Security is a priority for all NHS IT teams across the Country. Access to shared IT infrastructure for a large number of NHS workers, required for 24 hours a day and from any device, presents a unique challenge for the NHS.
NHS data must be totally secure in order to maintain patient trust in the digital health and care system.
Securing multi-organisation, multi-location, multi-device IT environments is often very complex, requiring a variety of technologies to work collaboratively to provide the security levels required.
To help achieve maximum security at NHS Trusts, BDS utilise the technologies already in place and complements them with cost-effective additional services. This means leveraging Active Directory, Windows and open protocols such SSL, IPsec and TLS effectively. In addition, we recommend introducing additional security components for 2-factor authentication, remote access and device encryption.
Our consultants help NHS organisations across the UK to determine how to deliver the best experience for users, taking into consideration the usage models and licences available.
Our security portfolio combines:
- Authentication – implementing Active Directory to control access to computers, using NHS Smartcards and providing 1.5/2 factor authentication and credential management.
- Remote access and application gateways – providing Microsoft Direct Access for desktop mobility and enabling discrete application access and secure LDAP (LDAPS) authentication via Citrix NetScaler. In addition, we advise, procure and deploy the 3rd party SSL certificates and continue to support the popular Microsoft Threat Management and Unified Access Gateways (TMG and UAG).
- Endpoint protection – rolling out Microsoft BitLocker and deploying BitLocker Administration and Monitoring (MBAM) to provide enterprise-class endpoint protection. Helping customers select, deploy and manage the best-of-breed anti-virus solutions from Trend Micro for physical and virtual servers and desktops.
- Active Directory Security Assessment – helps to identify, quantify and reduce the risks affecting the security of one of the most critical infrastructure components in most IT environments. By providing actionable guidance to secure existing investments assessment will help prevent the much greater cost and disruption inflicted by a security breach.
For further information please contact us or use the panel opposite and we will call you back shortly.