CASE STUDY-3 1.
Visit the NetMotion Web site and access andread other Mobility XE success stories. Discuss the patterns that can beobserved in the benefits that Mobility XE users have realized via itsdeployment and use. Mobility XE solves many issues whichwere prevalent before its existence. Conventional VPNs were not built withmobile devices in mind. When a network tunnel is interrupted, the applicationdisconnects or the device crashes as this happens when a mobile device runsinto a dead spot. Mobility XE makes sure you do not lose the session throughtemporary dead spots and intermissions and the feature is termed “TrueApplication Persistence” and can retain sessions throughsuspend-and-resume-cycles, connectivity losses,and network switches.
It also provides several security features liketwo-factor authentication, device authentication, FIPS 140-2 AES encryption andseveral other features. It also provides a console to monitor connecteddevices. It also features the ability to diagnose network issues faced by youruser through network tools. One successstory is with JEA which is one of the largest municipal utilities in the UnitedStates. In their effort to improve their customer service and effort to optimizewireless communication networks over their entire 841 sq miles of their service area. Mobility XE provided instantintegration with all of their existing applications They had an existingproblem every time their mobiles technician’s wireless connection dropped, itwould take them 20-30 minutes to log back into the system and hence caused a lot of productivity issues.
Mobility Xe madetheir servers reliable even when they moved from one network to another.The main pattern thatcan be observed when organizations try Mobility XE is that it solves the mainissues of inconsistent network connectivity through providing a stableconnection. Hence, it makes those companies more productive and their customerhappy through better service.
2. Do some Internetresearch on the security implications of HIPAA requirements for hospitalnetworks. Discuss the major types of security mechanisms that must be in placeto ensure hospital compliance with HIPAA requirements.As every health organization of any size should depend onutilizing wireless technology for their day to day operations. Suppliers arelikely understanding that none of the difficulties protection, security,dependability, and speed while getting to patient records and clinicalinformation that the human services condition faces when exchanging fulloperational dependence to remote systems can be tended to by customertechnologies.
This is because consumer wireless wasnever intended to work with HIPAA compliance in mind. Most importantlymedicinal services associations are organizations with an extraordinary duty tosecure patient’s private data no matter what. An attack on private medicinalservices records presents extreme implications for both the hospital and thepatient.
That is the reason a similar level of attention must be given to theadvancement of reason constructed, reliable networks with regards to thepatients whose lives rely on upon the data being shared—and at last ensured—bymeans of these systems. Consumer-gradewireless networks cannot guarantee security required by the regulatory andfederal requirements.The first step that a hospital must take to ensurecompliance with HIPAA is the security management process which includes riskanalysis, risk management, andInformation Technology review. A riskanalysis involves an accurate and thorough assessment of the potentialvulnerabilities posed to the integrity of the available electronic healthinformation. Risk management thereafter should be practiced to implementsecurity measures sufficient to reduce the risk posed by the system. Protectingand safeguarding the individual’s PHI should be the highest priority whilebuilding out security for the Information Systems. 3.
Do some Internet research on the use of VLANsin hospitals. Summarize the benefits of using VLANs in hospitals and identifyexamples of how St. Luke’s could further enhance its wireless network byimplementing VLANs.Virtual LANs is a group of devices on different LAN segmentswhich work and communicate with each other as if they are on the same LAN.Although there is few limitation to itlike device and port constraints they have several benefits like improvedperformance and manageability and better security options. Benefits of usingVLAN in hospitals is that it makes the network infrastructure more secure andit expands the security boundaries for that hospital. As such Firewall, can place at the end of the VLANS therebyincreasing security across all the VLAN segments spanned across differentdepartments and data centers.
St Luke’s Hospitalcould have further improved their Information Systems Security and Performanceby implementing VLAN. On the top of using Mobility XE, implementing VLAN couldhave made their security reliability to another level.