Not all products or features are available in all markets.

  • Change country/language

    Looks like you’re in {} — you’re on the {} site.

    Cancel

    Country and language selected

    You are being redirected to the {} site. Products and services availability vary by country. Do you wish to continue?

    Continue
    Cancel

Product Cybersecurity

Seamless and continuous protection from day one.

product-cybersecurity-banner-ba-en

Secure product development

A rigorous set of principles that guide product development, testing, and preparation.

Security controls

Embedding a mandatory set of security controls and features into new products is crucial for ensuring the safety of data.

Lifecycle management

Ongoing monitoring to keep you ahead of ever-changing threats, communicating essential information to mitigate attacks.

Protection with continuity

Receive ongoing operating system updates, software upgrades, and cybersecurity patches.

product-cybersecurity-promo-dynamic-ba-en

Bringing threats to light

The earlier we protect a device, the better we can help stop data breaches that can profoundly impact an organization’s productivity, finances, quality of care, and reputation.
29M

Medical records breached in 2020 due to cyber attacks.1

82%

Hospital tech experts reported a data breach in 2018.2

10 Day

Of downtime per attack3 to keep your medical devices safe.

$7M

To resolve the average healthcare breach costs.4

Secure product development

Design Engineering Privacy and Security (DEPS) is our thorough secure product design and development process, following a rigorous set of principles that guide us through all stages of product development, testing, and preparation for the market.

Design phase

During early development, we determine what the product or solution architecture will be based on its intended function, how it will be used, and what environment it will operate in.
design-phase-illustration-ci-en

Threat assessment

Our teams perform these tests based on initial design and operating environment using industry standard thread models, specifically tailored to the clinical environment in which a device operates.
product-cybersecurity-threat-assessment-ph-en

Security & management

Throughout the development process, control implementation is continuously monitored and controlled. This vigilant approach ensures that all measures are in place to safeguard our products.
product-cybersecurity-security-and-management-ph-en

Development stages

We perform manual review, vulnerability scans, code analysis, and internal and external penetration testing to ensure full implementation and protect our products throughout their lifecycle.
product-cybersecurity-development-stages-ph-en

Address findings

The cybersecurity team reviews assessment findings and either fully addresses them before release or, in rare cases with lower associated risks, formally accepts and documents any residual risk.
product-cybersecurity-adress-findings-ph-en

Formal documentation

Prior to release to the market, documents are created to describe any deployment-related controls for the customer to implement. A standardize han-off of residual risk is a formal part of this documentation.
illustration-pc-moniter-cyber-security-ci-en

Building strong cybersecurity

Preventing breaches begins with building strong cybersecurity controls into our imaging devices and securing every new product by design the day it arrives at your hospital—protecting your organization from the very start. Here’s how we help prevent some of the most common cybersecurity risks.
Product security portal
Controlling access
  • Preventing unauthorized access with per role user access that can be centralized and integrated with an organization’s single sign-on process
  • USB / DVD export to media can be disabled in order to keep data where it belongs
  • Security logs for investigations
  • Ability to encrypt data moving from your scanner to your PACS
  • Physically protecting hardware with locked doors and storage that cannot be removed without special tools
  • Data can be rendered unreadable and unrecoverable (for asset disposal)
product-cybersecurity-controlling-access-ph-en
Minimizing vulnerabilities
  • Limited software set to help reduce what can be attacked
  • Allowing connection only to certain devices via integrated firewall
  • Integrated antivirus protection to enable maximum security against external threats
  • Continuously evaluating and implementing new security patches with minimal impact on workflow
product-cybersecurity-minimizing-vulnerabilities-ph-en
Controlling access
  • Preventing unauthorized access with per role user access that can be centralized and integrated with an organization’s single sign-on process
  • USB / DVD export to media can be disabled in order to keep data where it belongs
  • Security logs for investigations
  • Ability to encrypt data moving from your scanner to your PACS
  • Physically protecting hardware with locked doors and storage that cannot be removed without special tools
  • Data can be rendered unreadable and unrecoverable (for asset disposal)
product-cybersecurity-controlling-access-ph-en
Minimizing vulnerabilities
  • Limited software set to help reduce what can be attacked
  • Allowing connection only to certain devices via integrated firewall
  • Integrated antivirus protection to enable maximum security against external threats
  • Continuously evaluating and implementing new security patches with minimal impact on workflow
product-cybersecurity-minimizing-vulnerabilities-ph-en
product-cybersecurity-protection-ba-en

Ongoing cybersecurity protection with Continuity

Available as a separate purchasable option through your service contract, Continuity™ delivers ongoing operating system updates, system software upgrades, and cybersecurity patches to help ensure your devices stay current throughout their lifecycle.
Get in touch

Discuss your cybersecurity challenges with a GE HealthCare expert today.

Contact us

We're ready to support you in your moments that matter.

We’re sorry, a problem occurred with the form. Please try again.
Thank you for your inquiry.

We will be in touch soon.

Something went wrong

We will check and get back.