Preferences
Related Series
Health Data Security
155 Vendors Identified--Who is Protecting Your Data?
Providers’ data security strategies span a wide range of maturity levels. Some providers are years into an established security framework that involves many vendors and mature internal programs and processes. Others are just trying to understand what guiding principles they should follow, which threats pose the greatest risk to their organization, what tools and services they need to mitigate those threats, and what vendors they should consider. This report is KLAS’ first step into making sense of the healthcare data security vendor landscape. We asked 74 providers (over half being CISOs or other C-levels) to tell us their greatest healthcare data security concerns, and while there are many elements to data security, we asked providers what third-party tools/services they are using for eight key data security areas.
1. CHECK POINT, DELL, AND SYMANTEC USED MOST IN MULTIPLE DATA-SECURITY AREAS
Many vendors offer multiple solutions across data security segments; however, few in this report have customers using them for multiple solutions. Check Point, Dell, and Symantec are leading the pack among the vendors who have clients using multiple solutions from them. Providers choosing a vendor for multiple solutions say they do so for integration, to reduce operational time and resources, and/or to consolidate the total number of vendors they use.
2. MICROSOFT, CISCO, MCAFEE, AIRWATCH, AND FIREEYE PERCEIVED AS ADDRESSING TOP SECURITY THREATS
Microsoft, Cisco, McAfee, AirWatch, and FireEye are perceived by providers in this study as addressing top data security concerns—from intrusion protection and prevention to access management and encryption. Few providers link vendors with specific concerns they think those vendors can address, but AirWatch and Good Technology are mentioned by several providers as being able to address mobile device concerns via their mobile device management (MDM) solutions. Iatric Systems’ identity and access management solutions are referenced by multiple providers as addressing concerns with authentication and user access abuse.
WHO'S ADDRESSING THREATS?
TOP SECURITY CONCERNS
More providers in this study use MDM solutions, because they are more easily implemented and managed. Conversely, fewer providers use data loss prevention (DLP) and real-time risk monitoring due to the significant amount of time, resources, and expertise needed to optimize these tools so that they generate meaningful and actionable data.
Project Manager
Robert Ellis
This material is copyrighted. Any organization gaining unauthorized access to this report will be liable to compensate KLAS for the full retail price. Please see the KLAS DATA USE POLICY for information regarding use of this report. © 2024 KLAS Research, LLC. All Rights Reserved. NOTE: Performance scores may change significantly when including newly interviewed provider organizations, especially when added to a smaller sample size like in emerging markets with a small number of live clients. The findings presented are not meant to be conclusive data for an entire client base.