Cloud Platform
Solutions
Subscriptions
Cloud Platform Apps
Customers
Partners
Community
Support
Company
Login
Contact us
Try it
Search

See Resources

www.uchospitals.edu

INDUSTRY: Healthcare

BUSINESS: The University of Chicago Medical Center (UCMC) is a nonprofit corporation providing medical care to residents of the Chicago metropolitan area and beyond.

SCOPE & SIZE: Greater Chicago Metropolitan Area; Annual Revenue: $1+ billion; Total Employees: 9,500+

BUSINESS CHALLENGE: Consolidate multiple vulnerability management applications, across multiple locations, and provide security and IT operation teams, as well as business managers, with the risk and regulatory compliance reports they need for their specific job functions.

SOLUTION:

  • Qualys Security & Compliance Suite

WHY THEY CHOSE QUALYS:

  • The Qualys suite automates and unites vulnerability management and policy compliance across the organization.
  • Achieved continuous vulnerability management with high accuracy rate.
  • Streamlined workflow with integrated remediation ticketing system improving overall security and HIPAA compliance.
Envelope Print

Diagnosing Security & Compliance Risk

The University of Chicago Medical Center needed to consolidate the tools it used for to reduce vulnerability and improve risk management to meet expanding HIPAA and PCI requirements.
The University of Chicago Medical Center home page

Since 1927 the University of Chicago Medical Center (UCMC) has provided medical care to the residents of the Chicago metropolitan area and beyond. Today, this nonprofit corporation includes four campus-based centers of care: the Bernard A. Mitchell Hospital; the Comer Children's Hospital; the Chicago Lying-in Hospital, a facility for women and maternity; and the Duchossois Center for Advanced Medicine, a state-of-the-art ambulatory-care facility that boasts a full spectrum of preventive, diagnostic, and medical treatment. University of Chicago revenues for patient care total more than $1 billion annually.


“Qualys enables us to automate our risk management and compliance functions, and we will continue to leverage Qualys to automate manual processes wherever possible. This is how Qualys improves our security and gives us more time to focus on other strategic things.”


Plamen Martinov,
Lead Security Engineer,
The University of Chicago Medical Center

Plamen Martinov

UCMC's IT infrastructure, which supports four separate units, is considerable. It consists of a couple thousand servers and about 11,000 individual networked devices. Special attention is paid to the security of financial records, as well as the protection of Personal Health Information (PHI), which is growing in importance as sensitive patient data is stored and shared electronically. The Health Insurance Portability and Accountability Act (HIPAA) mandates that health care organizations ensure the privacy of patients' PHI. The unauthorized disclosure of this information can result in fines and penalties.


The Challenge: Manual Vulnerability Assessments, Lack of Reporting Clarity

In order to keep its systems secure, the UCMC IT security team had relied on a number of separate tools to conduct network vulnerability assessments, validate proper patch deployment to at-risk systems, and then generate the reports necessary for both technical teams and business managers. Unfortunately, the applications it relied on didn't provide a way to manage workflow centrally among the various hospitals and business units, nor was there a convenient way to generate the reports that security managers, operation teams, and business managers needed to perform their jobs. “Our challenge was not only to conduct vulnerability management, but also to provide appropriate reports that detail what executive management needs to know and understand about our compliance with internal security policies,” explains Plamen Martinov, lead security engineer at UCMC.


“It took tremendous effort just to get reports that provided the quantifiable data they needed to make decisions. We would have to run three or four different reports and then pull them all together manually for each audience,” explains Martinov.


Toward Insightful, Structured Vulnerability and Risk Management

After an evaluation of the available vulnerability management solutions, it Martinov and his team selected the Qualys Security and Compliance Suite, because they felt it could provide the structured, consolidated vulnerability and risk management that UCMC sought, as well as the comprehensive reporting it needed. Through its Software as a Service (SaaS) delivery, the Qualys Security and Compliance Suite combines Qualys’ vulnerability management service with a comprehensive IT compliance solution. For UCMC, the Qualys Security and Compliance Suite eliminated network auditing and compliance inefficiencies by leveraging the organization's own IT security information. In one consolidated suite, groups with different responsibilities can now utilize the detailed information they need for their specific job functions.


Today, instead of relying on multiple vulnerability assessment applications, UCMC relies on the Qualys Security and Compliance Suite to automate and unite the process of vulnerability management and policy compliance across the organization: network discovery and mapping, asset prioritization, vulnerability assessment reporting, and remediation tracking, according to business risk. Policy compliance features also enable security managers to audit, enforce, and document compliance with internal security policies and external regulations.


Within three months of deploying Qualys, UCMC security and IT managers were able to establish a continuous vulnerability management program. Now they can track remediation efforts and ensure that internal policy compliance is maintained through comprehensive reporting. With its broad vulnerability KnowledgeBase, consisting of thousands of unique checks and a high accuracy rate, Qualys supplies UCMC precise security checks.


“The switch from our previous vulnerability management programs to Qualys went smoothly,” says Martinov. “We ran a short proof-of-concept trial, which went without a hitch,” he explains. “Now that we have Qualys in place, we can use it to provide all of the different audiences (business managers, IT security, and operations groups) with the exact information they need from a centralized location,” he adds. In addition to the more comprehensive, targeted reporting capabilities, UCMC was able to streamline its vulnerability management workflow with Qualys’ integrated remediation ticketing system.


A built-in feature of Qualys generates tickets based on internal policy rules and tracks each vulnerability from its identification to verified remediation. To help security managers work as effectively as possible, each remediation ticket is assigned a unique number and includes vulnerability details, remediation history, and all actions taken. During the subsequent scan, Qualys automatically verifies which vulnerabilities were fixed and then retires the related tickets. “When a vulnerability is identified, Qualys automatically opens an internal remediation ticket. “That ticket gets delegated to the appropriate group within Qualys, and it is closed automatically when the system is verified to be patched,” Martinov says, adding that at some point, they plan to integrate Qualys’ internal ticket policy engine with their own enterprise service request system.


That type of workflow not only ensures that systems are remedied in time, but also helps to improve overall security and HIPAA compliance. Recently, when a rapidly-spreading Internet threat surfaced, UCMC quickly was able to establish a custom scan that detected any systems that could have been susceptible to infection. “We used Qualys to detect all systems that could have been vulnerable, and we efficiently worked with each group to make certain that those systems were hardened against the threat,” Martinov says. “This is how Qualys enables us to understand the security of our systems better, and to respond more quickly to all of the rapidly changing threats.”