skip to content
 
 

What is HIPAA?

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law designed to refine the movement and continuity of health insurance coverage in individual and group markets.

Title I of HIPAA compliance: HIPAA ensures health insurance coverage for employees and their families when there is a shift in or loss of jobs.

Title II of HIPAA compliance: Also known as the Administrative Simplification provisions, this section encourages the electronic exchange of healthcare information. These provisions outline the standards and policies for protecting personally identifiable information maintained by healthcare bodies. They also require the establishment of standards for electronic healthcare transactions and national identifiers for providers, health insurance plans, and employers.

The Omnibus Rule: The Omnibus Rule defines privacy and security requirements for healthcare providers, health plans, and other entities that process health insurance claims. It encompasses requirements for business associates of these entities that hold access to protected health information.

What are the three main rules of HIPAA?

There are three key rules that form the core of HIPAA:

  • The privacy rule: It protects the privacy of protected health information (PHI) , balancing patient confidentiality with the need to protect public health.
  • The security rule: HIPPA sets forth standards for safeguarding electronic PHI (ePHI). It mandates that covered entities enforce extensive administrative, physical, and technical measures to ensure the security of ePHI.
  • The breach notification rule: In situations where there is a breach of unsecured PHI, covered entities along with their business associates are bound to notify the affected individuals, the secretary of health and human services, and in certain circumstances, inform the media.

Related content

HIPAA Compliance management made easy

  • Simplify adherence to compliance mandates with a unified log management tool that monitors network logs at a granular level and provides out-of-the-box compliance reports.
  • Track all network activities to gain extensive information on data access, privilege abuse, user activity, logons and logoffs, and more.
  • Receive instant email or SMS alerts on anomalies, data breaches, and compliance violations to mitigate security threats as soon as possible.

Learn how EventLog Analyzer simplifies HIPAA compliance demonstration

Object access auditing

Object access auditing

Monitor and review access to electronic protected health information and satisfy HIPAA's object access auditing clause with EventLog Analyzer's file integrity monitoring. The solution provides in-depth reports on actions performed in sensitive files or folders, changes in access control, user and system details, and the status of these operations. This helps network administrators identify insider threats, audit privileged user activity, and prevent insider attacks.

Logon and logoff monitoring

Logon and logoff monitoring

Implement procedures to monitor login attempts and report discrepancies and possible abuse with a comprehensive log management solution. EventLog Analyzer satisfies HIPAA's logon and logoff audit requirements with its out-of-the-box reports. Gain details about successful or failed login attempts; usernames, dates, times, and reasons for events; terminal server session statuses; and more with these reports. Monitoring these activities in real time is also a proactive measure to mitigate breach attempts at the intrusion stage.

System events auditing

System events auditing

Adhere to HIPAA's system events audit requirement and ensure network security by monitoring system activities. EventLog Analyzer identifies and provides readily available reports on local system processes, like system startup or shutdown or changes to the system time or audit log. Additionally, the solution also maintains audit log records by parsing, analyzing, and archiving them securely. You can make use of the EventLog Reports to address section 164.308 (a) (3) of HIPAA.

User account validation auditing

User account validation auditing

Satisfy HIPAA's user account validation clause, which mandates the implementation of procedures for monitoring the authorization and supervision of user accounts with access to confidential patient health information. EventLog Analyzer audits successful and unsuccessful user account logon events, which are generated when a domain user account is authenticated on a domain controller. The User Account Validation reports give you detailed insights on the pre-authentication and post-authentication statuses.

Become HIPAA compliance ready with EventLog Analyzer

HIPAA compliance EventLog Analyzer reports
Sec 164.306 (a) (1) "Ensure the confidentiality, integrity, and availability of all electronic protected health information the covered entity or business associate creates, receives, maintains, or transmits."
  • Network Device Logon Reports
  • Network Device Attack Reports
  • AWS User Activity
  • Cloud User Login Activity
Sec 164.306 (a) (1) (i) "Implement policies and procedures to prevent, detect, contain, and correct security violations."
  • Network Device Logon Reports
  • Network Device Attack Reports
  • Network Device Configuration Reports
  • Network Device Security Reports
  • AWS User Activity
  • Route 53
  • VPC Activity
  • Storage Activity Reports
  • WAF Reports
  • AWS Network Security Groups
  • AWS Config Reports
  • Database Reports
  • EC2 Reports
  • Amazon Auto Scaling Reports
  • Amazon ELB Reports
  • Cloud User Login Activity
Sec 164.308 (a) (1) (ii) (D) "Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports."
  • File Changes
  • Network Device Logon Reports
  • Network Device Attack Reports
  • Network Device Security Reports
  • IAM Activity
  • File Changes Audit
  • VPC Activity
  • Storage Activity Reports
  • Database Reports
  • EC2 Reports
  • Amazon Auto Scaling Reports
  • Amazon ELB Reports
Sec 164.308 (a) (3) (ii) (A) "Procedures for the authorization and/or supervision of workforce members who work with electronic protected health information or in locations where it might be accessible."
  • User Account Validation
  • AWS Failed/Unauthorized Activity
Sec 164.308 (a) (4) (ii) (B) "Policies and procedures for granting access to electronic protected health information, for example, through access to a workstation, transaction, program, process, or other mechanism."
  • User Account Validation
  • AWS Security Token Service
  • Traffic Analysis Reports
Sec 164.308 (a) (5) (ii) (C) "Procedures for monitoring log-in attempts and reporting discrepancies."
  • Windows Logon Reports
  • Terminal Service Session
  • Unix Logon Reports
Sec 164.308 (a) (6) (ii) "Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, and document security incidents and their outcomes."
  • Windows Logon Reports
  • Terminal Service Session
  • Unix Logon Reports
Sec 164.308 (a) (7) (i) "Policies and procedures for responding to an emergency or other occurrence that damages systems that contain electronic protected health information."
  • Windows System Event

What else does EventLog Analyzer provide?

A powerful correlation engine

Detect network anomalies and trace security threats with a powerful correlation engine that holds over 30 predefined correlation rules and a drag-and-drop custom rule builder.

Learn more

In-depth auditing and reporting

Audit every entity in your network and obtain a detailed overview of what's happening in the network in the form of intuitive dashboards and reports.

Learn more

Automated incident management

Assign tickets in an external help desk console for security events of interest to speed up incident resolution.

Learn more

Augmented threat intelligence

Detect malicious IP addresses, URLs, or domain interactions with the built-in global IP threat intelligence database and STIX/FEED processor.

Learn more

Frequently asked questions

HIPAA is designed to secure the protected health information of patients. This includes all individually identifiable health details like test results, medical history, insurance details, demographic data, and other details specific to a patient and their healthcare services.

EventLog Analyzer is a unified log management solution that automates log collection and parsing, analyzing, correlating, and archiving your network's log data. The solution makes sense of the network activities and presents them in the form of intuitive dashboards and reports. EventLog Analyzer's in-depth auditing capabilities address IT compliance mandates like HIPAA by monitoring sensitive object access, user account behavior, logon and logoff events, and more. The solution also supports other common compliance mandates.

EventLog Analyzer provides instant alerts when any compliance violation is identified in the network. The comprehensive reports provided by the solution simplify compliance management.

Simplify HIPAA audits and logging with EventLog Analyzer

Download

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management
 
OSZAR »