The Health Insurance Portability and Accountability Act (HIPAA) was developed in 1996 with the intention of making healthcare more efficient and available to all Americans, without compromising data integrity. HIPAA is widely used today to safeguard and restrict the unauthorized use of protected health information (PHI), including medical records and payment information.
This HIPAA compliance chart provides a series of compliance obligations to organizations and their business partners. HIPAA compliance violations can attract monetary penalties ranging from $100 to $250,000 depending on the nature of violation.
Rules | Description | How Firewall Analyzer meets this requirement |
---|---|---|
164.308(a)(1)(ii)(D) | Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. | With Firewall Analyzer's Audit Log report, users can get information on logical access attempts and commands executed to their network devices. Firewall Analyzer provides detailed information on the changes made to firewall configurations. The solution triggers real-time alerts when a configuration change is made to help you take immediate actions in the event of misconfiguration. |
164.308(a)(5)(ii)(C) | Establish (and implement as needed) procedures to enable continuation of critical business processes for protection of the security of electronic protected health information while operating in emergency mode. | Firewall Analyzer provides you the option to back up all firewall data with Active StandBy and supports the continuous availability of firewalls. |
164.308(a)(7)(ii)(A) | Establish and implement procedures to create and maintain retrievable, exact copies of electronic protected health information.. | Firewall Analyzer can retain the database and archive your raw logs for more than 90 days. |
164.308(a)(7)(ii)(C) | Establish (and implement as needed) procedures to enable continuation of critical business processes for protection of the security of electronic protected health information while operating in emergency mode. | Firewall Analyzer provides you the option to back up all firewall data by Active StandBy and supports the continuous availability of firewalls. |
164.312(a)(2)(iv) | Implement a mechanism to encrypt and decrypt electronic protected health information. | Firewall Analyzer has the capability to encrypt raw logs to prevent unauthorized access. |
164.312(b) | Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. | Firewall Analyzer can review your logs periodically. With alerting mechanisms for security functions (e.g., intrusion detection system) and an authentication, authorization, and accounting (AAA) server (e.g., RADIUS), you can configure alerts to meet your security-related log reviews. |
164.312(c)(1) | Implement policies and procedures to protect electronic protected health information from improper alteration or destruction. | Firewall Analyzer provides you a detailed report on all configuration change records over a period of time. This serves as proper documentation of all firewall policy changes. |
164.316(b)(1)(i) | Maintain the policies and procedures implemented in written (which may be electronic) form. | Firewall Analyzer provides you detailed information on firewall configuration changes, which facilitates approval and testing of network connections. The solution triggers real-time alerts upon any configuration changes, which enables administrators to take immediate action upon any misconfiguration. |
164.316(b)(2)(i) | Time limit. Retain the documentation required by 164.316(b)(1)(i) of this section for 6 years from the date of its creation or the date when it last was in effect, whichever is later. | Firewall Analyzer can retain the database and archive your raw logs for more than 90 days. |
In addition to HIPAA, Firewall Analyzer can help you stay compliant with a host of mandates with its out-of-the-box compliance support. View the complete list here..
Featured links
Manage your firewall rules for optimum performance. Anomaly free, properly ordered rules make your firewall secured. Audit the firewall security and manage the rule/config changes to strengthen the security.
Get a slew of security and traffic reports to asses the network security posture. Analyze the reports and take measures to prevent future security incidents. Monitor the Internet usage of enterprise users.
Unlock the wealth of network security information hidden in the firewall logs. Analyze the logs to find the security threats faced by the network. Also, get the Internet traffic pattern for capacity planning.
With live bandwidth monitoring, you can identify the abnormal sudden shhot up of bandwidth use. Take remedial measures to contain the sudden surge in bandwidth consumption.
Take instant remedial actions, when you get notified in real-time for network security incidents. Check and restrict Internet usage if banwidth exceeds specified threshold.
MSSPs can host multiple tenants, with exclusive segmented and secured access to their respective data. Scalable to address their needs. Manages firewalls deployed around the globe.