Essay on Benefits That Mobility XE Users Have Realized via Its Deployment and Use

Published: 2021/12/15
Number of words: 1015

According to the case study, the major aim of deploying WLAN is to ensure efficiency. But, they have the opposite impact, such as dropping out of connection as users lose connections when they move change access points. In such cases, the user has to enter login credentials again and even lose data they have already inputted. The WLAN also has network interference caused by radio waves emitted from wires and microwaves (Case Study 9). The main challenge of failed deployment is poor user acceptance. When the network tools are not user-friendly or challenging to use, then users do not accept them. Mobility XE manages most of the WLAN challenges as it comes with many benefits.

One of the benefits that Mobility XE users enjoy is security which translates to a seamless user experience. Mobility XE wireless is more transparent and secure. Users only log in once a day, and the connection is maintained when they change access points when applications are connected, and there is no data loss (NetMotion, 2021). Consequently, there is time and cost-saving in terms of resources.

Need an essay assistance?
Our professional writers are here to help you.
Place an order

Mobility XE allows management control. IT managers and teams have control over remote operating devices. Both can put up policies to manage access to devices over different networks, protect devices from threats and antivirus, control access to some applications, and quarantine when there is device theft or loss.

Mobility XE users can run network applications and get remote access over any IP network to hospital’s network resources, even on less dependable and slow networks, including wireless WANs (NetMotion, 2021). Since it is transparent regarding operating systems and applications, users do not need to customize, develop or recompile connectors.

Once a user has Mobility XE installed, they are automatically logged on to the mobility server when they enter credentials as long as Windows desktop credentials match the domain credentials (NetMotion, 2021). Therefore, a user does not need to memorize a different set of credentials for an additional log-on process which provides the user transparency.

The major types of security mechanisms that must be in place to ensure hospital compliance with HIPPA requirements

One of the security mechanisms is administrative security safeguards. They ensure that the hospital has a structure where information security programs can be deployed. This includes having policies and procedures for prevention, detection, containment, and correcting security violations (Popp & Lane, 2004). Therefore, the hospital must have risk analysis, access control, workforce sanction policies, risk management, assignment security responsibility, workforce security, and information system activities reviews.

Secondly, the hospital must have physical security mechanisms. They ensure that computer systems and physical structures in which the systems are contained are protected from fire, intrusion, and natural calamities. Physical security controls physical access to electronic information systems and makes sure that only authorized persons have access. A hospital can implement this through contingency operations, access controls and validation processes, workstation use, maintenance records, and facility security plan (Popp & Lane, 2004). Physical security also includes utilizing keys, locks, and administrative policies to limit access to computer facilities and systems and backup systems for recovery and use of healthcare-related data in the case of a disaster.

Thirdly, is technical security services. These ensure data availability, integrity, and confidentiality to control, secure, and monitor information access. Technical security services cover information systems that contain electronic Protected Health Information and have items such as emergency access procedures, unique user identification, and encryption and decryption (Popp & Lane, 2004). Lastly, is technical security mechanisms meant to secure electronically transmitted Protected Health Information over open networks against interpretation and interference by non-intended recipients (Popp & Lane, 2004). The tools secure information systems from invaders who may try to get access through external communication means.

Benefits of using VLANs in hospitals and examples of how St. Luke’s could further enhance its wireless network by implementing VLANs

One of the benefits of VLANs is that it allows network administrators to manage different networks even when they are on other framework switches. Since hospitals offer human services, VLANs ensure cost reduction since a switch can be used severally and various divisions framework traffic isolated. They segment network traffic inhibiting devices from meddling with any network traffic on other VLANs, enhancing safety (Mehdizadeha et al., 2017). They also offer additional security through VLAN gadget commitment. VLANs also improve execution by dropping broadcast traffic. This means a manageable and straightforward switch structure. For instance, the VLAN truck convention conveys accessible delivery VLANs through a physical net environment.

Worry about your grades?
See how we can help you with our essay writing service.
LEARN MORE

In addition, VLANs enable the separation of private and public networks. Therefore, when one logs onto the facility WIFI, they suffer inaccessibility to internal organizational resources. This is due to segmentation of backup servers and other resources (Mehdizadeha et al., 2017). All backup-up servers are connected to the private network; hence the VLAN keeps users from accessing such data on public networks. VLAN benefits hospitals through enhanced security as it creates a virtual boundary in different departments. It also enables improved bandwidth performance by limiting traffic between nodes.

St Luke’s healthcare facility can better its wireless network by introducing VLANs. For instance, the facility’s IT administration uses wireless networking as the leading actor in their objective to promote patient satisfaction and increase clinician effectiveness. The facility can also connect moveable EKG components by significantly reducing wireless gadgets in use. The Mobility XE can also facilitate its IT division to utilize all the wireless devices used by machines. The facility should not allow all gadgets not recognized by Mobility XE, especially in network commerce, to improve the facility’s data protection.

References

CASE STUDY 9 ST. LUKE’S HEALTH CARE SYSTEM

Mehdizadeha, A., Suinggia, K., Mohammadpoorb, M., & Haruna, H. (2017, December). Virtual Local Area Network (VLAN): Segmentation and Security. The Third International Conference on Computing Technology and Information Management (ICCTIM2017) (pp. 78-89).

NetMotion. (2021). NetMotion – Uncompromised secure access. SDP, ZTNA, VPN & DEM. (2021). Retrieved 27 September 2021, from https://www.netmotionsoftware.com/

Popp, P., & Lane, B. (2004). HIPAA Security Rules and Compliance Specifications. HEARING REVIEW11, 32-35.

Cite this page

Choose cite format:
APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy
Copy
Copy
Copy
Copy
Copy
Copy
Copy
Online Chat Messenger Email
+44 800 520 0055