Be Fast, but be Secure a New Approach to Application Security July 23, 2015
|
|
- Louise Patience Boone
- 8 years ago
- Views:
Transcription
1 Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide
2 Brought to you by Copyright 2015 Vivit Worldwide
3 Hosted by Paul Peissner Vivit DevOps SIG Leader Copyright 2015 Vivit Worldwide
4 Today s Speakers Gerben Verstraete Chief Technologist Professional Services HP Software Cindy Blake Product Marketing Manager HP Software Copyright 2015 Vivit Worldwide
5 Housekeeping This LIVE session is being recorded Recordings are available to all Vivit members Session Q&A: Please type questions in the Questions Pane Copyright 2015 Vivit Worldwide
6 Webinar Control Panel Toggle View Window between Full screen/window mode. Questions Copyright 2015 Vivit Worldwide
7 Be fast but be secure A new approach to application security Cindy Blake and Gerben Verstraete/ July 2015 #AppDefender
8 Velocity is new normal hybrid deliver the key & you better get it right 50 Percentage of Percentage businesses expect to be digital in 24 months 1 trillion applications by % apps deleted upon finding a bug 100 billion connected devices in X increase in the number of apps 81 Percentage of IT org. believe cloud provides competitive solutions for IT 25+ releases per quarter per app by % of organizations using agile 30 cost reduction for business operations by smart machines by Percentage of projects delivered business 1 value 1st time of every $5 spent on packaged software will be cloud based(2018) 84 % of breaches at the app layer 3 seconds before a user abandons an app 37 percentage of orgs that host apps externally
9 The number of apps is growing Increasing platforms and complexity many delivery models PRODUCTION LEGACY SOFTWARE OUTSOURCED COMMERCIAL OPEN SOURCE IN-HOUSE DEVELOPMENT
10 Current solutions protect the perimeter Yet, 84% of breaches occur in the application software
11 The ratio of spending between perimeter security and application security is 23-to-1. Joseph Feiman, Gartner analyst Maverick* Research: Stop Protecting Your Apps: It s Time for Apps to Protect Themselves, Sept 25, 2014
12 Challenges to overcome Lack of visibility Business damage in the form of productivity losses Infrastructure performance events are not seen in the context of security events Disparate data sources and management systems limits organizations to understand the impact of anomalies Device and device components moving in and out of the infrastructure unnoticed Inability to pin point Responding to and resolving incidents are both time consuming and costly Lack of integrated data sources and a true understanding of the business impact Limited ability to respond to new vulnerabilities\threats Comprehensive malicious code attacks Securing complex applications (legacy and modern) is challenged by business pressures Borderless consumption models of applications in the cloud and across mobile platforms Security as an afterthought, not fully embedded in the entire application lifecycle Governance and Compliance No integrated approach to keep service infrastructure compliant with releases across global infrastructure Cumbersome processes to meet audit requirements and reporting capabilities Security has build a silo within many organizations, not integrating as a partner across the lifecycle
13 Security has to be embedded in everything IT does EA PMO Testers Dev IT Value Chain Users LOB IT Ops IT Engineers Strategy to Portfolio Requirement to Deploy Request to Fulfill Detect to Correct Drive IT portfolio to business innovation Build what the business wants, when it wants it Catalog, fulfill, and manage services and track usage Anticipate and resolve service issues Plan Define Dev Build Test Deploy Release Operate 13 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
14 Traditional NOCs and SOCs will need to converge IT Security User Provisioning Identity & Access Mgmt Application Security Database Encryption Anti-Virus, Endpoint Firewall, Security See Everything Act IT Operations Performance & Availability User Management App Lifecycle Mgmt Operations Mgmt Network Mgmt See Everything Understand Context Proactive Risk reduction 14 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
15 Key focus areas Proactive Exposure Analyses Continuous discover what you have in order to protect your applications Security Asset Lifecycle Managemen t Augmented Cyber Operations Detect, Contain and Prioritize Continuous Security and IT Operations correlating events and understand business context Prevent and Respond Continuous manage compliance across complex services infrastructures and automated event remediation Security Compliance & Automated Remediation Secure Application Lifecycle Managemen t Design Secure Continuous Development and Testing with integrated security processes and technology 15 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
16 Continuous Application Security Scan it Test it Defend it HP App Defender Application Development Production / Operations
17 Application Security Testing Application Security Testing is a best practice, but remediation before production is difficult to implement = 3 weeks + to remediation Application Security talent is very difficult to find Process need to be defined so that everything is standardized and efficient Developers are not measured to think about security
18 Application Security Testing Application Security Testing is a best practice, but remediation before production is difficult to implement = 3 weeks + to remediation C+ Application Security talent is very difficult to find Process need to be defined so that everything is standardized and efficient Developers are not measured to think about security
19 Common challenges to removing software vulnerabilities You lack access to the code of critical applications Your security scan just found 100+ app vulnerabilities where to begin? Your vendor told you a patch will be ready in 3 months You have no idea what vulnerabilities you have Your app is end-of-life and you really do not want to invest the resources Developer resources are constrained
20 Maximum Days to Announce Remediation Source: HP Cyber Risk Report, 2015 We were hoping that critical vulnerabilities would be the fastest to fix. Interestingly, this was not always the case. One possible reason could be that most organizations tend to fix and verify all critical and high vulnerabilities first. Hence, the developers could be prioritizing their tasks from a single bucket based on the ease of completing the task, rather than the severity of the issue.
21 Traditional approaches rely on Web Application Firewalls (WAFs) Over the Wire works great until it s bypassed Tools are available to exploit WAF s signature based approach and more An example from BlackHat 2012 See RASP vs WAF study by the SANS Institute
22 When does it make sense to rely on RASP? As a virtual patch You lack access to the code of critical applications Your security scan just found 100+ app vulnerabilities Your vendor told you a patch will be ready in 3 months You have no idea what vulnerabilities you have Time to market pressure START For defense in depth You want contextual insight into your application s security
23 Security can be agile You can deliver software quickly and without compromise using continuous, integrated, and automated methods for overall application health. Fail forward with known security vulnerabilities - let HP Application Defender protect those vulnerabilities with compensating controls while you remediate the code.
24 Without compromising performance Rapid application development is difficult when juggling application performance and secure coding. Confidently deploy your RASP solution with granular and transparent performance metrics - let HP App Pulse show you how. Model your defense pre-production to confidently predict load and performance. Try them both for free App Pulse free trial App Defender free trial
25 Application Defender Technology Target Program Monitor <Rule> Application Server Program Point Event Event Handler Action Event Handler Chain Log
26 Application Defender Integrated with your NOC\SOC Target Program Monitor <Rule> NOC\SOC Operations (choice) Application Server Program Point Event Event Handler Event Handler Chain Operations Bridge (OMi) ArcSight ESM AppView Action Log
27 HP Security Research HP Fortify runtime technology HP Application Defender Application Security Simplified Visibility Actionable and accurate insight from within the application to pinpoint vulnerabilities for protection or remediation HP Application Defender 1,2,3 Simplicity Install quickly and easily with a three-step deployment, get protection up and running in minutes Protection Stop attacks categorically or for specific vulnerabilities.
28 Simplicity Quick Installation Up and running in less than 5 minutes 3 easy steps Easy In Service Updates Rulepack Agent Binary Accurate application protection and grouping
29 Visibility Quick access to specific vulnerability events Easy filtering of realtime and historical data Accurate presentation of event trigger and stack trace detail
30 Protection Quick protective action against attacks from within your application Easy identification of top vulnerability events by criticality Accurate results from within application logic and data flows
31 Try it today Contact your sales executive Learn more and begin your trial at hp-application-defender.com No cost. Monitor and protect one application for as long as you choose. When you are ready to purchase, this SaaS offer is priced per application instance with discounts for more applications and for longer contracts. Prices start at $149 for one app per month
32 Questions? HP-Application-Defender.com
33 HP Big Data Conference 2015 August 10-13, 2015 at Westin Waterfront Hotel in Boston, MA All members can Register Now via the unique Vivit link: Copyright 2015 Vivit Worldwide
34 Thank you Complete the short survey and opt-in for more information from HP Software. Copyright 2015 Vivit Worldwide
Managing the Challenges of Cloud Management November 7, 2013
Copyright 2013 Vivit Worldwide Managing the Challenges of Cloud Management November 7, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Mihai Grigorescu Vivit Chapter Leader South Africa
More informationHP and the Intelligent Service Desk (SPM Product Updates) March 6, 2014
Copyright 2014 Vivit Worldwide HP and the Intelligent Service Desk (SPM Product Updates) March 6, 2014 Brought to you by Copyright 2014 Vivit Worldwide Hosted by Laura Walker Vivit Director HP Service
More informationWhat s New With HP Service Manager and Universal CMDB December 18, 2014
What s New With HP Service Manager and Universal CMDB December 18, 2014 Copyright 2014 Vivit Worldwide Copyright 2014 Vivit Worldwide Brought to you by Copyright 2014 Vivit Worldwide Hosted by Laura Walker
More informationThe Future of IT Service Catalog: Beyond Request and Fulfill October 16, 2014
The Future of IT Service Catalog: Beyond Request and Fulfill October 16, 2014 Copyright 2014 Vivit Worldwide Copyright 2014 Vivit Worldwide Brought to you by Copyright 2014 Vivit Worldwide Hosted by Laura
More informationРешения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
More informationAre you ready to light up your Cloud? July 7, 2015
Are you ready to light up your Cloud? July 7, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Ali Malik Vivit Florida Chapter
More informationHow to Consolidate your App Monitoring Strategy: End-to-End User Experience Monitoring for Your BSM October 20, 2015
How to Consolidate your App Monitoring Strategy: End-to-End User Experience Monitoring for Your BSM October 20, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Hosted by Rocky Pisto
More informationBig Data Analytics: Today's Gold Rush November 20, 2013
Copyright 2013 Vivit Worldwide Big Data Analytics: Today's Gold Rush November 20, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Bernard Szymczak Vivit Leader Ohio Chapter TQA SIG Copyright
More informationAdvanced Configuration Management with HP UCMDB Configuration Manager & UCMDB Browser
March 4, 2014 Advanced Configuration Management with HP UCMDB Configuration Manager & UCMDB Browser Copyright 2014 Vivit Worldwide Brought to you by Copyright 2014 Vivit Worldwide Hosted by Mark Laird
More information應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing
More informationChanging the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
More informationWhat s New for HP Service Anywhere & Service Manager September 15, 2015
What s New for HP Service Anywhere & Service Manager September 15, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Laura Walker
More informationCaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationContinuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
???? 1 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Application Delivery is Accelerating Surge in # of releases per app
More informationHow to Automate SOX/PCI Breach Detection with UCMDB-CM June 27, 2013
How to Automate SOX/PCI Breach Detection with UCMDB-CM June 27, 2013 Copyright 2013 Vivit Worldwide Brought to you by Vivit Configuration Management System Special Interest Group (SIG) Leaders: Evan Hamilton
More informationSecurity Operation Centre 5th generation
Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to
More informationApplications Performance Management for Mobile Applications September 18, 2013
Applications Performance Management for Mobile Applications September 18, 2013 Copyright 2013 Vivit Worldwide Brought to you by Vivit Business Service Management Special Interest Group (SIG) Leaders: Jim
More informationWhat s New with HPE PPM and Agile Applications February 17, 2016. Copyright 2016 Vivit Worldwide
What s New with HPE PPM and Agile Applications February 17, 2016 Copyright 2016 Vivit Worldwide Brought to you by: Copyright 2016 Vivit Worldwide Hosted By: Stevan Zivanovic Agile SIG Leader Copyright
More informationThe Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
More informationWhat is New: HP LoadRunner 12.02, HP Performance Center 12.20, StormRunner 1.30
What is New: HP LoadRunner 12.02, HP Performance Center 12.20, StormRunner 1.30 March 26, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide
More informationSecuring your IT infrastructure with SOC/NOC collaboration
Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and
More informationHP Business Service Management 9.2 and
HP Business Service Management 9.2 and Operations Analytics Mark Pinskey Product Marketing Network Management 2011Hewlett-Packard 2013 Development.The information Company, contained L.P. herein is subject
More informationHP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise
HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationFrom the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
More informationFind the intruders using correlation and context Ofer Shezaf
Find the intruders using correlation and context Ofer Shezaf Agenda The changing threat landscape What can you do to find intruders? Best practices for timely detection and mitigation HP ArcSight 2 Find
More informationeguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life
Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows
More informationActionable insight for IT BIG Data - HP Operations Analytics August 22, 2013
Copyright 2013 Vivit Worldwide Actionable insight for IT BIG Data - HP Operations Analytics August 22, 2013 Brought to you by Vivit Business Service Management Special Interest Group (SIG) Leaders: Jim
More informationHP & Vivit Worldwide Experts Deliver Amazing Mobile Apps with Confidence Now! September 24, 2014
HP & Vivit Worldwide Experts Deliver Amazing Mobile Apps with Confidence Now! September 24, 2014 Copyright 2014 Vivit Worldwide Copyright 2014 Vivit Worldwide Brought to you by Copyright 2014 Vivit Worldwide
More informationMobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015
Mobility Exploiting and Maintaining the New Face of Engagement Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained
More informationHP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
More informationDiscover 2014 Update Big Data changes everything. Roy Ritthaler Vice President, IT Operations Management
Discover 2014 Update Big Data changes everything Roy Ritthaler Vice President, IT Operations Management 2014 By 2020 Every 60 seconds 98,000+ tweets 695,000 status updates 11million instant messages 698,445
More informationAccelerating Software Security With HP. Rob Roy Federal CTO HP Software
Accelerating Software Security With HP Rob Roy Federal CTO HP Software If we were in a cyberwar today, the United States would lose. Mike McConnell Former DNI, NSA. Head of Booz Allen Hamilton National
More informationHP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA
HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA SaaS Packaged applications Employees IT metrics/analytics Storage Public cloud Security Challenges for IT Environments are
More informationIBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
More informationFull-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationBusiness white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
More informationIntroducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
More informationIMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
More informationOn the Edge of Mobility Building a Bridge to Quality October 22, 2013
Copyright 2013 Vivit Worldwide On the Edge of Mobility Building a Bridge to Quality October 22, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Stephanie Konkoy Americas Chapter/SIG Liaison
More informationALERT LOGIC FOR HIPAA COMPLIANCE
SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare
More informationIntroduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing
Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing The cyber security landscape has become increasingly complex in recent years.
More informationDisaster Recovery - Be Ready for Anything July 14, 2015
Disaster Recovery - Be Ready for Anything July 14, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide Brought to you by Copyright 2015 Vivit Worldwide Hosted by Bernard Szymczak Ohio Chapter
More informationWorldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More informationEnd-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
More informationBecoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013
Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information
More informationHP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
More informationDevOps: Old-School IT lessons for a New-World of IT Opportunities. February 16, 2012
DevOps: Old-School IT lessons for a New-World of IT Opportunities February 16, 2012 Brought to you by Vivit DevOps Special Interest Group (SIG) Your input is welcomed on new topics! We hope you ll consider
More informationConnected Intelligence and the 21 st Century Digital Enterprise
Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,
More informationKnow your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products
Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products Threat landscape Riskier Enterprises + Advanced Attackers = More Attacks
More informationHow to Keep a Cloud Environment Current, Secure and Available October 16, 2014
How to Keep a Cloud Environment Current, Secure and Available October 16, 2014 Brought to you by Vivit Cloud Builders Special Interest Group www.vivit-worldwide.org Hosted by Sumit Sengupta Information
More informationHP Application Security Center
HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and
More informationThe Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
More informationTransform to a True Service Broker with HP Propel Shift from Reactive to Proactive April 15, 2014
Transform to a True Service Broker with HP Propel Shift from Reactive to Proactive April 15, 2014 Copyright 2014 Vivit Worldwide Copyright 2014 Vivit Worldwide Brought to you by Copyright 2014 Vivit Worldwide
More information(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back. Johannesburg
(S2.3) Security Spotlight: How cyber criminals can steal millions in seconds and how to fight back Johannesburg Bharat Mistry Security Chief Technologist HP Enterprise Security Tweet using #HPWorldZA Johannesburg
More informationThe New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe
The New Style of IT Rob McMahon Director Cloud Computing HP General Western Europe Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
More informationIs your software secure?
Is your software secure? HP Fortify Application Security VII konferencja Secure 2013 Warsaw - October 9, 2013 Gunner Winkenwerder Sales Manager Fortify CEE, Russia & CIS HP Enterprise Security +49 (172)
More informationThe Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
More informationHow To Understand The Value Of Cloud Computing For An Enterprise Company
Cloud beyond limits Lorenzo Gonzales Strategist, HP Enterprise Group EMEA Opportunities or challenges? Always growing connections Immediate responses are expected Change is part of the system Interactions
More informationWhat is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
More informationFuture Threat Landscape - How will technology evolve and what does it mean for cyber security?
James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationAM chargeback/ TCO reporting for business services
AM chargeback/ TCO reporting for business services Mike Grainge, AM Product Manager Mark Bradley, Product Marketing Manager #HPDiscover-CMS Copyright 2015 Hewlett-Packard Development Company, L.P. The
More informationPCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
More informationEnterprise Security and Risk Management
Enterprise Security and Risk Management Growth, innovation, efficiency depend on security HP protects what matters Banking Manufacturing Public Sector $9 trillion USD per day 1000+ Business processes 13
More informationAverage annual cost of security incidents
Breaches reported Annual number of data breaches Average annual cost of security incidents Among companies with revenues over $1 billion Regulatory mandates 900 800 700 600 500 400 300 200 100 0 2011 2012
More informationI D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
More informationVistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationBoosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
More informationWindows XP End-of-Life Handbook for Upgrade Latecomers
s Why Windows XP End-of-Life Handbook for Upgrade Latecomers s Why Introduction Windows XP end of life is April 8, 2014. Do you have Windows XP systems but can t upgrade to Windows 7 or Windows 8, or can
More informationThe Emergence of Security Business Intelligence: Risk
The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are
More informationCYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
More informationRuntime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing
Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing The cyber security landscape has become increasingly complex in recent years. Threats include
More informationWorldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares
Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
More informationREVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
More informationAddressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
More informationGetting Started with Web Application Security
Written by Gregory Leonard February 2016 Sponsored by Veracode 2016 SANS Institute Since as far back as 2005, 1 web applications have been attackers predominant target for the rich data that can be pulled
More informationMcAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
More informationCaretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
More informationThe Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
More informationAssuring Application Security: Deploying Code that Keeps Data Safe
Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,
More informationRE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
More informationEnterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationDynamic Security for the Hybrid Cloud
Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security
More informationRealize That Big Security Data Is Not Big Security Nor Big Intelligence
G00245789 Realize That Big Security Data Is Not Big Security Nor Big Intelligence Published: 19 April 2013 Analyst(s): Joseph Feiman Security intelligence's ultimate objective, enterprise protection, is
More informationThe Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection
The Evolution of Enterprise Application Security Why enterprises need runtime application self-protection 2 Abstract Enterprise information security encompasses a broad set of disciplines and technologies,
More informationCautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
More informationVulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
More informationBreaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
More informationApplication Security 101. A primer on Application Security best practices
Application Security 101 A primer on Application Security best practices Table of Contents Introduction...1 Defining Application Security...1 Managing Risk...2 Weighing AppSec Technology Options...3 Penetration
More informationwith Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
More informationSecuring the Database Stack
Technical Brief Securing the Database Stack How ScaleArc Benefits the Security Team Introduction Relational databases store some of the world s most valuable information, including financial transactions,
More informationPCI DSS Top 10 Reports March 2011
PCI DSS Top 10 Reports March 2011 The Payment Card Industry Data Security Standard (PCI DSS) Requirements 6, 10 and 11 can be the most costly and resource intensive to meet as they require log management,
More informationIDC & HP Webinar: Employee Adoption = Success with HP Software September 25, 2013
Copyright 2013 Vivit Worldwide IDC & HP Webinar: Employee Adoption = Success with HP Software September 25, 2013 Brought to you by 2 Copyright 2012 Hewlett-Packard Development Company, L.P. The information
More informationTHE EVOLUTION OF ENTERPRISE APPLICATION SECURITY
THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY Why enterprises need runtime application self-protection 2 ABSTRACT Enterprise information security encompasses
More information