Virima V6.0 will soon be available with an all-new look, enhanced discovery, mapping and vulnerability features and more. Stay tuned!

Medical Device Management: Challenges and Opportunities

Configuration Management IT Medical Devices

Connected medical devices represent one of the largest and fastest-growing segments of the Internet of Things (IoT). Connected devices from heart monitors to fitness trackers are helping healthcare providers to improve services and patients to be more proactive and informed about their health.

But such devices present significant challenges to managers of healthcare IT. Many have limited or no built-in passwords or other cyber security features.

Many IT management tools offer only limited or challenging support for IoT device management. IT leaders and their teams face a growing number of alternatives when considering medical device management solutions, each with a unique set of features, strengths, and weaknesses.

Connected Medical Devices: The Current Reality

Green Hills Software is a leading provider of so-called “embedded systems.” These are the operating systems and development tools that run and support connected devices that are not fully-fledged computers, including medical devices.

In late 2018, the company contacted about three dozen physicians, executives and other organizations that support, or work on behalf of, healthcare providers. Those respondents were asked multiple questions about cyber security.

  • A solid 95% of the interviewees were aware that unsecured medical devices on healthcare networks can be used as beachheads to infiltrate the organization’s network and servers, allowing a cybercriminal to install malware or steal Electronic Health Records (EHR).
  • Almost all IT executives and physicians interviewed were investing substantially in protecting their internal networks. However, only larger healthcare providers had the resources and the staff to institute official policies and procedures to ensure that procured medical devices are manufactured using industry best practices for safe coding and cybersecurity.

Interviewees were also asked their opinions of guidance provided so far by the U.S. Food and Drug Administration (FDA). While 30 percent of respondents were satisfied with current FDA guidance, 55 percent were not.

Those not satisfied believe FDA guidance needs to require device manufacturers to provide detailed information to make it easier for healthcare providers to compare the levels of security and safety built into a medical device. The hope is that the requirement for a software bill of materials (SBOM) will help in this regard.

The current reality of connected medical devices is both promising and challenging. The value of such devices to patient care is undeniable. However, many if not most healthcare providers don’t have the resources or influence needed to pressure manufacturers to improve cyber security. Many simply cannot wait for more or better FDA guidance and industry compliance.

Medical Device Management: What to Do Now


Protect Your Patients 

Wherever possible, prohibit the use of connected medical devices that do not at least support changeable passwords. Encourage adoption of devices with integrated password, connection, and security management features. And educate and encourage patients to choose personal fitness monitors and other devices that can be secured.

Protect Your Data 

Connected medical devices send and receive multiple types of data. Depending on the device, data can include current and historical EHR information, information about the device itself, and information for network access. Any and all of this data represents potential value to thieves and malefactors. Your organization must ensure that data is protected, wherever it is stored, used, or accessed, throughout its lifecycle.

Protect Your Network

To provide maximum protection of your data and your connected patients, your organization needs accurate, complete, and up-to-date information about your network. This must include information about all critical IT resources, their interconnections with each other and your IT services, and all network access requests and attempts.

(See, “When patients’ lives are on the line, a guess isn’t good enough”)

Automated, comprehensive IT Discovery and updates to your Configuration Management Database (CMDB) can deliver the information you need to maximize protection of your IT estate. These features can also aid and improve compliance with business processes and regulations such as the US Health Insurance Portability and Accountability Act (HIPAA) and the European Union’s General Data Protection Regulation (GDPR).

(See, “ITSM in 2019: are you ready for GDPR?”)

Your organization must do everything possible to protect your network, your IT, and your patients from online threats. There could be much more than your business operations at stake.

Connected Medical Device Management: Virima Can Help

Virima solutions can automatically discover and map your critical IT resources and the interconnections that link them to one another, your applications and services, and your users. Virima also makes it easy to create and deploy probes for discovering and monitoring Internet of Things (IoT) devices.

Virima solutions are easy to use and configure, and designed to work well with each other. These and other features can help you and your IT management team maximize the protection of your IT estate, your data, and your patients.

Read our healthcare case study to learn how Virima helped a leading US regional healthcare system achieve consolidated,  accurate, complete, automated, repeatable discovery and mapping of its entire IT infrastructure and more than 150 services. 

(Also see our recent BrightTALK webinar, “The Business Value of Intelligent IT Automation.”)

Virima is here to help. To get started, contact us today to schedule a demo and explore the possibilities!

Subscribe to Our Newsletter

More to Explore

Table of contentsUnderstanding ServiceNow® ReportsWhy businesses need reporting and how ServiceNow® helps Data sources to create reports in ServiceNow®Creating Custom Reports in ServiceNow®Creating Custom Dashboards in ServiceNowUnderstanding Dashboard Designer interface:Best Practices for ServiceNow Reporting and Dashboards Ensuring data accuracy and relevanceOptimizing report…

Table of contentsUnderstanding ServiceNow® CMDBBenefits of using ServiceNow CMDBUnderstanding ServiceNow® ITSMCore components of ServiceNow® ITSM Integration of ServiceNow® CMDB and ITSM: Why Does It Matter? Incident Management: Faster resolution with CI informationProblem Management: Identifying root causes and affected CIsChange Management: Assessing the…

Table of contentsServiceNow CMDB API Set UpAccessing CMDB Data Using ServiceNow API CMDB Understanding the CMDB API Structure: Endpoints and CMDB TableData Extraction and Querying Using ServiceNow CMDB APIHow to Extract Data From CMDB Using REST API Querying Through ServiceNow API CMDB:…

Table of contentsServiceNow Implementation: A roadmap for successHow Virima can helpServiceNow implementation best practices: In the world of IT, various systems and tools are used to manage different aspects of service delivery, such as incident management, change management, asset management,…

ITSM (IT Service Management) processes mapping documents and visualizes ITSM processes from initial request to delivery in an organization. It helps understand how IT services are delivered and how different processes interact in that organization.  Let’s say a large organization…

Are you tired of struggling to keep track of your organization's IT assets? Do you find yourself constantly searching for information on your company's hardware and software? Look no further than ServiceNow CMDB!  Configuration Management Database (CMDB) is a robust…

Configuration Items (CIs) are the building blocks of your ServiceNow CMDB. At the most basic level, a CI is any object that the system can manage. CIs include applications, devices, users and groups, and so on.  However, ServiceNow's CMDB also…

Effective IT Service Management (ITSM) processes and tools are critical to delivering quality IT services that meet business objectives and satisfy end-users. On the other hand, inefficient, ineffective, or outdated ITSM processes and ITSM tools can lead to a range…

How IT service management (ITSM) processes work? To understand how ITSM works, let’s consider a bustling international airport with several flights across many different terminals taking off and landing. It is an elaborate task to process such an enormous amount…

Service mapping is a key tool for incident and change management. It provides many benefits to the organization, such as enabling better communication between teams and reducing time spent on resolving incidents. Service mapping is a key tool for Incident…