CASE providing a stable connection. Hence, it makes those

             

CASE STUDY-3

 

1.     Visit the NetMotion Web site and access and
read other Mobility XE success stories. Discuss the patterns that can be
observed in the benefits that Mobility XE users have realized via its
deployment and use.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

   Mobility XE solves many issues which
were prevalent before its existence. Conventional VPNs were not built with
mobile devices in mind. When a network tunnel is interrupted, the application
disconnects or the device crashes as this happens when a mobile device runs
into a dead spot. Mobility XE makes sure you do not lose the session through
temporary dead spots and intermissions and the feature is termed “True
Application Persistence” and can retain sessions through
suspend-and-resume-cycles, connectivity losses,
and network switches. It also provides several security features like
two-factor authentication, device authentication, FIPS 140-2 AES encryption and
several other features. It also provides a console to monitor connected
devices. It also features the ability to diagnose network issues faced by your
user through network tools.

          One success
story is with JEA which is one of the largest municipal utilities in the United
States. In their effort to improve their customer service and effort to optimize
wireless communication networks over their entire 841 sq miles of their service area. Mobility XE provided instant
integration with all of their existing applications They had an existing
problem every time their mobiles technician’s wireless connection dropped, it
would take them 20-30 minutes to log back into the system and hence caused a lot of productivity issues. Mobility Xe made
their servers reliable even when they moved from one network to another.

The main pattern that
can be observed when organizations try Mobility XE is that it solves the main
issues of inconsistent network connectivity through providing a stable
connection. Hence, it makes those companies more productive and their customer
happy through better service.

 

2. Do some Internet
research on the security implications of HIPAA requirements for hospital
networks. Discuss the major types of security mechanisms that must be in place
to ensure hospital compliance with HIPAA requirements.

As every health organization of any size should depend on
utilizing wireless technology for their day to day operations. Suppliers are
likely understanding that none of the difficulties protection, security,
dependability, and speed while getting to patient records and clinical
information that the human services condition faces when exchanging full
operational dependence to remote systems can be tended to by customer
technologies. This is because consumer wireless was
never intended to work with HIPAA compliance in mind. Most importantly
medicinal services associations are organizations with an extraordinary duty to
secure patient’s private data no matter what. An attack on private medicinal
services records presents extreme implications for both the hospital and the
patient. That is the reason a similar level of attention must be given to the
advancement of reason constructed, reliable networks with regards to the
patients whose lives rely on upon the data being shared—and at last ensured—by
means of these systems. Consumer-grade
wireless networks cannot guarantee security required by the regulatory and
federal requirements.

The first step that a hospital must take to ensure
compliance with HIPAA is the security management process which includes risk
analysis, risk management, and
Information Technology review. A risk
analysis involves an accurate and thorough assessment of the potential
vulnerabilities posed to the integrity of the available electronic health
information. Risk management thereafter should be practiced to implement
security measures sufficient to reduce the risk posed by the system. Protecting
and safeguarding the individual’s PHI should be the highest priority while
building out security for the Information Systems.

 

 

3.  Do some Internet research on the use of VLANs
in hospitals. Summarize the benefits of using VLANs in hospitals and identify
examples of how St. Luke’s could further enhance its wireless network by
implementing VLANs.

Virtual LANs is a group of devices on different LAN segments
which work and communicate with each other as if they are on the same LAN.

Although there is few limitation to it
like device and port constraints they have several benefits like improved
performance and manageability and better security options. Benefits of using
VLAN in hospitals is that it makes the network infrastructure more secure and
it expands the security boundaries for that hospital. As such Firewall, can place at the end of the VLANS thereby
increasing security across all the VLAN segments spanned across different
departments and data centers.

 St Luke’s Hospital
could have further improved their Information Systems Security and Performance
by implementing VLAN. On the top of using Mobility XE, implementing VLAN could
have made their security reliability to another level.