Published on 6 Jan 2014
“ We can now quickly, easily and accurately produce audit reports for HIPAA and meaningful use compliance. This has helped us obtain a considerable sum of meaningful use incentive dollars. ”
Eddy Stephens, Chief Information Officer, Infirmary Health System
Infirmary Health System
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Infirmary Health System needed to automate and strengthen security and endpoint management to better protect data and meet HIPAA and meaningful use requirements.
Working with ESM Technology, the organization deployed a comprehensive security solution from IBM that helps staff secure endpoints and better detect and respond to threats across the organization.
With a unified security platform, the organization has met data security requirements for meaningful use, qualified for meaningful use funds, and reduced security incidents significantly.
IBM products and services that were used in this case study.
IBM Endpoint Manager for Mobile Devices, IBM Security QRadar Log Manager, IBM Security QRadar SIEM, IBM Endpoint Manager for Software Use Analysis, IBM Endpoint Manager for Lifecycle Management, IBM Endpoint Manager for Core Protection, IBM Endpoint Manager for Patch Management, IBM Endpoint Manager for Security and Compliance
Integrated Service Management & Security Framework
© Copyright IBM Corporation 2014 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America January 2014 IBM, the IBM logo, ibm.com, BigFix, and QRadar are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS Word documentUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. iT Server Mgmt in-a-box™ Health Care (Security & Compliance) Edition is not an IBM product or offering. iT Server Mgmt in-a-box™ Health Care (Security & Compliance) Edition is sold or licensed, as the case may be, to users under ESM Technology’s terms and conditions, which are provided with the product or offering. Availability, and any and all warranties, services and support for iT Server Mgmt in-a-box™ Health Care (Security & Compliance) Edition is the direct responsibility of, and is provided directly to users by, ESM Technology. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. WGC12356-USEN-00