Training & Certification
Request a Proposal
User Behavior Analytics
By Compliance Requirement
Find a Partner
News & Press Releases
Events & Webcasts
The Health Insurance Portability and Accountability Act (HIPAA) protects the privacy and security of personal health information (PHI). Any healthcare organization that stores, processes, or transmits PHI must meet HIPAA compliance requirements, including any business associates that perform functions or provide services on their behalf.
The HIPAA Compliance Security Rule lists a set of security standards with implementation requirements designed to safeguard PHI in electronic form (ePHI). These standards are grouped into five categories: administrative safeguards, physical safeguards, technical safeguards, organizational requirements, and policies and procedures.
We'll help you determine which regulations your organization needs to meet.
Use InsightVM to conduct a thorough assessment of risks across vulnerabilities, configurations, and controls, and prioritize risks for remediation based on threat exposure and business impact. Automatically audit your systems for compliance with secure configurations, password policies, and access control requirements.
Simulate real-world attacks against your defenses and evaluate the effectiveness of security measures at protecting ePHI with Metasploit. Closed-loop integration with InsightVM enables you to validate the exploitability of vulnerabilities in Metasploit and automatically prioritize for remediation in Nexpose.
InsightIDR provides the ability to tag systems containing ePHI as “restricted,” then monitors all activity on these systems for unauthorized access. Leverage user behavior analytics to detect security incidents and accelerate investigations with instant user context, endpoint interrogation, and advanced search capabilities.
Use AppSpider to dynamically scan your web, mobile, and cloud applications for vulnerabilities (including those that allow unauthorized persons to bypass authentication controls), and generate interactive reports for remediation. Leverage built-in HIPAA reports to quickly identify gaps and demonstrate compliance.
Rapid7's Security Advisory Services team can perform a full assessment of your security program against HIPAA regulations to help you improve your ability to protect ePHI. Rapid7 can also help you with monitoring your network for threats, penetration testing, security awareness training, and responding to security breaches.
Compliance should boost your security, not burden it. Rapid7's HIPAA compliance guide lays out the requirements of compliance, as well as the things you can do to not only meet those requirements, but improve your overall security in the process.
Join a distinguished panel of security professionals in the healthcare industry as they exchange points of view on the key issues, opportunities, and challenges you may face securing personal health information.