Training & Certification
Request a Proposal
User Behavior Analytics
By Compliance Requirement
Find a Partner
About Our Research
Meet the Team
National Exposure Index
Quarterly Threat Report
Under the Hoodie
Events & Webcasts
Training & Certification
IT & Security Fundamentals
News & Press Releases
The Health Insurance Portability and Accountability Act (HIPAA) protects the privacy and security of personal health information (PHI). Any healthcare organization that stores, processes, or transmits PHI must meet HIPAA compliance requirements, including any business associates that perform functions or provide services on their behalf.
The HIPAA Compliance Security Rule lists a set of security standards with implementation requirements designed to safeguard PHI in electronic form (ePHI). These standards are grouped into five categories: administrative safeguards, physical safeguards, technical safeguards, organizational requirements, and policies and procedures.
We'll help you determine which regulations your organization needs to meet.
Use InsightVM to conduct a thorough assessment of risks across vulnerabilities, configurations, and controls, and prioritize risks for remediation based on threat exposure and business impact. Automatically audit your systems for compliance with secure configurations, password policies, and access control requirements.
Simulate real-world attacks against your defenses and evaluate the effectiveness of security measures at protecting ePHI with Metasploit. The closed feedback loop with InsightVM enables you to validate the exploitability of vulnerabilities in Metasploit and automatically prioritize for remediation in InsightVM.
InsightIDR provides the ability to tag systems containing ePHI as “restricted,” then monitors all activity on these systems for unauthorized access. Leverage user behavior analytics to detect security incidents and accelerate investigations with instant user context, endpoint interrogation, and advanced search capabilities.
Use AppSpider to dynamically scan your web, mobile, and cloud applications for vulnerabilities (including those that allow unauthorized persons to bypass authentication controls), and generate interactive reports for remediation. Leverage built-in HIPAA reports to quickly identify gaps and demonstrate compliance.
Rapid7's Security Advisory Services team can perform a full assessment of your security program against HIPAA regulations to help you improve your ability to protect ePHI. Rapid7 can also help you with monitoring your network for threats, penetration testing, security awareness training, and responding to security breaches.
Compliance should boost your security, not burden it. Rapid7's HIPAA compliance guide lays out the requirements of compliance, as well as the things you can do to not only meet those requirements, but improve your overall security in the process.
Join a distinguished panel of security professionals in the healthcare industry as they exchange points of view on the key issues, opportunities, and challenges you may face securing personal health information.
Try the SIEM You've Always Wanted
All fields are mandatory.