Skip to main content

Join our upcoming webinar on May 8, discussing a hospital's role in advanced primary care.

«  View All Topics

How are security threats and vulnerabilities monitored?

August 27th, 2024 | 0 min. read

By Marathon Health

The vendor should actively monitor its environment for security threats using advanced behavioral and analytical technologies. For example, Marathon Health has engaged a service provider to provide logging and Threat Hunting and Response (TH&R) to provide visibility into our security posture. The THR provider’s security operations center (SOC) and Marathon Health actively monitor, respond, classify, remediate and mitigate vulnerabilities.

Rob Boschen
Rob Boschen, Vice President IT Operations & Security, Marathon Health