect. DirectDefense reviewed features and conducted live testing of key HIPAA IT security controls focused specifically on protecting systems against intrusions, unauthorized file and system modifications, and unauthorized access.
After the review, DirectDefense named Capsule8 “a stand-out among organizations in the Linux security market space and said C8 is a “must have solution to meet HIPAA compliance for healthcare organizations that have Linux based ePHI environments.”
To learn more about how Capsule8 can help you comply with HIPAA regulations, check out our new solution brief here.
Capsule8 is the only company providing high-performance attack protection for Linux production environments – whether containerized, virtualized, or bare-metal. Capsule8 liberates SecOps from managing a high volume of manual tasks, while being safe for even the busiest workloads, on the busiest networks.