• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Business   »   Five Questions with University of Florida Health

Five Questions with University of Florida Health

  • Posted on:March 15, 2017
  • Posted in:Business, Security
  • Posted by:
    Justin Foster
0

With the growing number of threats, technologies, and responsibilities, security teams have no shortage of challenges they face daily. Now more than ever, it is important that security providers offer tools that work with these teams instead of against them; solutions that allow for opportunities in place of constraints. This is why customers were directly included in the development process of Deep Security 10, collaborating together to create a solution that is both effective and user friendly. After all, as this next customer reminds us, “it is customers that are using the products and if customers aren’t happy with them, no one wins.”

In our continuing series, we are speaking with customers who were part of the development of Trend Micro Deep Security 10. Previously we looked at the experience of XentIT and TRC. This week we head south all the way down to the sunshine state of Florida with Jason Noll, Enterprise Systems and Security Administrator at University of Florida Health.

University of Florida Health is a comprehensive system that serves patients across northeast and north-central Florida via the University of Florida Health Science Center and UF Health Shands health care system. Jason shared his experiences in the industry and being part of the customer-driven development program.

TM: Tell us about a day in the life of your role.

JN: Every day is different, but generally a day in the life of my role includes managing the majority of endpoint security systems, validating their health, determining if there is anything that needs to be addressed, working with stakeholders and planning upcoming technology implementation.

TM: What are the top security challenges facing you in the healthcare and information security industry today?

JN: I think the top security challenges facing the healthcare industry today are how vast the threat landscape has become and how quickly the targeting of healthcare organizations has increased. It seems as if we’re in a constant arms race with threat actors on who can produce the best offensive tools, versus who can implement the best defensive tools. On the defensive front, security professionals are challenged to decide, “what technologies should I implement and from what vendors? How hard are they to learn and use? How do the tools fit in with the rest of my defenses? How will they impact my environment?” I’m excited about Deep Security 10 because it helps to address these questions and concerns. It’s a robust and modular security solution, now with features like application control, threat sandboxing and enhanced anti-ransomware, all of which give security professionals and organizations a very powerful toolset for defense.

TM: You were part of the Deep Security 10 development process. Can you tell us about your experience working with the product team and shaping Deep Security 10?

JN: My experience working with the Deep Security team and going through the preview process was the most enjoyable collaborative experience I’ve ever had with any vendor, and I’ve worked with many vendors for many years. It’s the first opportunity I’ve had to work with the people who make the product, have conversations about the direction they are heading, and make suggestions they may not have considered. I really enjoyed working with the user experience team, product managers, and developers. I was able to both give and receive feedback on how an administrator like myself could get the most benefit from a product like Deep Security 10. I wish there were more vendors that would be as customer focused as the Deep Security 10 team has been in seeking that information out. After all, it is customers that are using the products and if customers aren’t happy with them, no one wins.

TM: What does Trend Micro mean to you?

JN: I personally see Trend Micro as a security vendor family. I’ve had a long relationship with Trend Micro now, going on seven years. Our university and healthcare system has had a relationship going on 17+ years now. What really sets Trend Micro apart from other vendors that I’ve worked with are the relationships and people that work there. It’s invaluable how well we work together to solve the tough problems, not just with the products, but also with security as a whole and how those solutions apply to our organization.

TM: What is your advice for security professionals in your industry?

JN: Never stop learning. Always take time to invest in learning anything and everything you can about security and the security profession. Whether it be books, conferences, blogs or social media, never stop the pursuit of expanding your security knowledge. Of all the professions out there, I would say security changes the fastest and it’s very important to keep up with what’s happening around us. From there, you can begin to apply that information to your organization or whatever it is you’re trying to protect.

Learn more about Deep Security 10 from www.trendmicro.com/hybridcloud

If you have questions or comments, please post them below or follow me on Twitter: @justin_foster.

Related posts:

  1. Data breach triggers identity theft at Florida university
  2. Five Questions with The University of New Brunswick
  3. Five Questions with the University of Pittsburgh
  4. Five Questions with Rush University Medical Center: En-Abled Veteran

Security Intelligence Blog

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.