Avia Logo
Write a review

Vendors /

Asimily

Asimily

Asimily

badge_claimed
Claimed profile

Asimily has built an industry-leading risk management platform that secures IoT devices for medical, diagnostic, life sciences, and pharmaceutical companies in the healthcare industry. With the most extensive knowledge base of IoT and security protocols, Asimily inventories and classifies every device across a healthcare organization, both connected and standalone. Because risk assessment—and threats—are not a static target, Asimily monitors healthcare organizations’ devices, detects anomalous behavior, and alerts operators to remediate any identified anomalies. With secure medical, laboratory, IoT/OT, and IT equipment, Asimily customers know their business-critical devices and data are safe.

Read more

Filter products


Product Name

EMR compatibility

Star rating

Client types

Solution libraries

    Keywords

    Solutions

    Filter products by Health System clients


    Used by

    EMR used

    Organization size

    Products


    2 products
    Sort by:
    Default
    Alphabetical
    Highest rated
    2 products
    Sort by:
    Default
    Alphabetical
    Highest rated

    Filter products


    Product Name

    EMR compatibility

    Star rating

    Client types

    Solution libraries

      Keywords

      Solutions

      Filter products by Health System clients


      Used by

      EMR used

      Organization size

      Product Logo
      Versatile platform
      Versatile platform
      5+ years in business
      5+ years in business
      Versatile platform
      Versatile platform
      5+ years in business
      5+ years in business
      ✓ Passive technology, no installed software agents to manage, ideal for medical devices ✓ Utilizes research based on deep experience in medical device use and design and strong understanding of cybersecurity principles & practices, along with Artificial Intelligence (AI), machine learning and proprietary algorithms, to perform deep packet analysis of device data traversing the network ✓ Supports several use cases across Inventory, Cybersecurity and Operational Management with an expanding platform roadmap to meet additional operational and strategic organizational requirements ✓ Integrates with an organization’s supporting IT/Security platforms, i.e. CMMS, SIEM, Vulnerability Scanners, Network firewalls and network access controls to support the health system overall IT Security and Risk management programs and maximize existing platform tools and investments Visibility of critical information across organizational disciplines: Clinical Team, IS Team, Risk Managers ✓ External Connections: finding the bad actors ✓ IT Services protocols: i.e. SMB, RDP, FTP ✓ Anomalies: real time Network Traffic Analysis (NTA) ✓ Forensics: data flow, protocols, and traffic stats ✓ FDA Recall: linked to FDA device database ✓ Supported by Asimily researchers and analysts
      View full profile
      key clients
      Leading Health System
      Health system
      Leading Health System
      Health system
      Leading Health System
      Health system
      Leading Health System
      Health system
      +50 verified clients
      To see which organizations are using this product, sign in or create a free account.

      Visit Website

      Need help narrowing down products?

      Add more criteria to see your compatibility level for every vendor. It only takes a few minutes, just create a free account to get started.
      Product Logo
      Rated In Top 10%
      Rated In Top 10%
      5+ years in business
      5+ years in business
      Rated In Top 10%
      Rated In Top 10%
      5+ years in business
      5+ years in business
      Current State: Typically, today, risk assessments are resource intensive in terms of people and time. Across health delivery organizations (HDOs) there are numerous approaches and in virtually every instance people are addressing the problem with: • Excel spreadsheets, manually created risk & control profiles not well-suited for medical devices • Manual analysis of a manufacturers disclosure statement for medical device security (MDS2) • Manual analysis of controls, vulnerabilities, devices to provide a one-off risk approach, subjective results • Many stakeholders, lack of continuity across facilities & platforms for uniform configuration & deployment • Lack of expertise and knowledge of the application of risk management to connected medical devices Anecdotally, customers state risk assessments take 20-80 hours, per device, start>finish with inconsistent outcomes. How ASIMILY ProSecure solves the problem: ASIMILY ProSecure, permits clients to tackle medical device risk assessments with a new paradigm…a paradigm of risk modeling and platform configuration that can be standardized and implemented consistently across an organization. Each device platform can be implemented with a documented risk assessment with control and configuration plan (CCP) that ensures a standard risk profile. ASIMILY ProSecure combines all the knowledge of every platform across our installed base to create an anonymized, community sourced data set of the best configuration and control plan. Every ASIMILY customers is gaining the insights and advantages of ASIMILY’s artificial intelligence (AI) and machine learning (ML) backend. ASIMILY ProSecure fills the missing gap, completing the risk assessment puzzle. ASIMILY ProSecure clients can create and evaluate risk, optimal configurations, and best security controls as part of contractual requirements and implementation criteria. Clear, documented requirements to ensure consistency across medical devices as a fleet, or platform, instead of every installation being a one-off and different. ASIMILY ProSecure addresses four primary use cases for risk assessment and CCP development: 1) Legacy devices that need a standard configuration and control plan 2) Shadow IT, unconnected devices with network interface cards, may connect 3) New devices being considered and needing a risk assessment and CCP 4) Ad hoc development of CCPs based on local needs, assets, and policies
      View full profile
      key clients
      Leading Health System
      Health system
      Leading Health System
      Health system
      Leading Health System
      Health system
      Leading Health System
      Health system
      +50 verified clients
      To see which organizations are using this product, sign in or create a free account.

      Visit Website

      back to top