{"id":6981,"date":"2017-03-15T06:00:19","date_gmt":"2017-03-15T14:00:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/15\/news-772\/"},"modified":"2017-03-15T06:00:19","modified_gmt":"2017-03-15T14:00:19","slug":"news-772","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/15\/news-772\/","title":{"rendered":"Five Questions with University of Florida Health"},"content":{"rendered":"<p><strong>Credit to Author: Justin Foster| Date: Wed, 15 Mar 2017 13:00:48 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"111\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Logo-300x111.png\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Logo-300x111.png 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Logo-380x141.png 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Logo.png 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>With the growing number of threats, technologies, and responsibilities, security teams have no shortage of challenges they face daily. Now more than ever, it is important that security providers offer tools that work with these teams instead of against them; solutions that allow for opportunities in place of constraints. This is why customers were directly included in the development process of Deep Security 10, collaborating together to create a solution that is both effective and user friendly. After all, as this next customer reminds us, <strong>\u201cit is customers that are using the products and if customers aren\u2019t happy with them, no one wins.\u201d<\/strong><\/p>\n<p>In our continuing series, we are speaking with customers who were part of the development of Trend Micro <a href=\"http:\/\/blog.trendmicro.com\/server-security-stands-test-time\/\">Deep Security 10<\/a>. Previously we looked at the experience of <a href=\"http:\/\/blog.trendmicro.com\/five-questions-xentit\/\">XentIT<\/a> and <a href=\"http:\/\/blog.trendmicro.com\/deep-security-10-customer-driven-development-trc\/\">TRC<\/a>. This week we head south all the way down to the sunshine state of Florida with <a href=\"https:\/\/www.linkedin.com\/in\/jason-noll-114a5394\">Jason Noll<\/a>, Enterprise Systems and Security Administrator at <a href=\"https:\/\/ufhealth.org\/\">University of Florida Health<\/a>.<\/p>\n<p>University of Florida Health is a comprehensive system that serves patients across northeast and north-central Florida via the University of Florida Health Science Center and UF Health Shands health care system. Jason shared his experiences in the industry and being part of the customer-driven development program.<\/p>\n<p><strong>TM: Tell us about a day in the life of your role.<\/strong><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-538643\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Photo-243x300.jpg\" alt=\"\" width=\"243\" height=\"300\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Photo-243x300.jpg 243w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Photo-768x948.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Photo-830x1024.jpg 830w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Photo-640x790.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Photo-900x1111.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Photo-440x543.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Photo-380x469.jpg 380w\" sizes=\"auto, (max-width: 243px) 100vw, 243px\" \/><\/p>\n<p>JN: Every day is different, but generally a day in the life of my role includes managing the majority of endpoint security systems, validating their health, determining if there is anything that needs to be addressed, working with stakeholders and planning upcoming technology implementation.<\/p>\n<p><strong>TM: What are the top security challenges facing you in the healthcare and information security industry today?<\/strong><\/p>\n<p>JN: I think the top security challenges facing the healthcare industry today are how vast the threat landscape has become and how quickly the targeting of healthcare organizations has increased. It seems as if we\u2019re in a constant arms race with threat actors on who can produce the best offensive tools, versus who can implement the best defensive tools. On the defensive front, security professionals are challenged to decide, \u201cwhat technologies should I implement and from what vendors? How hard are they to learn and use? How do the tools fit in with the rest of my defenses? How will they impact my environment?\u201d I\u2019m excited about Deep Security 10 because it helps to address these questions and concerns. It\u2019s a robust and modular security solution, now with features like application control, threat sandboxing and enhanced anti-ransomware, all of which give security professionals and organizations a very powerful toolset for defense.<\/p>\n<p><strong>TM: You were part of the Deep Security 10 development process. Can you tell us about your experience working with the product team and shaping Deep Security 10?<\/strong><\/p>\n<p>JN: My experience working with the Deep Security team and going through the preview process was the most enjoyable collaborative experience I\u2019ve ever had with any vendor, and I\u2019ve worked with many vendors for many years. It\u2019s the first opportunity I\u2019ve had to work with the people who make the product, have conversations about the direction they are heading, and make suggestions they may not have considered. I really enjoyed working with the user experience team, product managers, and developers. I was able to both give and receive feedback on how an administrator like myself could get the most benefit from a product like Deep Security 10. I wish there were more vendors that would be as customer focused as the Deep Security 10 team has been in seeking that information out. After all, it is customers that are using the products and if customers aren\u2019t happy with them, no one wins.<\/p>\n<p><strong>TM: What does Trend Micro mean to you?<\/strong><\/p>\n<p>JN: I personally see Trend Micro as a security vendor family. I\u2019ve had a long relationship with Trend Micro now, going on seven years. Our university and healthcare system has had a relationship going on 17+ years now. What really sets Trend Micro apart from other vendors that I\u2019ve worked with are the relationships and people that work there. It\u2019s invaluable how well we work together to solve the tough problems, not just with the products, but also with security as a whole and how those solutions apply to our organization.<\/p>\n<p><strong>TM: What is your advice for security professionals in your industry?<\/strong><\/p>\n<p>JN: Never stop learning. Always take time to invest in learning anything and everything you can about security and the security profession. Whether it be books, conferences, blogs or social media, never stop the pursuit of expanding your security knowledge. Of all the professions out there, I would say security changes the fastest and it\u2019s very important to keep up with what\u2019s happening around us. From there, you can begin to apply that information to your organization or whatever it is you\u2019re trying to protect.<\/p>\n<p>Learn more about Deep Security 10 from\u00a0<a href=\"http:\/\/www.trendmicro.com\/hybridcloud\">www.trendmicro.com\/hybridcloud<\/a><\/p>\n<p>If you have questions or comments, please post them below or follow me on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/justin_foster\">@justin_foster<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/five-questions-university-florida-health\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Justin Foster| Date: Wed, 15 Mar 2017 13:00:48 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"111\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Logo-300x111.png\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Logo-300x111.png 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Logo-380x141.png 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/UF_Logo.png 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>With the growing number of threats, technologies, and responsibilities, security teams have no shortage of challenges they face daily. Now more than ever, it is important that security providers offer tools that work with these teams instead of against them; solutions that allow for opportunities in place of constraints. This is why customers were directly&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,714],"class_list":["post-6981","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6981"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6981\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6981"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}