New York-based Cynerio has added to its platform a capability for virtual segmentation—which promises to cut times for healthcare Internet of Things (IoT) security projects from more than a year to weeks while also increasing confidence in continuous medical services.

Safe and effective healthcare IoT security projects can take more than a year to execute due to a lack of visibility into network topology and sensitive device operations. Building effective cybersecurity policy requires thorough analysis and the ability to contextualize and prioritize devices according to impact. The Cynerio platform’s new virtual segmentation capability automatically delivers safe and effective policies in a matter of weeks by customizing segmentation policy for every device type, company officials say.

The virtual segmentation capability profiles device communications and generates east-west and north-south segmentation policies, allowing IT security teams to test the policies and monitor for violations before pushing them to live clinical network environments. The AI-based technology groups devices and segments them according to network behavior while risk is prioritized based on device criticality and medical impact. The platform then monitors the network to ensure all traffic is compliant with policy and provides the tools to refine it, sending automatic updates when policy is safe to push to firewall and NAC.

“The challenge of achieving safe and effective segmentation is what inspired us to develop the virtual segmentation capability for our customers,” says Leon Lerman, CEO and co-founder of Cynerio. “Our top priority is making healthcare IoT security projects as easy and painless as possible by helping hospitals safely navigate the risks of immediately enforcing segmentation policies in clinical environments. Cynerio already offers seamless integration with top-tier cybersecurity tools like Cisco, Check Point, Forescout, Palo Alto, and more. Adding virtual segmentation to our platform saves hospitals years of time and resources spent on IoT security projects and provides policies that can be easily enforced with confidence.”