How Securing Blood & Organ Donor Data Became A Minor Operation

NHS Blood and Transplant, an integral part of the National Health Service (NHS), is an organisation, which collects, processes, stores and issues approximately 2.1 million blood donations per year from its 15 blood centres in England and North Wales.

In addition to dealing with blood donations, NHS Blood and Transplant conducts new research into improving the safety of blood and blood products, and the ways they can be used to help save lives. Storing confidential personal data as well as sensitive research data means it is imperative the organisation has a fail-safe data security solution in place.

The challenge

As an existing Check Point customer, NHS Blood and Transplant already had a robust laptop and PC security solution in place. However they needed to enhance protection for sensitive data on its PCs to comply with the latest UK Government’s directives on data security in the public sector.

Adam Ataar, Network Security & Operations Consultant NHS Blood and Transplant, said: “Our laptop and PC security was already strong, as we used Check Point’s Integrity 6.5 solution for firewalling, intrusion prevention and endpoint policy compliance. However, we needed to deploy full disk encryption and port protection functions to further enhance security. And with 900 laptops and 500 desktop PCs across the UK, the solution had to be easy to manage,
without adding complexity for users or the IT team.”

The solution

Following an evaluation of solutions from several vendors, NHS Blood and Transplant chose to deploy Check Point Endpoint Security. Check Point Endpoint Security is the first single agent for total endpoint security that combines the highest-rated firewall, network access control, program control, antivirus, anti-spyware, data security and remote access.

Designed to protect company laptops and PCs against malware, data loss, and other threats while enabling secure remote access to the corporate network, the solution was chosen for its ability to deliver comprehensive security in a single software agent that is easily deployed and managed from a single console.

The benefits

Check Point Endpoint Security has enabled NHS Blood and Transplant to further protect the data on its fleet of laptops, desktop PCs and USB storage devices against malware, data
loss and theft.

Check Point’s full-disk encryption feature means NHS Blood and Transplant employees don’t have to make any decisions about what data needs protecting. Adam Ataar said: “Users shouldn’t be given the responsibility for deciding what should and should not be encrypted, or to maintain security policies. These policies have to be enforced by solutions, as
transparently as possible from the user’s viewpoint. That’s exactly what the Check Point solution does.”

Endpoint Security also gives full control over data written to USB devices and removable media, as well as controlling which types of removable storage devices can be used on
the organisations network.

“We use the granular control of Endpoint Security’s port protection function. Each member of staff is given their own fully-encrypted 2GB USB drive, and use of all other removable media is blocked. This enables us to keep information flow fully traceable and secure, while enabling
users to work efficiently,” continued Ataar.

Ataar reports that both deployment and ongoing management have been seamless and easy for users and the IT team. Additionally, by reporting on the security status of each laptop and PC, Check Point Endpoint Security also allows any required upgrades or policy issues to be identified and addressed directly by administrators from the central management console.
Another key issue for NHS Blood and Transplant is to protect documents and emails that users are working on when away from the office, without compromising security or usability.

Check Point Endpoint Security is unique in that it includes both data security for preventing data loss and theft and a VPN client which provides secure remote access for employees working offsite. This delivers greater flexibility to the organisation by allowing employees to work securely online when out of the office; ensuring sensitive data
continues to be protected.

In the future, NHS Blood and Transplant plans to migrate its secure remote access to the VPN functionality in Check Point Endpoint Security, from the Citrix Access Gateway solution
it currently uses. Adam Ataar says this will further simplify
security management and deliver long-term savings.

How much do you know about tech in the public sector? Take our quiz!

Duncan Macrae

Duncan MacRae is former editor and now a contributor to TechWeekEurope. He previously edited Computer Business Review's print/digital magazines and CBR Online, as well as Arabian Computer News in the UAE.

Recent Posts

EU To Drop Microsoft’s OpenAI Investment Probe – Report

Microsoft to avoid an EU investigation into its $13 billion investment in OpenAI, after EC…

2 hours ago

US Provides Assurances For Julian Assange Extradition

As President Biden 'considers' request to drop Julian Assange extradition, US provides assurances to prevent…

3 hours ago

Tesla To Ask Shareholders To Reinstate Elon Musk’s $56 Billion Package

Tesla shareholders to be asked to reinstate Elon Musk's $56 billion pay package, days after…

19 hours ago

Telegram To Reach One Billion Users Within Year

Catching WhatsApp? Billionaire founder of Telegram claims encrypted platform will reach one billion users within…

19 hours ago

Judge Dismisses Some Harm Claims Against Meta, Zuckerberg

Good news for Mark Zuckerberg as judge dismisses some claims in dozens of lawsuits alleging…

21 hours ago

Google Begins Removal Of California News Ahead Of Proposed Law

Consequences of Assembly Bill 886. Google begins removing California news websites from some search results

22 hours ago