{"id":51645,"date":"2017-12-04T13:00:59","date_gmt":"2017-12-04T21:00:59","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=51645"},"modified":"2017-12-01T11:50:30","modified_gmt":"2017-12-01T19:50:30","slug":"customer-spotlight-healthpartners-resuscitates-cybersecurity-palo-alto-networks","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/12\/customer-spotlight-healthpartners-resuscitates-cybersecurity-palo-alto-networks\/","title":{"rendered":"Customer Spotlight: HealthPartners Resuscitates Cybersecurity With Palo Alto Networks"},"content":{"rendered":"<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:58.4%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-large wp-image-17272 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Healthcare-500x292.png\" alt=\"Healthcare\" width=\"500\" height=\"292\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Healthcare-500x292.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Healthcare-230x134.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Healthcare-768x449.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Healthcare-510x298.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Healthcare-68x40.png 68w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Healthcare.png 1172w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>Imagine sitting in an exam room at a hospital, waiting to find out the result of an important test, but your doctor can\u2019t access it because the electronic medical records system has been corrupted by malware.<\/p>\n<p>For HealthPartners, an award-winning integrated healthcare system based in Bloomington, Minnesota, securing patient information is necessary to provide world-class healthcare services. To protect the organization\u2019s sensitive healthcare data, HealthPartners needed a security platform with next-generation capabilities and increased visibility.<\/p>\n<p>After declining an expensive hardware refresh opportunity with its previous vendor, HealthPartners selected Palo Alto Networks Next-Generation Security Platform for about half the cost.<\/p>\n<p>HealthPartners improved its security posture by deploying six <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/next-generation-firewall\/pa-5200-series\">PA-5220s<\/a> along with subscriptions to <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiatives\/threat-prevention\">Threat Prevention<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/subscriptions\/url-filtering-pandb\">URL Filtering<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/subscriptions\/wildfire\">WildFire<\/a>\u00a0cloud-based threat analysis service, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-endpoint\/traps\">Traps<\/a>\u00a0advanced endpoint protection, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/subscriptions\/autofocus\">AutoFocus<\/a>\u00a0contextual threat intelligence service and <a href=\"https:\/\/www.paloaltonetworks.com\/products\/management\/panorama\">Panorama<\/a>\u00a0network security management.<\/p>\n<p>The move gave HealthPartners advanced endpoint protection on all its workstations and servers while segmenting its PCI traffic more securely, reducing PCI scope and strengthening compliance.<\/p>\n<p>HealthPartners saw the following benefits after deploying Palo Alto Networks Next-Generation Security Platform:<\/p>\n<ul>\n<li>Stopped 100 percent of ransomware samples tested during a proof of concept.<\/li>\n<li>Consolidated multiple systems onto one platform at half the cost of competitors.<\/li>\n<li>Blocked dozens of cyberattacks in the first year using integrated threat intelligence.<\/li>\n<li>Reduced compliance scope by securely segmenting PCI and non-PCI traffic in core network.<\/li>\n<li>Gained granular visibility and deeper insight into cyberthreat activity and point of origin.<\/li>\n<\/ul>\n<p>\"There are a lot of exciting opportunities that we haven\u2019t had before,\u201d says Joel Pfeifer, principal security analyst at HealthPartners. \u201cBecause of the consistency and high percentage of true positives we get from the Palo Alto Networks platform, we have the confidence now to automate. We could take advantage of information the Palo Alto Networks platform provides and automate threat mitigation. That\u2019s something we\u2019ve never had the opportunity to do until now.\u201d<\/p>\n<p>Read the <a href=\"https:\/\/www.paloaltonetworks.com\/customers\/healthpartners\">HealthPartners<\/a> case study to learn how they were able to strengthen compliance efforts and prevent healthcare-specific threats with Palo Alto Networks Next-Generation Security Platform.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how HealthPartners were able to strengthen compliance efforts and prevent healthcare-specific threats with Palo Alto Networks Next-Generation Security Platform.<\/p>\n","protected":false},"author":468,"featured_media":17272,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[295],"tags":[139,4980],"coauthors":[4977],"class_list":["post-51645","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-customer-spotlight","tag-healthcare-2","tag-healthpartners"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/08\/Healthcare.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/51645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/468"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=51645"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/51645\/revisions"}],"predecessor-version":[{"id":51678,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/51645\/revisions\/51678"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/17272"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=51645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=51645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=51645"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=51645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}