Cyber Protection | Platform Protection

We provide platform security solutions to secure each endpoint (workstations, laptops, tablets, and servers) that connects to the KP network. Consulting and solution options include malware analysis, antivirus, encryptions, file integrity monitoring, host intrusion prevention, etc.

Platform Protection Cyber Security Consulting and Support

Endpoint consultation services assist our business partners with integrating cyber protections into their application environments. Consultation is available to assist business partners with designing or troubleshooting interoperability between security and business or health care applications, meeting regulatory compliance, addressing cyber risks within business environments, modifying security related processes, and security strategy. Our cyber consultants will review your business need and discuss important design principles to fully understand and document requirements.

Getting Started

You have two ways to request this service:

Cyber Threat Detection and Prevention

Threat detection and prevention will monitor computers for suspicious activity, attempts to exploit known software vulnerabilities, hacking attacks, and computer viruses or malware.  The security software will block attacks and malware from successfully executing and report such detections to the Cyber Security Incident Response Team. This service includes consultation, troubleshooting, and incident response support for cyber security applications and features. Testing, QA certification, certification with standard builds, installation support, cyber application upgrades, and configuration of security features and protections are functions of this service.

Getting Started

  1. Create a Directed Service Request
  2. Select “Consult” from the “Select a category that best describes your request” dropdown
  3. Provide a brief description of your request in the “Describe your request” field. State your needs and provide the following information:
    • Application, server, workstation, laptop or tablet name + version information
    • Screen shots, error messages, logs, date/time the issue began
    • Are you introducing something new/changed, or is this existing production environment
    • URL
    • Performance issue or ‘blocking/stoppage’ issue
    • PCI or non-PCI environment
  4. From the “Support Group” dropdown, select “Cyber Host Threat Management”
  5. Attach additional details by clicking “Add attachments”
  6. Click “Add to Cart”

Host Firewall Security

Host firewalls run on workstations and in some cases on servers to further protect individual computers from unauthorized remote access. Host firewalls also protect computers from being infected by viruses and malware that may come from other computers on that network that have already been infected with viruses or malware.  This service includes provisioning of host firewalls to allow applications to access the network, configuring host firewall rules to stop incoming unwanted or unauthorized network traffic, and troubleshooting application and network connectivity that may be associated with host firewall function.

Getting Started

  1. Create a Directed Service Request
  2. Select “Consult” from the “Select a category that best describes your request” dropdown
  3. Provide a brief description of your request in the “Describe your request” field. State your needs and provide the following information:
    • Application, server, workstation, laptop or tablet name + version information
    • Screen shots, error messages, logs, date/time the issue began
    • Are you introducing something new/changed, or is this existing production environment
    • IP address(s), FQDN’s, ports, protocols, application/process name
    • Performance issue or ‘blocking/stoppage’ issue
    • PCI or non-PCI environment
  4. From the “Support Group” dropdown, select “Cyber Host Threat Management”
  5. Attach additional details by clicking “Add attachments”
  6. Click “Add to Cart”

Disk and Removable Media Encryption

Disk encryption performs encryption on the entire hard drive of computers, while removable media encryption applies encryption to entire thumb drives, external hard drives, writable CDs, and other portable devices that contain writable media. Platform Protection provisions workstations and laptops with this encryption software to protect data stored on these computers and attached devices. Decryption key archiving, key recovery, encryption password resets, and decryption are part of this service.

This service provides security for all data on endpoint hard drives, including user data, operating system files for maximum data protection. This provides full disk encryption of the main (system) volume of the computing platform and also includes secondary drives and external media.

Getting Started

  1. Create a Directed Service Request
  2. Select “Consult” from the “Select a category that best describes your request” dropdown
  3. Provide a brief description of your request in the “Describe your request” field. State your needs and provide the following information:
    Workstation, laptop or tablet name + OS version (Windows10, Windows7, etc.,)
    • Error messages, date/time the issue began
    • Credant, Dell, or Checkpoint encryption software?
    • TRO-approved ROI exclusion (release of information)
  4. From the “Support Group” dropdown, select “Cyber Host Threat Management”
  5. Attach additional details by clicking “Add attachments”
  6. Click “Add to Cart”

File Integrity Monitoring

File Integrity Monitoring (FIM) is a SOX and PCI regulatory requirement. FIM continuously watches for changes to important files on workstations or servers, generating alerts and logged events when changes or unauthorized access occurs. TRO will assist in setting up file integrity monitoring, selecting files to be monitored, and generating weekly or monthly compliance reports.

Getting Started

  1. Create a Directed Service Request
  2. Select “Consult” from the “Select a category that best describes your request” dropdown
  3. Provide a brief description of your request in the “Describe your request” field. State your needs and provide the following information:
    • Application, server, workstation, laptop or tablet name + version information
    • Screen shots, error messages, logs, date/time the issue began
    • Are you introducing something new/changed, or is this existing production environment
    • Performance issue or ‘blocking/stoppage’ issue
    • PCI or non-PCI environment
  4. From the “Support Group” dropdown, select “Cyber Host Threat Management”
  5. Attach additional details by clicking “Add attachments”
  6. Click “Add to Cart”

Cyber Security Risk Exception

Under certain conditions or constraints an exception to cyber security policies may be necessary. As a subtask of the TRO Risk Assessment process, Platform Protection researches and evaluates exception requests to determine its risk rating factor. Once an exception has been approved, Platform Protection will make the necessary configuration changes to cyber security settings to support the documented security exception.

Getting Started

You have three ways to request this service:

Platform Protection Audit Support

Regulatory audits, customer audits, and other compliance driven audits of security protections and controls are performed on an annual, quarterly, or as-needed basis. Platform Protection supports these audits by collecting and providing needed details about the state of cyber protections and controls on workstations and servers across the KP enterprise.

Getting Started

  1. Create a Directed Service Request
  2. Select “Consult” from the “Select a category that best describes your request” dropdown
  3. Provide a brief description of your request in the “Describe your request” field. State your needs and provide the following information:
    • Name & type of audit
    • Internal audit or external audit
    • Data collection requirements
    • Timeframe
    • Point of contact
  4. From the “Support Group” dropdown, select “Cyber Host Threat Management”
  5. Attach additional details by clicking “Add attachments”
  6. Click “Add to Cart”

Antivirus Software for Employee Personal Computers

TRO Cyber Security helps KP employees access free and subscription antivirus software on their personal computers.

Getting Started

Learn more here