Optiv + Medical School = Healthier Cybersecurity & Identity Management

Industry Served: Education/Healthcare


Our Starting Point

  • Limited scope of overall IAM strategy
  • Protect endpoints to harden email security
  • Manage access for 20,000 internal users and 1,000 applications

Accelerating Forward

  • A comprehensive IAM strategy workshop to identify gaps and determine next steps
  • Deployed a comprehensive endpoint security program, including:
    • Mandiant Managed Defense and Trellix EDR - Forensics to secure the network and endpoints
    • Proofpoint to harden email security
    • Netskope to provide visibility into SaaS technologies and protect cloud assets

Client Outcomes

  • 99% improvement in endpoint malware detection
  • 10 million malicious emails intercepted through enhanced email security
  • Over 1,000 user access applications managed successfully
  • Optiv and the client have maintained a valuable partnership, further enhancing the university’s security program

 

The Situation – secure against advanced persistent threats (APTs)

 

A leading US medical research school needed to improve their identity access program, while supporting and enhancing their patient care operations, research and outcomes. With more than 3,000 students and 700 residents across six colleges, plus a 700-bed medical center and over 20,000 internal users, it was a challenging security landscape. 

 



The university needed to monitor their endpoints, secure their email from phishing attempts and manage the identity and access of all users. Understanding where their security gaps were, they wanted strategic advice on how to mature and scale their identity access program. 

Image
Asset Download.png

 

The Solution – collaboration for better identity access management (IAM)

 

We jumpstarted the process with an identity access management (IAM) workshop – to help the university understand their IAM landscape, and develop a strategy aligned with their business initiatives. Next in priority was email, endpoint and cloud security recommendations. Optiv recommended and implemented solutions from Mandiant, Trellix, Proofpoint and Netskope, protecting 99% of their endpoints and completely preventing malicious email delivery.

 



Today, Optiv and client are working towards a comprehensive solution to manage identity and data access for internal users, clients and partners throughout the state.

How can we help you secure greatness?

 

Optiv can advise on, deploy and operate end-to-end cybersecurity programs aligned to your business goals. As the cyber advisory and solutions leader, we serve nearly 6,000 companies across every major industry. Our certified experts can help you gain the agility, security, scale and control you need to stay ahead of the competition.

 

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?