Solution Overviews

Datasheet: Secure Environment for Connected Health

Issue link:

Contents of this Issue


Page 0 of 1 1 © 2019 Irdeto. All Rights Reserved. Datasheet Last modification: 28-11-2019 / 01:39 pm GMT+01:00 Secure Environment is a software-based cybersecurity solution that layers safety around the software and firmware as well as protecting the operating system. Secure Environment protects the core functionality of the device and critical data as it shields against ransomware attacks and tampering efforts, even if the intruder has managed to gain elevated privileges. Secure Environment is modular, customizable and layer-based, which offers flexibility in security based on the needs, ranging from small implantable devices, to fully connected multi-core capital equipment. As it protects at the operating system level, it works with any type of software code, which makes it an excellent option not only for new designs, but also for legacy products with outdated software. THE CHALLENGE The core element of the Healthcare 4.0 transition is connected health, and incorporation of the Internet of Medical Things (IoMT) into medical equipment is the key step to actualize it. The success of IoMT enables new care-delivery models such as mHealth, remote patient monitoring, and behavioral modification. As IoMT proliferates on one side, the threat spectrum expands and reinforces on the other side: SECURE ENVIRONMENT FOR CONNECTED HEALTH Safeguard the operating environment of your new or legacy medical software in a cost-effective, modular manner to maintain the device functionality and protect critical data. • Medical Operating Systems: Most of the medical software, especially the legacy ones, are still running on outdated and old versions of General-Purpose Operating systems (GPOS) with a serious lack of medical-grade security considerations. Embedded real-time operating systems (RTOS) are the modern option for medical devices; however, serious doubts about their security are being expressed after the Urgent/11 warning. • Ransomware Attacks: Ransomware attack is one of the biggest challenges to deal with for healthcare organizations. Healthcare is the third most lucrative industry for ransomware attacks, and reports show that the average ransom payment has been increasing significantly in the last few years. • Legacy Devices: Many medical devices and software work well beyond their warranty period and lifecycle. They were mostly developed when cybersecurity was not a specific part of the regulation. Designing security solutions for legacy products to fit those specifications is extremely challenging in terms of the cost, time, expertise and deployment. Software and Data Hospital Network Machine Learning-based Behavioral Detection & Mitigation Rules-based Detection & Mitigation WHY USE SECURE ENVIRONMENT MULTILAYER PROTECTION? • Protection at each layer: connectivity, internal network, medical device software and data. • Protection of the medical IoT through securing the operating system. • Rules-based protection against known threats, including machine learning based protection against zero-day threat.

Articles in this issue

Links on this page

view archives of Solution Overviews - Datasheet: Secure Environment for Connected Health