Strengthening its security posture with in-depth global intelligence.
The McGill University Health Centre (MUHC) is one of the world’s foremost academic health centers. Each year, the MUHC treats almost 40,000 inpatients and realizes more than 700,000 ambulatory visits while performing almost 35,000 surgeries. Its Research Institute is the second largest medical and life sciences research facility of its kind in Canada.
Detecting security threats early
Health records are a valuable commodity on the black market as cybercriminals seek social security numbers and other personal information that can be used in identity theft. At the MUHC, work began several years ago to implement a global surveillance platform that would help security personnel more quickly identify and respond to potential threats, and better protect electronic patient information and network operations.
A priority for the MUHC is finding security weaknesses and minimizing potential risks across its network. “Vulnerability management and manual scanning can be extremely time consuming—primarily in terms of resolution, but also in terms of identification,” says a senior security analyst
with the MUHC Center of Surveillance and Security (CSS). “The key for us is to focus on the issues that have ‘pertinent applicability’ in which the combination of exposure and
threat exists in the context of a teaching hospital. With QRadar software, we can gain that visibility instantly and be more proactive to address security weaknesses rapidly.”
The open source tools that the MUHC previously used required a lot of time in terms of management and lacked the intelligence of an
enterprise-level correlation system, which the security team required to efficiently monitor a health organization that is comprised of six hospitals.
“Global visibility and fast response across our network are critical to protecting our infrastructure,” says a senior security analyst with the MUHC Center of Surveillance and Security (CSS). “It can cost millions to get back into operation if systems are infected, so early detection is critical.”
MUHC security staff wanted to more quickly identify and assess potential threats and security exposures.
A security intelligence solution based on IBM and Trend Micro software helps MUHC rapidly detect and respond to attacks, and offers a platform to reduce the time and cost of vulnerability management.
The platform currently analyzes 700 events per second, correlating network noise into a coherent story that helps staff uncover and stop approximately five major security attacks annually.
- IBM® QRadar® Security Intelligence Platform
- IBM Security QRadar SIEM
- IBM Security QRadar Risk Manager
- IBM Security QRadar Vulnerability
- Trend Micro Deep Discovery IBM Business Partner
- Trend Micro
Applying advanced analytics and anomaly detection
Working with IBM and Trend Micro, the MUHC implemented a sophisticated, integrated security intelligence platform that helps it detect and respond to attacks that could otherwise get lost in the “noise.”
“Upper management supported our vision to increase network visibility using IBM QRadar and Trend Micro software,” says a CSS senior security analyst.
IBM® Security QRadar® software provides advanced analytics and anomaly detection capabilities to help turn event data from roughly 3,000 network assets, including servers, network devices, and security devices and applications, into actionable insight. The organization also plans to incorporate activity from clinical applications.
Security staff can quickly determine if seemingly disparate incidents are somehow related and whether the issue is an operational one (for example, a network outage can be caused by a non-validated configuration) or a security threat.
The team also has more visibility into custom-systems that can’t run virus protection software due to vendors’ guidelines.
“We have exceptions on our network that can’t follow our standards,” says a CSS senior security analyst. “With this solution, we can monitor these systems and act quickly if any performs an action that is a threat to itself or to other machines on the network.”
“We can identify threats as they emerge, and act quickly so we can stop them very early on, before they can do any damage.”
—A Senior Security Analyst, Center of Surveillance and Security, The McGill University Health Centre
Detecting zero-day attacks and known malware
Malware-based threats are common to all organizations, especially to the MUHC, which has a heterogeneous environment consisting of students, executives, clinicians, researchers, contractors, suppliers and more. In a new era of BYOD (bring your own device), the spread vectors are constantly increasing and require security teams to be on a constant watch for known and unknown threats that can only be recognized through abnormal behavior or specialized detection systems.
According to a CSS senior security analyst at the MUHC, by integrating Trend Micro Deep Discovery with the QRadar platform, the security team is better able to uncover malware-driven attacks that may be designed to steal sensitive information or employee credentials, or to interrupt operations.
The software inspects network traffic for evasive threats, such as zero-day malware, and feeds the information into the QRadar platform, to enable rapid response.
“Before, it could take days to analyze something that was behaving abnormally on the network and recognize the cause as a malicious piece of software,” says a CSS senior security analyst. “Now, we can do that in a few minutes and see if, and where, an infection is propagating so we can respond immediately.”
Thwarting potential attacks
The platform currently analyzes 700 events per second, correlating millions of events into a coherent “story” that has helped the MUHC security personnel reduce incident response time and thwart attacks.
“We typically uncover approximately five serious cases a year,” says a CSS senior security analyst. “We can identify threats as they emerge, and act quickly so we can stop them very early on, before they can do any damage.”
The organization’s short-term priority is to include context into events by working with IBM to integrate vulnerability and risk-related information with the existing protection measures in place. This work will increase the level of intelligence in high-priority risk identification to help MUHC reduce the time and effort required in prioritizing actionable events, which, in turn, helps security staff to reduce the organization’s overall risk.
“By combining asset vulnerability information based on the network with application data that provides the actual degree of exposure to an identified threat, we can more quickly see if we have potential holes in our network that require imminent attention, and we can understand the risk, so we can concentrate on the riskiest issues first,” says a CSS senior security analyst.
Teaming with IT to improve operations
A side benefit, according to the MUHC, has been improved network performance and availability.
“We’ve been able to identify and help our IT staff in validating configurations that might affect network or system availability and create noise on the wire, which can reduce the security visibility,” says a CSS senior security analyst. “We have shown in numerous cases the value of the platform to both business and IT executives, and QRadar is now part of organizational processes, such as troubleshooting, forensics, monitoring and alerting. A quick demo caught our executives’ attention and won them over quickly.”
He concludes, “The load of information that we have to treat from infrastructure IT systems, administrative systems, clinical applications and biomedical systems is overwhelming for any security team in a similar context. QRadar helps clear the noise on the wire and enables us to gain the clarity we need to evaluate the threats efficiently. In a world of interconnectivity and network convergence, QRadar also brings value to the business. Monitoring biomedical equipment critical to human life and confirming its availability is a clear example of how security becomes a business enabler and not just an IT ‘toy.’”