HIPAA provides requirements and guidelines for maintaining the security and privacy of individually identifiable health information, and the Cynet 360 platform collects activity data and provides protection against threats to the implementing organization.
Some of the specifications in HIPAA are policy/process requirements are entirely the implementing organization’s responsibility, while others apply to a technology platform that handles or interacts with any personally identifiable information. The features available in the Cynet 360 Platform can be utilized by the implementing organization to partially or fully satisfy the specifications in the requirement.
Cynet 360 platform provides HIPAA compliance in the following groups:
Vulnerability assessment and ranking, as well as proactive risk scoring for hosts, user accounts, executed files and network domains/sockets.
Multilayered endpoint protection: signature-based Antivirus + Next-Gen Antivirus that includes AI-based static analysis, behavioral analysis, memory monitoring and comprehensive threat intelligence feeds.
Monitoring of all attempted logins.
Enforcement of File Integrity Monitoring (FIM) policy.
Array of attack detection technologies: EDR, Network Analytics, User Behavior Analytics (UBA) and Deception.
Collection of all activity logs across the environment: host, account logins, data access, Windows events and firewall/proxy logs.
Supplemental support via Cynet 360, detailed threat prevention/detection and alert reporting.
|HIPAA Requirement||Testing Requirement||Comments|
| Covered entities and business associates must do the following:||The Cynet 360 Platform provides detection, prevention, monitoring, and search capabilities to defend against sophisticated threats and adversaries.|
|Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with §164.306(a).|| |
§ 164.308 (a)(5)(ii)(B)
|Procedures to guard against malicious software host/network IPS, unified threat management, network anomaly detection, patch management, firmware management, host/network IDS, OS access controls (least-privileged user), content filtering.|| |
§ 164.308 (a)(5)(ii)(C)
|Implement procedures for monitoring log-in attempts and reporting discrepancies.|| |
§ 164.308 (a)(6)(ii)
|Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity or business associate; and document security incidents and their outcomes.|| |
§ 164.312 (b)
|Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.|| |
|Policies and procedures to safeguard PHI unauthorized alteration.||Cynet 360 supports enforcement of File Integrity Monitoring policies based on user definitions.|
§ 164.316 (b)(2)(i, ii)
| || |
§ 164.404 (b)
| || Cynet 360 supplements this requirement with the following capabilities:|
Let our team monitor and detect cybersecurity threats against your network, users, files and hosts 24/7 via our ThreatFortress Cynet360 XDR and Response Automation platform.
ThreatFortress Cynet XDR prevents and detects threats on endpoints, networks, and users and triggers for each identified threat an automated investigation flow that reveals the attack’s scope and root cause and applies automated remediation. The 24×7 MDR team continuously monitor and optimize this process to maintain top quality and precisionLearn more
Lure Attackers to Reveal Their Presence with Advanced Deception Technology. That's right part of the ThreatFortress system sets traps for cybercriminals to further protect your system against attack.Learn More
Schedule a time to speak to your cybersecurity consultant for free to help you understand your options. Or Email Help@ChatFortress.com and our team will respond to your questions.
Helping to protect your business with real-time threat prevention and detection services for your Users, Hosts, Networks and Files. XDR Prevention and detection of a myriad of attack vectors, utilizing the capabilities of the following security technologies:
Cynet Prevention & Detection leverages Cynet Sensor Fusion to provide the integrated capabilities of Next-Generation Antivirus, Endpoint Detection and Response, Network Analytics, Deception and User Behavioral Analytics. Cynet also moves beyond the incremental value of these capabilities, by unveiling advanced threats that can be detected only by concurrent analysis of endpoint, user and network activities.
Block execution of malware, exploits, fileless, Macros and ransomware.
Detect advanced attacks by continuous monitoring of endpoint file and process activities.
Monitor network traffic to unveil reconnaissance, credential theft, lateral movement and data exfiltration attempts.
Profile the behavior of all user accounts to pinpoint anomalies that indicate an attempted compromise. Learn More
Plant various types of decoy files across your environment to lure attackers into revealing their presence. Learn More
Providing fully automated or manual response actions to threats. Manual and automated remediations of infected hosts, malicious files, compromised user accounts and attacker-controlled traffic.
Cynet Response Orchestration includes a full set of remediation actions to address infected hosts, malicious files, attacker-controlled network traffic and compromised user accounts. Remediation can be performed either directly on the endpoint or by involving infrastructure components such as firewall, AD, etc. Cynet supports response automation by gathering several remediation actions into playbooks that are activated upon occurrence of respective alerts.
Remove malicious presence and activity with pre-built actions for hosts, files, users and network.
Build your own response workflows by chaining various remediations together and adding scripts to communicate with core components such as firewalls and AD.
Automate incident response workflows by using Cynet’s playbooks to resolve security events without the need for human intervention.
Providing you with 24/7 monitoring of all of your endpoints by real humans and SOC Anlysts. CyOps is Cynet’s 24/7 SOC team of threat researchers and security analysts that complement Cynet 360 technology with unmatched security expertise, available to Cynet’s customers at no additional charge. CyOps assist Cynet customers with in-depth investigation, proactive threat hunting, malware analysis and attack reports, ensuring that every security event is handled and resolved.
Continuous search through our customers’ environment to detect and address live attacks.
Engage CyOps upon any suspicious activity you see in your environment, to detect, respond and remediate.
Get reports on attacks that CyOps detects across our customers’ install-base, including IOC and mitigation practices.
Submit any suspicious file to an expert analysis for information regarding its nature and potential risks.