How Securing Blood & Organ Donor Data Became A Minor Operation

NHS Blood and Transplant, an integral part of the National Health Service (NHS), is an organisation, which collects, processes, stores and issues approximately 2.1 million blood donations per year from its 15 blood centres in England and North Wales.

In addition to dealing with blood donations, NHS Blood and Transplant conducts new research into improving the safety of blood and blood products, and the ways they can be used to help save lives. Storing confidential personal data as well as sensitive research data means it is imperative the organisation has a fail-safe data security solution in place.

The challenge

As an existing Check Point customer, NHS Blood and Transplant already had a robust laptop and PC security solution in place. However they needed to enhance protection for sensitive data on its PCs to comply with the latest UK Government’s directives on data security in the public sector.

Adam Ataar, Network Security & Operations Consultant NHS Blood and Transplant, said: “Our laptop and PC security was already strong, as we used Check Point’s Integrity 6.5 solution for firewalling, intrusion prevention and endpoint policy compliance. However, we needed to deploy full disk encryption and port protection functions to further enhance security. And with 900 laptops and 500 desktop PCs across the UK, the solution had to be easy to manage,
without adding complexity for users or the IT team.”

The solution

Following an evaluation of solutions from several vendors, NHS Blood and Transplant chose to deploy Check Point Endpoint Security. Check Point Endpoint Security is the first single agent for total endpoint security that combines the highest-rated firewall, network access control, program control, antivirus, anti-spyware, data security and remote access.

Designed to protect company laptops and PCs against malware, data loss, and other threats while enabling secure remote access to the corporate network, the solution was chosen for its ability to deliver comprehensive security in a single software agent that is easily deployed and managed from a single console.

The benefits

Check Point Endpoint Security has enabled NHS Blood and Transplant to further protect the data on its fleet of laptops, desktop PCs and USB storage devices against malware, data
loss and theft.

Check Point’s full-disk encryption feature means NHS Blood and Transplant employees don’t have to make any decisions about what data needs protecting. Adam Ataar said: “Users shouldn’t be given the responsibility for deciding what should and should not be encrypted, or to maintain security policies. These policies have to be enforced by solutions, as
transparently as possible from the user’s viewpoint. That’s exactly what the Check Point solution does.”

Endpoint Security also gives full control over data written to USB devices and removable media, as well as controlling which types of removable storage devices can be used on
the organisations network.

“We use the granular control of Endpoint Security’s port protection function. Each member of staff is given their own fully-encrypted 2GB USB drive, and use of all other removable media is blocked. This enables us to keep information flow fully traceable and secure, while enabling
users to work efficiently,” continued Ataar.

Ataar reports that both deployment and ongoing management have been seamless and easy for users and the IT team. Additionally, by reporting on the security status of each laptop and PC, Check Point Endpoint Security also allows any required upgrades or policy issues to be identified and addressed directly by administrators from the central management console.
Another key issue for NHS Blood and Transplant is to protect documents and emails that users are working on when away from the office, without compromising security or usability.

Check Point Endpoint Security is unique in that it includes both data security for preventing data loss and theft and a VPN client which provides secure remote access for employees working offsite. This delivers greater flexibility to the organisation by allowing employees to work securely online when out of the office; ensuring sensitive data
continues to be protected.

In the future, NHS Blood and Transplant plans to migrate its secure remote access to the VPN functionality in Check Point Endpoint Security, from the Citrix Access Gateway solution
it currently uses. Adam Ataar says this will further simplify
security management and deliver long-term savings.

How much do you know about tech in the public sector? Take our quiz!

Duncan Macrae

Duncan MacRae is former editor and now a contributor to TechWeekEurope. He previously edited Computer Business Review's print/digital magazines and CBR Online, as well as Arabian Computer News in the UAE.

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago