Headquartered in the northeastern United States, Main Line Health operates several acute care hospitals, a rehabilitation center, and approximately 50 ambulatory satellite clinics. Its physicians and staff aim to provide high-quality, compassionate care across a wide array of healthcare specialties: primary care, pediatrics, orthopedics, cancer treatment and management, mental health, and more.
The Challenge
Main Line Health began its journey with the Armis Centrix™ platform to replace its ineffective asset management system. A lack of visibility into the IT and IoT biomedical environment prompted the team to evaluate the Armis Centrix™ platform. Main Line Health did not have the certainty that its medical devices were secure and lacked confidence in its security infrastructure to prevent external attacks. The lack of visibility caused disjointed, manual processes preparing for compliance audits and difficulty obtaining the necessary information in the first place. As MLH technical teams dove deeper into the power of Armis, use cases quickly expanded.
The Solution
The MLH security team conducted a proof-of-value (PoV) over the course of a month, comparing Armis against other asset management tools.
Right at the outset, Armis detected the number of devices in the low six figures, including thousands of biomedical devices. “The volume of devices discovered by Armis was unanticipated. We thought we had about half as many,” said Kevin Werner, System Director of Operations. “We were especially impressed by the accuracy and granularity of the data that Armis gathered about each device— something we could not get from any other solution we looked at.”
Challenges
- Lack of full visibility into both IT and medical IoT devices across the organization
- Failure of existing asset management system to provide comprehensive and accurate device discovery and data
- Inability to identify unpatched, outdated, or underutilized devices
- Unintegrated, siloed security with protection gaps
- Labor- and time-intensive preparation for HIPAA compliance audits and inadequate identification of protected health information (PHI) usage
Results
- Identified IT, IoT and IoMT assets—2x more than previously estimated
- Integrated over 15 tools in the security stack to extend their value by further enhancing and centralizing visibility and automating response
- Leveraged device utilization data to update, phase out, or replace IT and biomedical IoT assets
- Facilitated compliance audits and improved accountability with detailed and accurate reporting on device and security
- Enabled network micro-segmentation and policy automation across the entire organization based on device type