A Prescription for HIPAA Compliant Security in the Cloud
“I told my doctor I wanted a second opinion. He said, ‘Okay, you’re ugly too.'”
As applications continue to shift into cloud-based systems, the importance of architecting the proper supporting infrastructure is paramount.
Nowhere is this more evident than in healthcare. To assure high levels of compliance such as those demanded by HIPAA, network security is a crucial part of an acceptable solution. For a great case study in how to do it right, look no further than cloud provider Thrasys.
Thrasys offers “on demand” cloud services for managing Electronic Health Records. This placed two key challenges on the network architecture:
1) Rapid & flexible deployment
2) Government-approved levels of security
To satisfy their needs, Thrasys announced it had turned to Vyatta virtual machines to connect and secure their cloud-based service. To quote their CTO, “Our Vyatta virtual firewall allows us to offer providers, patients and service centers easy access to on-demand applications – from anywhere, at any time.”
Take a moment to think how virtualization changes the requirements for network solutions. IT architectures can’t lose what they use to have — they still need network segmentation and security. The difference is that now they have to achieve it inside the server, betwixt and between virtualized applications. It could be driven by something like HIPAA, or it could be for other multi-tenancy reasons. Regardless, it has to happen and Vyatta has the industry’s most complete solution for easily meeting these rigorous networking requirements.
Last year we predicted 2011 was the year virtualized networking went mainstream, and we were right. Today production solutions around the world are running on Vyatta virtual machines. Enterprises, clouds, and even the federal government run Vyatta VMs to meet their needs. Do yourself a favor and test out the broad capabilities of the Vyatta solution… like Thrasys, you’ll discover it’s a key part of an incredibly effective and efficient IT architecture.
Entry filed under: Uncategorized.