Defense In-Depth for Real-Time Patient Monitoring
Protection through a multi-layered approach
Host firewall
A host firewall is enabled for network connections.
Minimized openings
Only necessary application ingress and egress ports are open to the enterprise network, minimizing the attack surface.
PHI encryption
Stored personal health information (PHI) is encrypted, helping protecting the privacy of patients.
Signed software
Where available, software updates must have signed software package files before installation.
HTTPS only
Product configuration is managed via encrypted HTTPS only.
Continual maintenance
Software integrity checking is continuously performed as a background task.
Streamlined operation
Software processes run with minimal permissions, primarily in user-space.
Preserved logs
All user activity is maintained in an audit log.
Vulnerability management
Reported vulnerabilities are continuous monitored and mitigated as appropriate to ensure systems maintain cybersecurity protections.