Palo Alto Networks medical IoT security solution to escort the security of medical equipment

Palo Alto Networks, a global leader in cybersecurity, today announced the launch of the most comprehensive medical Internet of Things (IoT) security solution. Palo Alto Networks IoT security solutions address Internet of Medical Things (IoMT) security challenges through machine learning-driven visibility, defense and enforcement, while providing in-depth analysis of specific medical devices and vulnerabilities. This helps improve data security and patient safety, while meeting the needs of IT teams and clinical engineering technology teams.

While IoT has opened doors for innovative services across industries, it has also created new cybersecurity risks. This is especially true in the medical field. According to a recent report by Unit 42, 83 percent of medical imaging devices run on unsupported operating systems, making them a potential target for attackers. Attacks on such medical devices could reduce the quality of care and allow attackers to steal patient data.

Palo Alto Networks IoT security solutions are designed to ensure that health care organizations (HDOs) can realize the benefits of IoT for patient care without sacrificing security. It is the only solution in the industry that uses machine learning and crowdsourced telemetry to quickly and accurately resolve all connected devices, even those never seen before. IoT security solutions also provide machine learning-driven policy recommendations to reduce manual work; intrusion prevention to block exploits; sandboxing to detect and defend against IoT malware; and URL and DNS security to block IoT over the web attack.

New medical IoT security features include:

MDS2 Document Extraction: The “Manufacturer Disclosure Statement on Medical Device Security” document allows medical device manufacturers to disclose the security-related features of their devices, allowing for deeper vulnerability analysis, tuning anomaly detection, and specific recommended strategies.

Operational Analytics: Provides biomedical and clinical engineering technology teams with a visual analysis of how, when, and where their connected medical devices are used, enabling teams to optimize resource allocation, improve patient care, make investment planning decisions, and reduce maintenance costs.

Expanded IoMT Discovery Capabilities: Along with numerous other medical-specific protocols, App-ID™ now provides expanded discovery and security capabilities for unique IoMT devices and medical applications.

Anand Oswal, Senior Vice President and General Manager, Firewall-as-Platform, Palo Alto Networks There are also significant risks. Our vision is to provide healthcare organizations with complete visibility, in-depth risk analysis and built-in defenses so they can get the most from this transformative technology, while reducing patient and risk to its data.”

Miroslav Belote, Chief Information Security Officer at Valley Health System, said, “Originally, the main goal of Valley Health System was to better understand and enable vulnerability management of medical devices connected to our network. As an initial step, we needed to identify these devices and understand How and where are they connected in the infrastructure. As we researched and looked at various products, we saw great potential and advantages in identifying biomedical, and all connected devices and systems. After months of comparing various systems , we chose the Palo Alto Networks IoT security solution. The solution is simple, cloud-delivered, and quick to deploy. Installation, configuration, and initial device discovery are straightforward. Within hours of turning on the system, We started to see results – inventory, classification, device and device risk profiles for thousands of devices. With Palo Alto Networks IoT security solutions, we gained complete visibility into over 4,000 non-traditional IT devices Visibility, about 30% more devices than we’ve seen before. We now plan to expand our inventory, vulnerability detection, defense processes and practices in our ongoing efforts to protect IT and IoT assets.”

The Links:   NL8060AC26-02 SKIIP83AC12IT1