• Change country/language

    Looks like you’re in {} — you’re on the {} site.

    Cancel

    Country and language selected

    You are being redirected to the {} site. Products and services availability vary by country. Do you wish to continue?

    Continue
    Cancel

Cybersecurity for the Carescape Monitoring Ecosystem

Advanced protection from cybersecurity threats.

carescape-monitoring-ecosystem-HeaderImage-updated-ci-en

At a glance

Host firewall

A host firewall is enabled for network connections

PHI encryption

Stored PHI is encrypted, helping protecting the privacy of patients

HTTPS only

Product configuration is managed via encrypted HTTPS only

Preserved logs

All user activity is maintained in an audit log

Protection through a multi-layered approach

To protect against cybersecurity threats, GE HealthCare’s patient monitoring products employ many security solutions, mechanisms and design philosophies to ensure total protection.
Carescape Network
Features
Defense in-depth for real-time patient monitoring
Through computer viruses, worms, Trojan horses, denial-of-service attacks, and other malware and attacks, the threats from malicious actors continue to grow for healthcare systems and real-time patient monitoring. GE HealthCare’s patient monitoring ecosystem contains multiple layers of defense to protect against threats.
carescape-monitoring-ecosystem-HeroSticky1-updated-ci-en
Carescape Network

One of the most comprehensive, real-time patient-data networks available today, the Carescape™ Network offers the ability to capture patient data in real-time and deliver integrated data across the enterprise to support informed decision-making.

  • The Carescape Network architecture is comprised of the Mission-Critical (MC) network, the Information Exchange (IX) network, and the Carescape Gateway.
  • The MC network is engineered to provide reliable performance of mission-critical information (parameters, waveforms, trends, alarms, etc.) and is protected from cyber threats by network isolation.
  • The IX network can act as a conduit for non-real-time information (processed full-disclosure data, print files, etc.) exchanged with other systems within a hospital’s IT system and is protected behind a router/firewall when connectivity to the hospital enterprise is required.
carescape-monitoring-ecosystem-HeroSticky3-updated-ci-en_
Carescape Gateway
The Carescape Gateway provides a mechanism for exchanging information between systems on the hospital’s enterprise network and devices on the MC network via the IX network. It forms a secure data bridge so data residing on either network can be shared across the two networks. At the heart of the Carescape Gateway’s defense is intelligent allowlisting that provides protection against threats, including advanced persistent threats (APTs) — by ensuring only authorized applications are allowed to execute.
carescape-monitoring-ecosystem-HeroSticky4-updated-ci-en_
Product hardening
By design, GE HealthCare’s patient monitoring products feature modern operating systems enhanced for cybersecurity, including kernel hardening and built-in security features to protect against cyber threats. Examples of this built-in security include communication port restrictions, prohibiting files to automatically run or execute, restricting file manager access and secure service interfaces.
carescape-monitoring-ecosystem-HeroSticky2-updated-ci-en
Network access controls
To add an additional layer of security, customers have the option of deploying advanced authentication to the Carescape Network. By enabling 802.1X port-based network access controls and MAC Authentication Bypass (MAB) protocols, customers can ensure only valid devices have access to the Carescape Network — protecting the privacy and security for those in your care.
cybersecurity-for-carescape-monitoring-system-network-controls-ph-en

Features

Additional examples used in many monitoring products

Minimized pathways

Only necessary application ingress and egress ports are open to the network, minimizing the attack surface

Signed software

Where available, software updates must have signed software package files before installation

Continual maintenance

Software integrity checking is continuously performed as a background task

Vulnerability management

Reported vulnerabilities are monitored and mitigated to ensure systems maintain cybersecurity protections

Have a question? We would love to hear from you.

Contact us

We're ready to support you in your moments that matter.

We’re sorry, a problem occurred with the form. Please try again.
Thank you for your inquiry.

We will be in touch soon.

Something went wrong

We will check and get back.

JB16439XX July 2021