How a Mid-Market Healthcare Organization Stood Up Its First SSE Stack Without the Backhaul Tax
.jpg)
Most “first SSE” stories start the same way. A clinical IT team realizes the endpoint AV they’ve been leaning on for years can’t see what the workforce is actually doing on the web, and the URL filter living on the firewall stops at the edge of the building. That’s roughly where this healthcare SSE case study starts.
The customer is a mid-market healthcare organization in North America, with a clinical and administrative workforce split across hospital sites and a growing footprint of remote roles. They picked dope.security to stand up their first secure web gateway and CASB, on a greenfield deployment, without backhauling clinical traffic through anyone’s vendor cloud.
Quick read
- Industry: Healthcare
- Replaced: Greenfield (no incumbent SSE)
- Deployed: dope.SWG, CASB Neural
Where things stood
Before this project, the security stack was load-bearing on three things. Endpoint AV that nobody loved. An on-premises URL filter that everyone described as “fine, I guess.” And a HIPAA-aware policy that lived mostly in PDFs.
Clinical applications worked. Personal browsers, AI tools, and SaaS file sharing? Not really. The CISO had a short list of things that had to change. SSL inspection that didn’t break clinical apps. Visibility into what was being uploaded to OneDrive and Google Drive. A defensible answer when the auditor asked, “how do you know what your workforce is sharing externally?” None of that was going to be solved by the firewall alone.
Why a backhauled SSE was a non-starter
The first round of vendor calls went the way those calls usually go. Anchor your traffic in our data centers. Route everything through a regional PoP. Inspect there. We’ll give you a console.
For a healthcare organization with thin nurse stations, telemetry-heavy clinical applications, and a lot of remote administrative staff on home networks, that meant adding round-trip latency to traffic that was already running close to the wire. The CISO ran the numbers and called it. Not this way.
That’s where dope.security came in.
Why an on-device proxy made the math work
dope.security’s fly-direct architecture moves the proxy onto the endpoint. Web filtering, SSL inspection, and policy enforcement happen on the device. There’s no cloud PoP to route through, no backhaul, no waiting in line behind another tenant’s traffic.
For this healthcare workforce, that meant clinical apps that didn’t slow down during the cutover, and remote staff whose home internet experience didn’t suddenly feel like dial-up. The Security Architect doing the rollout could push policy from a single console and watch it land on endpoints in minutes, not maintenance windows.
CASB Neural picked up the data-at-rest side. The team scanned OneDrive and Google Drive tenants for files shared externally or set to “anyone with the link.” Inside the first few weeks, they had a list of public links nobody on the IT team had known existed. Most were old marketing assets. A handful were not.
“We were quoted nine to twelve months for a global SSE rollout from one of the bigger names. We had dope.security covering the entire endpoint footprint inside of a month, and clinical apps didn’t notice. That’s the part that closed the deal.”
— CISO, a mid-market healthcare organization
The non-technical reason
Architecture and price got dope.security on the shortlist. The 24/7 white glove global support team got it across the line.
The CISO had been burned by enterprise vendor support before. Tickets that lived for weeks. Tier-1 reps who hadn’t read the case before joining the call. With dope.security, the customer was on a first-name basis with the support team inside the first month, and policy questions that used to take a calendar item now took a chat-length reply.
What changed
Inside the first quarter, the team had web filtering and SSL inspection running across every managed endpoint, on or off the corporate network. They had a live view of every external share in OneDrive and Google Drive, with a workflow to revoke the ones that shouldn’t have been there. They had a defensible answer when the auditor asked the question. And they came in at a double-digit percentage savings against the closest enterprise SSE quote, on a multi-year basis.
The CISO’s read on the project was simple. The clinical workforce didn’t notice the cutover. The board did.
FAQ
Why pick a greenfield SSE deployment over expanding the existing firewall? Most modern web traffic is encrypted, and most workforces aren’t sitting behind the corporate firewall anymore. An endpoint-based SSE inspects encrypted traffic where the user actually is, and it doesn’t depend on the perimeter being in the path. For healthcare in particular, the auditor’s questions land on data movement, not just network egress.
How does dope.security handle SSL inspection without breaking clinical apps? The proxy runs on the endpoint, so policy can be tuned per application and per category without forcing all traffic through a single inspection pipeline. Clinical applications can be allow-listed cleanly, and the inspection scope is auditable from the dope.security console.
What’s the difference between dope.SWG and CASB Neural for a healthcare organization? dope.SWG handles data in motion, the web traffic and AI prompts leaving the endpoint. CASB Neural handles data at rest, the files already sitting in OneDrive and Google Drive that may be over-shared with external parties. Most healthcare buyers end up needing both, and dope.security ships them as one stack.
About dope.security
dope.security, the Distributed On-device Proxy Endpoint, is the preferred security vendor for security leaders across SMBs, midsize enterprises, Fortune 500 companies, and the world’s top VC and PE firms. Deployed in 83 countries, dope.security protects web, data, and AI traffic globally through its patented fly-direct architecture.


.jpg)

