Download PDF
CheckPoint Software > Case Studies > Securing Patient Data: Memorial Health Services' Adoption of Check Point Full Disk Encryption
CheckPoint Software Logo

Securing Patient Data: Memorial Health Services' Adoption of Check Point Full Disk Encryption

Technology Category
  • Cybersecurity & Privacy - Application Security
  • Cybersecurity & Privacy - Endpoint Security
Applicable Industries
  • Healthcare & Hospitals
  • National Security & Defense
Use Cases
  • Cybersecurity
  • Tamper Detection
Services
  • Cybersecurity Services
  • Training
The Challenge
Memorial Health Services (MHS), a nationally recognized, not-for-profit health care system with five hospitals in Southern California, was faced with the challenge of protecting confidential patient information. With increasing media coverage on the exposure of confidential patient data, MHS was concerned about a potential data breach that could compromise the security or confidentiality of patient information. As one of the top hospital organizations in the country, MHS is responsible for large amounts of confidential patient information. The growing number of employees working remotely and regulatory drivers such as the Health Insurance Portability and Accountability Act (HIPAA) and SB 1386, a California law regulating the privacy of personal information, necessitated a comprehensive data security solution that could be deployed quickly and transparently to secure the personal health information of its patients.
About The Customer
Memorial Health Services (MHS) is a nationally recognized, not-for-profit health care system with five hospitals located in Southern California, in both Los Angeles County and Orange County. MHS focuses on evidence-based, best practice medicine, thereby gaining widespread recognition for its distinctive approach to medical care. Known for its high standards, MHS is continually recognized for its governance and safety practices by several leading accreditation bodies in the United States. By practicing ground breaking and innovative health care methods, MHS Medical Centers repeatedly exceed state and national averages, remaining a leader in the health care industry.
The Solution
In response to this challenge, MHS adopted Check Point Endpoint Security Full Disk Encryption, a solution recommended by other companies in the health care industry and validated by Gartner’s Magic Quadrant. Check Point Full Disk Encryption supports any PC or laptop running Windows or Linux and offers quick and simple deployment. The solution runs in a completely automatic, transparent mode to the user and ties in seamlessly with MHS’s current IT infrastructure. Administrators did not have to change any procedures or burden staff with hours of training. The solution also provides MHS with the highest level of security by combining strong full-disk encryption with access control and the ability to support all common smartcards and tokens. Only authorized users with the correct logon and password can gain access to a computer. And if the machine is turned off or goes into standby mode, the entire hard drive remains encrypted, protecting all the contents.
Operational Impact
  • The primary advantage of deploying Check Point Full Disk Encryption for MHS was the realization of complete and total patient data protection. Regardless of whose hands a missing or stolen laptop may end up in, MHS is confident that the information on that laptop is safe and secure. Check Point Full Disk Encryption eliminates the concern of losing the private and personal details of a patient’s medical history. In the event of an actual theft, Check Point Full Disk Encryption ensures that all data is “locked down” and secure. It is a simple, strong, and enforceable solution that protects MHS’s privileged patient data wherever it goes. The current policy at MHS is to encrypt any new laptop that is deployed. This has added another layer of security to their operations.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.