Solutions
H-ISAC offers a portfolio of products and services that have been identified and developed specifically for health sector members. These low cost or no-cost solutions help H-ISAC members to develop and maintain an effective, long-term defense against cyber and physical threats. Ranging in scope and size, H-ISAC solutions have been selected with a strategic vision and member need in mind. The focus area and solutions specifics can be seen below.
Threat Intelligence
Platforms
H-ISAC members can choose between a number of discounted threat intelligence platforms to accept, automate, prioritize, and communicate threat intelligence feeds for your environment.
Soltra. Soltra provides the basis for the H-ISAC Threat Platform. All members are able to connect to the H-ISAC threat feed – free of charge. For a discounted fee, members can have their own instance of Soltra Edge to define, aggregate, normalize, prioritize, and route threat data within their infrastructure.
Anomali. Anomali offers an entire platform of threat sharing and collaboration tools that automates the collection, normalization, and integration of threat intelligence while providing users the ability to securely communicate with peers.
TruSTAR. TruSTAR is an intelligence management tool that gives you a central destination to analyze and enrich the most relevant information threat for your organization.
PERCH. PERCH is a community defense platform that allows organizations to integrate with H-ISAC’s threat intelligence so you can see, detect, and share threat intelligence within the sector. PERCH provides an ideal solution for smaller organizations who do not have a SIEM, or to more effectively manage and track potential threats across disparate systems within larger organizations.
IP Domain and Digital Risk Monitoring
Offered via Digital StakeOut, members can monitor their IP footprint free of charge for the first year and get a discounted rate after that.
API Monitoring
BiMeta API Monitoring is a member-provided service that scans the deep dark web for stolen credentials, domain spoofing, stolen intellectual property, and more. Free of charge to all H-ISAC members, customers upload their information and BiMeta will send email alerts when there is risk of that information being compromised.
Identity
SAFE Identity has created a Trust Framework that connects multiple credential providers and supports all use cases for digital identities, including digital signatures, authentication, and encryption. For a fee, H-ISAC members are able to help drive the focus of identity credentialing for the health industry.
Third-Party Risk
Third-Party Risk Scoring Solutions. Members can choose between one of three vendor solutions to access free risk scoring of a limited number of vendors. Additionally, members can obtain a more robust version at a discounted prices.
Third-Party Risk Questionnaire Repository. Members can use one of two proprietary H-ISAC questionnaires and save to a central depository to collect, score, evaluate, and manage the level of risk by third-party vendors and partners.
Strategic Vision
By looking at our mission as an ISAC, combined with a long-term vision of the security market and member input, H-ISAC, has developed a strategic roadmap for the identification of new and existing solutions. Going forward we will focus on seven key categories: threat intelligence, identity, third-party risk, medical device security, resilience, physical security, and education. Members can see the current status in each of these categories on the roadmap section of the portal.