Resource Library
Case StudiesVisibilitySegmentationRiskFebruary 15, 2024

Memorial Hermann's Journey to Medical Device Security

Learn how Memorial Hermann implemented a comprehensive medical device security program to protect patient safety and operational continuity. Discover practical strategies for building device inventory, establishing zero trust architecture, and preventing threats across connected healthcare environments. Gain insights into balancing security requirements with clinical workflows in a complex hospital system.

What you'll learn

  • Build and maintain accurate medical device inventory across hospital networks
  • Implement zero trust principles to secure connected clinical and operational technology
  • Develop threat prevention strategies that protect patient safety without disrupting care
Frequently asked questions
How do hospitals gain visibility into all connected medical devices?
ORDR's approach focuses on building and maintaining accurate device inventory across hospital networks, including clinical and operational technology. This foundational visibility enables hospitals to understand what's connected, identify risks, and enforce security policies without disrupting care.
What is zero trust architecture for healthcare environments?
Zero trust in healthcare means verifying every connected device and user before granting access, rather than trusting devices inside the network perimeter. Memorial Hermann implemented this by segmenting devices, validating credentials, and monitoring behavior—protecting patient safety while enabling clinical workflows.
Can medical device security prevent threats without affecting clinical operations?
Yes—with the right strategy. ORDR helps hospitals develop threat prevention that works alongside clinical workflows by understanding device behavior, prioritizing critical systems, and implementing controls that don't interrupt patient care or staff efficiency.

This resource is published by ORDR, the connected asset security company. ORDR delivers AI-powered visibility, risk assessment, and automated protection for IoT, OT, and IoMT devices across healthcare, manufacturing, government, and financial environments. Browse all resources →