Enterprise Security Products Training Plan Guide

Size: px
Start display at page:

Download "Enterprise Security Products Training Plan Guide"

Transcription

1 - Enterprise Security Products Training Plan Guide

2 Copyright 2016 Hewlett Packard Enterprise. All rights reserved. Published by Hewlett Packard Enterprise Hewlett Packard Enterprise. The information contained herein is subject to change without notice. The only warranties for HPE products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or omissions contained herein. Trademark acknowledgements if needed. First printing, January 2015 Last Updated: June 16, 2016

3 Contents 1 Enterprise Security Products A Proactive Approach to Information Security The Enterprise Security Landscape The Best Defense Is a Good Offense Security Products Security Services Security Research ExpertOne Certifications for HPE Software Industry Recognized Certifications Latest Course Information Hewlett Packard Enterprise Software Education Control Protecting your Investment Time to Market Return on Investment Getting Ahead of the Game Training Delivery Options Instructor Led Training (ILT) Virtual Instructor Led Training (VILT) elearning Self-Study Customized Training

4 4 Our Instructors Make It Interesting Make It Relevant ESP Learning Solutions Hewlett Packard Enterprise ArcSight Benefits Hewlett Packard Enterprise ArcSight Learning Solutions Hewlett Packard Enterprise ArcSight Learning Path HPE ArcSight Certification Path Hewlett Packard Enterprise ArcSight ESM Courses HPE ArcSight Security Solutions ATP HPE ArcSight ESM 6.5 Administrator and Analyst ATP HPE ArcSight ESM 6.5 Advanced Analyst ASE HPE ArcSight ESM 6.5 Advanced Administrator ASE Building Security Use Cases with HPE ArcSight ESM Creating Advanced ESM Content for Security Use Cases HPE ArcSight ESM Operations Introduction to HPE ArcSight Event Management HPE ArcSight Logger Courses HPE ArcSight Logger+ 6.0 Administration and Operations ASE HPE ArcSight Logger Administration and Operations HPE ArcSight Logger Search and Reporting HPE ArcSight Connectors and Connector Appliance Courses HPE ArcSight SmartConnector Foundations and Tool Kits HPE ArcSight FlexConnector Configuration HPE ArcSight Connector Appliance Administration and Operations HPE ArcSight Express Courses HPE ArcSight Express 4.0, CORR-Engine Administration and Operations HPE ArcSight Management Center Course HPE ArcSight Management Center Administration and Operations HPE ArcSight Courses - Complete HPE ArcSight Solution HPE ArcSight MASE Preparation Course HPE Fortify HPE Fortify Introduction HP Forify Benefits HPE Fortify Learning Solutions HPE Fortify Certification Path HPE Fortify Security Solutions ATP Dynamic Application Testing with HPE WebInspect Using and Administering HPE WebInspect Enterprise Developing with HPE Fortify Application Security HPE Fortify Software Security Center/Static Code Analyzer Working with HPE Fortify SCA, Audit Work Bench, and SSC Fortify for Developers Using Plugins

5 PCI Essentials Advanced Software Security Testing - Tools and Techniques Information Security and Privacy Awareness Introduction to Secure Coding in Java Introduction to Secure Coding in.net Introduction to Secure Coding in C/C Introduction to Secure Coding in PHP Introduction to Security Testing Principles C/C++ Developer Curriculum NET Developer Curriculum Java Developer Curriculum Mobile Developer Curriculum PHP Developer Curriculum Architect Curriculum Manager Curriculum HPE Atalla HPE Atalla Introduction HPE Atalla Benefits HPE Atalla Learning Solutions HPE Enterprise Secure Key Manager (ESKM) Training HPE Atalla Network Security Processor (NSP) Training HPE SecureData (Voltage) HPE SecureData (Voltage) Introduction HPE SecureData Voltage Benefits HPE SecureData Voltage Learning Solutions Introduction to HPE SecureData HPE Voltage SecureData Solutions Training Contact Us Index

6 Trained users require 6x less support than untrained users.

7 1. Enterprise Security Products From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. Hewlett Packard Enterprise Enterprise Security Products (ESP) is our answer to these threats and attacks. 1.1 A Proactive Approach to Information Security Hewlett Packard Enterprise ESP products and services help organizations meet the security demands of a rapidly changing and more dangerous world. ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis, and network-level defense mechanisms unifying the components of a complete security program and reducing risk across your enterprise. 1.2 The Enterprise Security Landscape Hewlett Packard Enterprise is changing the enterprise security landscape with advanced security solutions that uniquely leverage leading threat research and powerful correlation of security events and vulnerabilities to deliver security intelligence spanning IT operations, applications, and infrastructure. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 7 of 59

8 8 Chapter 1: Enterprise Security Products Hewlett Packard Enterprise s comprehensive approach has you covered: we disrupt your adversaries, manage your risk, and extend your capabilities. This strengthens your security posture to minimize incidence impact and control costs while expanding insight for better decisions. 1.3 The Best Defense Is a Good Offense When today s IT is faced with sophisticated threats, it s essential to have the right security solutions to protect your business. With an army of experts and arsenal of products, we work proactively across technologies to keep your data safe. Hewlett Packard Enterprise draws on decades of security experience to take the fight to adversaries before they attack. We can help you predict and disrupt threats, manage risk and compliance, and extend your own security team. 1.4 Security Products Take a proactive approach to security that integrates security information and event management (SIEM), application analysis, and network-level defense. 1.5 Security Services Implement a strategy to mitigate risk and avoid costly penalties for non-compliance. Hewlett Packard Enterprise can detect intrusions within 12 minutes of arrival and resolve 92% of major incidents within 2 hours of identification. And we provide tools, teams, and processes to comply with PCI, SOX, HIPAA, and EU Data. 1.6 Security Research Hewlett Packard Enterprise conducts innovative research and provides industry-leading protection against the latest threats. Security research publications and regular threat briefings include regular updates on the latest threats, Zero-Day initiatives, and application vulnerabilities. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 8 of 59

9 1.7 ExpertOne Certifications for HPE Software ExpertOne Certifications for HPE Software HPE ExpertOne certification puts you on the path to career enhancement and greater success in your chosen profession. Take advantage of a full suite of progressive benefits while increasing your knowledge, effectiveness and marketability. Register now to become an ExpertOne community member. Take your first step toward getting the benefits of HPE ExpertOne! You will gain access to technology tools such as whitepapers, videos, and social media events, and receive your HPE Learner ID. Jump on the path to realizing the many benefits of membership in the ExpertOne community. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 9 of 59

10 10 Chapter 1: Enterprise Security Products Industry Recognized Certifications HPE Certifications on the map in 2014 CIO Magazine 18 Hot IT Certifications for 2014 tom sit PRO Best Big Data Certifications for 2014 tom sit PRO Best Enterprise Architect Certifications for 2014 tom sit PRO 40+ Most Popular Networking Credentials TechTarget Top Cloud Computing Certifications to consider Brandon Hall 2014 Silver Best in Certification Award Winner 1.8 Latest Course Information For the latest course information, please refer to the details presented on the HPE Software Education Learning Management System. Please click the link below to be directed to this site: HPE Software Education Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 10 of 59

11 2. Hewlett Packard Enterprise Software Education The mission of the HPE Software Education organization is to deliver the best possible Enterprise Security Products learning experience. With a global team of experienced trainers, and subject matter experts, our business offers you well-designed training courses across the entire range of Information Management solutions. We educate you, support you, and put you in control of your investment to ensure real-world success. 2.1 Control Enterprise Software drives your business forward by automating processes and increasing efficiencies. Your cutting-edge investment requires end users who know how to get the most out of the technology. Meanwhile, your technical staff must learn how to configure, optimize, maintain, and administer the technology. Training addresses the needs of both of these users, giving them the knowledge to take control. 2.2 Protecting your Investment It s one thing to buy a plane, but quite another to fly it! You ve made the right decision to invest in HPE Software technologies. Now is the time to invest in your team, to train them on the solution and equip Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 11 of 59

12 12 Chapter 2: Hewlett Packard Enterprise Software Education them with the knowledge to get the best out of the technology. Learning from the professionals ensures that you are protecting that investment. As a result, your team will navigate and fly in the right direction. 2.3 Time to Market Enabling your team means your project will run more smoothly and efficiently and reach completion in shorter time frames. Our education services reinforce formal classroom instruction with extensive hands-on practical experience. The majority of the classes are in a workshop environment that challenges the trainee, aids them during the learning process, and accelerates the knowledge transfer. The earlier your team gains expertise, the more successful your project will be. Analyst reports suggest that 75% of managers believe effective training will increases the chances of a project meeting its deadlines. Furthermore, 80% of IT managers believe effective training is critical to the success of a project. 2.4 Return on Investment Cost is always a key consideration; education offers a way to lower the total cost of ownership. Our education courses present your team members with best practices in design, deployment, and administration of your HPE Software solutions. This translates into decreased technical support costs, lower ongoing administrative overhead, and the ability to work more effectively with our Consulting Services. Effective learning also leads to lower hardware costs with better-configured systems, decreased network load, and increased return on investment for integrated third-party applications. Thus, our training results in a return on multiple levels. 2.5 Getting Ahead of the Game The learning curve never stops, so if you want to lead the market with cutting-edge, world-class solutions you need to give your team the training they need to keep you competitive. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 12 of 59

13 3. Training Delivery Options Hewlett Packard Enterprise Software Education wants your Enterprise Security Products training delivered in the environment best suited to your needs. 3.1 Instructor Led Training (ILT) HPE Software Education operates instructor-led training sessions in facilities around the globe. Each course is designed to provide students with hands-on experience and is lab-based to keep learning practical. The class experience offers students the opportunity to personally interact with one of our certified instructors who has extensive experience and industry knowledge. We have a range of courses designed to accommodate both beginner and advanced students. To ensure that adequate attention is provided to each student attending an instructor-led class, HPE Software Education maintains class sizes between six to twelve participants. HPE Software Education also provides Instructor-Led on-site training and this is most convenient when your team members are located in the same region. As long as the host provides adequate on-site training facilities, HPE Software Education will send one of our instructors to your chosen site to conduct the training. We then deliver standard or customized training that addresses your unique business needs. Please note that the maximum class size for on-site training is limited to 12 students to ensure that adequate individual attention is provided. The benefits of on-site training are identical to VILT training with the added benefit of receiving face-to-face training in your domain. 3.2 Virtual Instructor Led Training (VILT) Virtual Instructor Led Training (VILT) classes are a good alternative to sending your staff to a public training course. This option reduces travel and expense costs in the event your staff are geographically Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 13 of 59

14 14 Chapter 3: Training Delivery Options dispersed. Furthermore, VILT saves valuable time by permitting the student to stay in the office during the training sessions. VILT are live, instructor-led sessions. Students connect to the virtual classroom using their own computer, telephone, or Internet connection. VILT instructors facilitate live sessions for participants around the globe. 3.3 elearning HPE elearning is interactive Web-based training that gets teams up to speed fast and is available ondemand 24x7. With hands-on exercises and easy-to-follow instructions, HPE elearning emphasizes key learning points and can support your team either as stand-alone learning or as a supplement to traditional training programs. HPE Software Education also offers a tailored elearning service to meet your business requirements. 3.4 Self-Study Our new self-study courses make learning easier and more enjoyable than ever. This offering allows participants to learn about a product by reading the course manual and then practice what they have learned by stepping through detailed hands-on exercises using a dedicated remote lab environment. This means participants do not need to lose valuable working hours traveling to a training location, and they have the flexibility to learn during business hours, or during evenings and weekends. 3.5 Customized Training From a detailed Training Needs Analysis through to building custom training courses, HPE Software Education can address your unique business needs. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 14 of 59

15 4. Our Instructors The Enterprise Security Products learning experience we deliver is the most important aspect of our service. For this reason HPE provides the highest quality of trainers in the industry. Our instructors are dedicated full-time professionals, highly trained as subject matter experts in their field. 4.1 Make It Interesting Our instructors deliver training with enthusiasm and are respectful of students and their needs at all times. It is through this process and our structured learning development philosophy that our classes are greatly valued and appreciated by participants. 4.2 Make It Relevant The key to effective and enjoyable training is to deliver material in a structured and well-organized manner, with clear learning objectives and multiple methods of assessment to measure and improve student progress. With many years of teaching experience, our instructors deliver engaging training courses, ensuring that all students enjoy achieving their set learning objectives. HPE Software Education courses are delivered through a holistic approach, combining theory and practical lessons to suit individual learning styles and provide engaging hands-on training. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 15 of 59

16 Training is an investment in your organization and in your people.

17 5. ESP Learning Solutions Hewlett Packard Enterprise Software Education offers a wide variety of ESP training courses, from basic to advanced, from business- and end-user to technical administrator and developer to enhance your knowledge of the various ESP platforms. 5.1 Hewlett Packard Enterprise ArcSight Hewlett Packard Enterprise ArcSight Introduction With ever-expanding network environments, business assets, commerce, processes, and communication are readily accessible from various locations. Critical data transactions cross multiple network boundaries, making business operations faster, cheaper, quicker, and more responsive. Though these interconnected network transactions make for good business it also puts a business environment at risk, due to security vulnerabilities. To manage these business risks you need to understand what is going on within your organization. To understand your business you must connect the dots and this means: Collecting information from across your enterprise The key to getting the big picture is to collect event data from all data sources, including firewalls, routers, servers, desktops, application servers, and so on. Analyzing information Analysis of information to obtain a clear view of your security standpoint Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 17 of 59

18 18 Chapter 5: ESP Learning Solutions Taking preventive action Proactive preventative action to secure sensitive data and avoid a potential problems in the future Hewlett Packard Enterprise ArcSight solutions help customers identify and prioritize security threats, organize and track incident response activities, and simplify audit and compliance activities Benefits The Hewlett Packard Enterprise ArcSight approach helps safeguard business data by giving users complete visibility into activity across the IT infrastructure through use of the following solutions: Hewlett Packard Enterprise ArcSight Logger Unify collection, storage, log analysis, and machine data from any device, vendor, and source. Builtin rules and reports enable monitoring, alerting, and forensic investigation of security events. Hewlett Packard Enterprise ArcSight Enterprise Security Management (ESM) Using enterprise security management software, combines event correlation and security analytics to identify and prioritize threats in real time and remediate incidents early. Hewlett Packard Enterprise ArcSight Application View Increase application visibility and security intelligence. Hewlett Packard Enterprise ArcSight Management Center (ArcMC) Centrally manage your Hewlett Packard Enterprise ArcSight deployments through a unified interface. 5.2 Hewlett Packard Enterprise ArcSight Learning Solutions Learn from a full assortment of role-based, product-oriented courses with delivery options designed to support the most demanding security needs. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 18 of 59

19 5.1 Hewlett Packard Enterprise ArcSight Hewlett Packard Enterprise ArcSight Learning Path HPE ArcSight learning solutions prepare you for fast implementation and efficient operation. Learn from a full assortment of role-based, product-oriented courses. HPE ArcSight ESM Courses Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 19 of 59

20 20 Chapter 5: ESP Learning Solutions HPE ArcSight Connectors and Connector Appliance Courses HPE ArcSight Logger Courses HPE ArcSight Express Courses Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 20 of 59

21 5.4 HPE ArcSight Certification Path HPE ArcSight Certification Path The recommended HPE ArcSight certification path is to begin with one of our HPE ArcSight ATP offerings. To move on to the ASE certification, you must pass the HPE ArcSight ESM Security Administrator and Analyst exam. To achieve HPE ArcSight ASE certification you must pass the the HP Logger Administration and Operations exam and either the HPE ArcSight ESM Advanced Administrator exam OR the HPE ArcSight ESM Advanced Analyst exam. Professionals who want to show mastery of all HPE ArcSight solutions can continue on with the Master ASE (MASE) certification. This is a three-day, handson exam. To successfully pass this exam, we recommend at least three years of experience with the solutions as well as a host of HPE ArcSight courses. NOTE: There is a 5-day course entitled HPE ArcSight MASE Preparation course, which prepares you for this exam. ATP ASE Master ASE HPE ArcSight Security Solutions HPE ArcSight Logger Admin & Operations HPE ArcSight ESM Advanced Analyst HPE ArcSight Master ASE HPE ArcSight ESM Admin & Analyst HPE ArcSight ESM Advanced Admin Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 21 of 59

22 22 Chapter 5: ESP Learning Solutions 5.5 Hewlett Packard Enterprise ArcSight ESM Courses HPE ArcSight Security Solutions ATP HPE ArcSight Security Solutions ATP provides an introduction to the common security problems addressed by Hewlett Packard Enterprise ArcSight s products. Each module provides a high-level overview of each Hewlett Packard Enterprise ArcSight product and describes how it solves the security risks experienced by digitally connected organizations. HPE ArcSight Security Solutions ATP provides an introduction to the common security problems addressed by Hewlett Packard Enterprise ArcSight s products. Each module provides a high-level overview of each Hewlett Packard Enterprise ArcSight product and describes how it solves the security risks experienced by digitally connected organizations. Operators, Analysts, Administrators Gathering business requirements for the Hewlett Packard Enterprise ArcSight solution; Designing a simple security solution using Hewlett Packard Enterprise ArcSight products ILT, VILT, Onsite None Two days Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 22 of 59

23 5.5 Hewlett Packard Enterprise ArcSight ESM Courses HPE ArcSight ESM 6.5 Administrator and Analyst ATP HPE ArcSight ESM 6.5 Administrator and Analyst training details the Enterprise Security Manager (ESM) product facilities while performing related tasks on a live HPE ArcSight ESM. You use the Hewlett Packard Enterprise ArcSight Console, Hewlett Packard Enterprise ArcSight Command Center, and Hewlett Packard Enterprise ArcSight Web user interfaces to monitor security events, configure ESM, and manage users and ESM network intelligence resources. Using Hewlett Packard Enterprise ArcSight ESM workflow, you isolate, document, escalate, and resolve security incidents. This course enables tailoring standard Hewlett Packard Enterprise ArcSight ESM content to acquire, search, and correlate actionable event data, and perform remedial activities such as incident analysis, stakeholder notification, and reporting security conditions within your network environment. Managers, Sales, Executive users Install ESM; Create user accounts and implement built-in solutions content; Implement Network and Asset Modeling facilities; Investigate, identify, analyze, and remediate security issues; Use workflow management; Modify and run standard reports; Establish ESM peering ILT, VILT, Onsite, elearning None Four days Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 23 of 59

24 24 Chapter 5: ESP Learning Solutions HPE ArcSight ESM 6.5 Advanced Analyst ASE HPE ArcSight ESM 6.5 Advanced Analyst provides you with the knowledge required to use advanced Hewlett Packard Enterprise ArcSight ESM content to find and correlate event information, perform actions such as notifying stakeholders, analyzing event data graphically, and reporting on security incidents within your security environment. You will familiarize and/or reinforce your understanding of the advanced correlation capabilities within Hewlett Packard Enterprise ArcSight ESM that provide a significant edge in detecting active attacks. This course covers the Hewlett Packard Enterprise ArcSight security problem solving methodology using advanced Hewlett Packard Enterprise ArcSight ESM content to find, track, and remediate security incidents. During the training, you learn to use variables and correlation activities, customize report templates for dynamic content, and customize notification templates to send the appropriate notification based upon specific attributes of an event. Analysts, Senior Analysts Correlate, investigate, analyze, and remediate both exposed and obscure threats; Construct HPE ArcSight variables to provide advanced analysis of the event stream; Develop Hewlett Packard Enterprise ArcSight lists and rules to allow advanced correlation activities; Optimize event-based data monitors to provide real-time viewing of event traffic and anomalies; Design new report templates and create functional reports, Find events through the search tools ILT, VILT, Onsite None required; Recommended: ESM 6.5 Admin and Analyst ILT: Five days VILT: Four days Note: The VILT version of the course does not include the certification exam. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 24 of 59

25 5.5 Hewlett Packard Enterprise ArcSight ESM Courses HPE ArcSight ESM 6.5 Advanced Administrator ASE HPE ArcSight ESM 6.5 Advanced Administrator provides you with techniques to proactively analyze and troubleshoot the ESM CORR-Engine database and Hewlett Packard Enterprise ArcSight ESM Manager to provide efficient services to your organization. This course teaches you to design and deploy hierarchical, fault tolerant manager implementations as well integration strategies between Hewlett Packard Enterprise ArcSight ESM and other Hewlett Packard Enterprise ArcSight appliances such as Logger, Connector Appliance, and the Hewlett Packard Enterprise ArcSight Management Center products. Administrators Design, deploy, and configure an Hewlett Packard Enterprise ArcSight ESM multi-manager layout; Assess and implement integration strategies; Provide credentials for Hewlett Packard Enterprise ArcSight ESM, including RADIUS and LDAP/AD; Use available Hewlett Packard Enterprise ArcSight tools; Implement Hewlett Packard Enterprise ArcSight best practices for backup and recovery ILT, Onsite None required; Recommended: ESM 6.5 Admin and Analyst ILT: Five days VILT: Four days Note: The VILT version of the course does not include the certification exam. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 25 of 59

26 26 Chapter 5: ESP Learning Solutions Building Security Use Cases with HPE ArcSight ESM Building Security Use Cases with HPE ArcSight ESM provides you with detailed knowledge of the Hewlett Packard Enterprise ArcSight security problem solving methodology within the ESM context. In this course, you learn the methodologies to develop use cases for current business scenarios derived from the top business drivers in the market. Senior Analysts Define use cases; Generate requirement statements and prioritize objectives; Identify data sources and ESM resources; Create identified ESM content; Construct Hewlett Packard Enterprise ArcSight Active Channels; Develop Hewlett Packard Enterprise ArcSight rules; Build event-based data monitors; Package formulated ESM content ILT, Onsite None Three days Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 26 of 59

27 5.5 Hewlett Packard Enterprise ArcSight ESM Courses Creating Advanced ESM Content for Security Use Cases Creating Advanced ESM Content for Security Use Cases covers Hewlett Packard Enterprise ArcSight security problem solving methodology within the ESM context. In this course, you learn advanced techniques to use Hewlett Packard Enterprise ArcSight ESM content to find, track, and remediate security incidents specifically identified in the course use cases. This advanced course is intended for those whose primary responsibilities include defining the organization s security objectives and building Hewlett Packard Enterprise ArcSight ESM content to adhere to those objectives. Define use cases; Generate requirement statements and prioritize objectives; Identify data sources and ESM resources; Create identified ESM content; Construct Hewlett Packard Enterprise ArcSight active channels; Develop Hewlett Packard Enterprise ArcSight rules; Provide real time viewing of event traffic and anomalies; Implement custom velocity macros for notification; Package formulated ESM contents for the use case into an Hewlett Packard Enterprise ArcSight resource bundle ILT, VILT, Onsite None Five days HPE ArcSight ESM Operations HPE ArcSight ESM Operations provides you with comprehensive training on ESM operations. This course offers exercises for common functionality and procedures needed to quickly retrain or cross train a broader group of ESM operators. The modular format of this course enables you to select the topics and lessons applicable to your job tasks and allows you to return to lessons to refresh what you have previously learned. Operators Computer desktop, browser, and file system navigation skills; Basic understanding of TCP/IP networking and database concepts; Enterprise security experience elearning None Estimated ten hours Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 27 of 59

28 28 Chapter 5: ESP Learning Solutions Introduction to HPE ArcSight Event Management Introduction to HPE ArcSight Event Management provides you with the fundamental concepts of an Hewlett Packard Enterprise ArcSight ESM implementation. Understanding these basic concepts is critical for anyone who wants to administer an Hewlett Packard Enterprise ArcSight ESM implementation or perform analysis on security data within Hewlett Packard Enterprise ArcSight ESM. This course is also a prerequisite for additional Hewlett Packard Enterprise ArcSight ESM training. Operators Computer desktop, browser, and file system navigation skills; Basic understanding of TCP/IP networking and database concepts; Enterprise security experience elearning None Estimated three hours 5.6 HPE ArcSight Logger Courses HPE ArcSight Logger+ 6.0 Administration and Operations ASE HPE ArcSight Logger+ 6.0 Administration and Operations provides you the essentials of the Hewlett Packard Enterprise ArcSight Logger solution, both hardware and software, as well as giving you information about how to architect a complete solution. This five-day ILT course covers the core features of the Hewlett Packard Enterprise ArcSight Logger solution as well as more advanced features. Business users, Administrators Common network device functions, such as routers, switches, and hubs; TCP/IP functions, such as CIDR blocks, subnets, addressing, communications; Windows operating system tasks, such as installations, services, sharing, and navigation ILT, VILT None ILT: Five days VILT: Four days Note: The VILT version of the course does not include the certification exam. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 28 of 59

29 5.6 HPE ArcSight Logger Courses HPE ArcSight Logger Administration and Operations HPE ArcSight Logger Administration and Operations provides you with comprehensive training to quickly configure your Logger Appliance or downloadable Software Logger and bring it into an operational state. Learning content is specifically intended for team members of security operations, network operations, auditing, and compliance. Business users, Administrators Computer desktop, browser, and file system navigation skills; Enterprise security experience elearning None Three hours, online, self-paced elearning HPE ArcSight Logger Search and Reporting HPE ArcSight Logger Search and Reporting elearning provides you with task-focused training to quickly configure and use your Logger s event search and reporting capabilities. Learning content is specifically intended for team members of security operations, network operations, auditing, and compliance. Note: This course is a subset of the HPE ArcSight Logger Administration and Operations elearning course. If you have purchased or plan to purchase the HPE ArcSight Logger Administration and Operations elearning course, do not purchase this course. This is a base-level course that provides you with specific end-user event search and reporting topics intended for team members of security operations, network operations, as well as personnel responsible for auditing and compliance. Computer desktop, browser, and file system navigation skills; Basic understanding of TCP/IP networking and database concepts; Enterprise security experience elearning None Seven hours, online, self-paced elearning Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 29 of 59

30 30 Chapter 5: ESP Learning Solutions 5.7 HPE ArcSight Connectors and Connector Appliance Courses HPE ArcSight SmartConnector Foundations and Tool Kits HPE ArcSight SmartConnector Foundations provides you with detailed knowledge to install and configure Hewlett Packard Enterprise ArcSight SmartConnectors. Included in the course are detailed walk-throughs for 11 of our most popular Smart and Flex connectors. Administrators Install and configure SmartConnector software; Configure, enable, disable, alter, and remove SmartConnector settings elearning None Estimated eight hours, online, self-paced elearning HPE ArcSight FlexConnector Configuration HPE ArcSight FlexConnector Configuration training provides you with an overview of the Hewlett Packard Enterprise ArcSight SmartConnectors framework and explains the Hewlett Packard Enterprise ArcSight ESM Schema. It teaches you how to construct and manipulate FlexConnector configuration and property files and use various parsing methods including fixed delimited, regular expressions, and database query. Examples from standard connectors are used to illustrate devicespecific methodologies. Advanced configuration options such as multi-line Regex, parser linking, and conditional mapping are also covered. Administrators Install Hewlett Packard Enterprise ArcSight Connector software; Configure a functional FlexConnector and test with an ESM Active Channel; Create fixed delimited configuration files; Create common and sub-message parsing and token-to-event mapping; Create a tailored categorization file; Navigate the connector configuration file hierarchy VILT None Three days Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 30 of 59

31 5.8 HPE ArcSight Express Courses HPE ArcSight Connector Appliance Administration and Operations HPE ArcSight Connector Appliance Administration and Operations provides you with the knowledge to administer, configure, and effectively manage an Hewlett Packard Enterprise ArcSight Connector Appliance. Administrators Install and configure the Connector Appliance; List the components that make up a Connector Appliance and describe how they interoperate; Mount remote file systems with a Connector Appliance; Configure a SmartConnector on the Connecter Appliance; Upgrade, back up, and restore SmartConnectors and the Connector Appliance ILT and VILT, None Two days 5.8 HPE ArcSight Express Courses HPE ArcSight Express 4.0, CORR-Engine Administration and Operations HPE ArcSight Express Administration and Operations provides you with comprehensive training for Hewlett Packard Enterprise ArcSight Express. This course includes hands-on training exercises on packaged content and functionality for you to bring the Hewlett Packard Enterprise ArcSight Express appliance into production environments. Note: This course is intended for users of Hewlett Packard Enterprise ArcSight Express 4.0. CORR-Engine. This is not for use with Hewlett Packard Enterprise ArcSight Express 4.5 or 5.0. Administrators, Analysts, Operators Use Hewlett Packard Enterprise ArcSight Express built-in content; Isolate, investigate, analyze, and remediate exposed security issues; Configure Hewlett Packard Enterprise ArcSight settings, system settings, and user resources appropriately; Configure Network and Asset Modeling ILT None Five days Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 31 of 59

32 32 Chapter 5: ESP Learning Solutions 5.9 HPE ArcSight Management Center Course HPE ArcSight Management Center Administration and Operations ArcSight Management Center (ArcMC) simplifies policy configuration, deployment maintenance and monitoring tasks. This course covers techniques needed to centralize device management, user management, and configuration management with ArcMC. Learn integration strategies to reduce daily management of ArcMC, Logger, Connector Appliance and Connectors products. System Administrators Administer, configure, maintain, and troubleshoot HPE ArcSight ArcMCs, Loggers, Connector Appliances, and Connectors, Manage users roles and entitlements for ArcSight ArcMCs, Loggers, Connector Appliances, and Connectors ILT None Three days 5.10 HPE ArcSight Courses - Complete HPE ArcSight Solution HPE ArcSight MASE Preparation Course The HPE ArcSight Master ASE Preparation Course covers design and implementation considerations of a complete enterprise SIEM deployment. This course provides participants with hands-on activities through a practical solutions-based approach to address common business requirements. Methodologies, terms, and concepts are explored in progressive examples using built-in product configuration and management facilities. Product architectures are coupled with deployment best practices within the context of the HPE ArcSight product line as a complete log management and event correlation platform. Experienced HPE ArcSight IT Security experts Identify business requirements; Develop an implementation and installation plan using HPE ArcSight solutions; Design and implement HPE ArcSight resources to analyze network level events and provide enterprise-wide visibility and correlation; Develop custom solutions using HPE ArcSight technologies ILT None required three years experience; ESM Admin & Analyst; Adv Admin; Adv Analyst; Logger Admin & Operations; SmartConnector Foundations; FlexConnector Configuration; Connector Appliance Administration; Five days + three-day exam Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 32 of 59

33 5.11 HPE Fortify HPE Fortify HPE Fortify Introduction When it comes to network and data security, it is essential that web applications are defended against threats and attacks. A common misperception is that firewalls protect an application from all attacks. While a firewall is necessary and an effective solution to control access and protect an organization, it often proves to be ineffective in preventing an application exploit. A firewall cannot protect every parameter of every application that resides behind it. Nor can it completely protect access to the applications. It is for this reason that an effective suite of tools specifically designed to protect web applications is essential. HPE Fortify web application security solutions, available on-premise or on-demand, help you secure your software applications including legacy, mobile, third-party, and open source HP Forify Benefits HPE Fortify combines comprehensive static and dynamic testing technologies across 21 languages, with timely security intelligence from the HP Security Research team. HPE Fortify can be deployed in-house, as a managed service or in a hybrid model taking advantage of the best of both worlds. This flexible delivery model allows security groups to get started quickly and scale in response to business changes while protecting their assets and investments in application security. These technologies, include: HPE Fortify on Demand HPE Fortify on Demand is a managed application security testing service that enables organizations to quickly test the application security of a few applications or launch a comprehensive security program without additional investment in software and personnel. HP WebInspect HP WeInspect is an automated, dynamic testing tool that mimics real-world hacking techniques and attacks, and provides comprehensive dynamic analysis of complex web applications and services. HP Application Defender HP s application self-protection can help you stop security threats that no one else can even see by protecting production applications from the inside. It s application security simplified. HPE Fortify Static Code Analyzer (SCA) HPE Fortify Static Code Analyzer provides automated static code analysis to help developers eliminate vulnerabilities and build secure software. Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 33 of 59

34 34 Chapter 5: ESP Learning Solutions HPE Fortify Learning Solutions HPE Fortify Learning Solutions provide a full assortment of role-based, product-oriented courses with delivery options designed to support the most demanding security needs. HPE Fortify Learning Path Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 34 of 59

35 5.11 HPE Fortify 35 Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 35 of 59

36 36 Chapter 5: ESP Learning Solutions 5.12 HPE Fortify Certification Path HPE Fortify Certification offerings include both ATP- and ASE-level certifications for the HPE Fortify products and solutions. To obtain the HP ATP Fortify Security v1 certification, you must successfully pass the Fortify Security Solutions ATP exam. To obtain the HP ASE Fortify Security v1 certification, you must successfully pass the Dynamic Application Testing with HP WebInspect OR the HPE Fortify SCA/SSC exam HPE Fortify Security Solutions ATP HPE Fortify Security Solutions ATP training consists of two days of intensive training in application security and developing and testing software solutions using HPE Fortify products. You will learn about the threats to applications and the architecture and operation of the HPE Fortify solution. Through lectures and hand-on activities, you learn to implement HPE Fortify Static Code Analyzer (SCA), HPE Fortify Software Security Center, HP WebInspect, and HPE Fortify Runtime. Software Developers, Product Managers, Development Managers, Q/A Managers, Q/A Analysts, and Application Security Analysts Knowledge of software development methodologies; Implementation of HPE Fortify products; Knowledge of HPE Fortify Solutions Architecture ILT and VILT None Two days Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 36 of 59

37 5.12 HPE Fortify Certification Path Dynamic Application Testing with HPE WebInspect This HPE WebInspect course outlines HPE s comprehensive, automated web application and Web services vulnerability scanning solution. In this training, security professionals and compliance auditors learn how to quickly and easily analyze the numerous web applications and web services in their environment. This course includes extensive hands-on exercises. Application Developers, Application Testers HPE WebInspect licensing installation; Use of HPE WebInspect as a dynamic analysis security testing (DAST) tool; Manual, mobile, and work-flow driven scan creation; Web macros and report creation ILT None Three days Using and Administering HPE WebInspect Enterprise The goal of this course is to introduce you to WebInspect Enterprise which manages dynamic and static scanning focuses to ensure effective and efficient application security during your SDLC. This course will demonstrate how to create and manage your automated web application vulnerability scans and provide security risk solutions. Also, this course provides participants with hands-on activities using a practical, solutions-based approach to identify and mitigate today s biggest application security risks. Students learn to create, scan, and manage projects using both HPE Fortify SSC (Software Security Center) and WebInspect Enterprise. This course is intended for application security analysts already using HPE WebInspect to perform DAST on their applications, as well as static analysis through SSC. It is also useful for development managers, security-focused QA testers, security leads, and auditors. Basic programming skills (able to read Java, C/C++, or.net.), basic understanding of web technologies: HTTP Requests and Responses, HTML tags, JavaScript, and server-side dynamic content (JSP, ASP or similar), familiarity with some of the most common Web application vulnerabilities (i.e. OWASP Top 10), familiarity with application security, experience working with Fortify WebInspect ILT None Two days Hewlett Packard Enterprise Software Education ESP Training Plan Guide Page 37 of 59

HP Inc. Software Education Training Plan Guide

HP Inc. Software Education Training Plan Guide HP Inc. Software Education Training Plan Guide Copyright 2015 HP. All rights reserved. Published by HP Inc. http://www.hp.com HP Inc. The information contained herein is subject to change without notice.

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

HP Application Security Center

HP Application Security Center HP Application Security Center Web application security across the application lifecycle Solution brief HP Application Security Center helps security professionals, quality assurance (QA) specialists and

More information

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents

More information

DEMONSTRATING THE ROI FOR SIEM

DEMONSTRATING THE ROI FOR SIEM DEMONSTRATING THE ROI FOR SIEM Tales from the Trenches HP Enterprise Security Business Whitepaper Introduction Security professionals sometimes struggle to demonstrate the return on investment for new

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

WHITE PAPER SPLUNK SOFTWARE AS A SIEM SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Securing your IT infrastructure with SOC/NOC collaboration

Securing your IT infrastructure with SOC/NOC collaboration Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and

More information

Scalability in Log Management

Scalability in Log Management Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers

HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers HP CLOUDSYSTEM A single platform for private, public, and hybrid clouds Simply the most complete cloud system for enterprises and service providers Solution brief It s a fact of life: cloud computing is

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns

More information

HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training

HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training HP and HP Enterprise Security Products are committed to your success as an HP Partner. In the Fortify Proof of Concept Boot Camp Training,

More information

Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations

Brochure. Update your Windows. HP Technology Services for Microsoft Windows 2003 End of Support (EOS) and Microsoft Migrations Brochure Update your Windows HP Technology Services for Microsoft End of Support (EOS) and Microsoft Migrations Stabilize and secure your infrastructure Microsoft will end support for Windows Server 2003/R2

More information

Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA

Fortify Training Services. Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify Training Services Securing Your Entire Software Portfolio FRAMEWORK*SSA Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security

More information

Architecting HP Cloud Solutions, Rev. 13.21

Architecting HP Cloud Solutions, Rev. 13.21 mm HP ExpertOne Architecting HP Cloud Solutions, Rev. 13.21 Course data sheet Certification(s) supported by this course: Exam(s): Format: Duration: Course ID: HP ASE Cloud Architect V2 HP0-D17 (Architecting

More information

BlackStratus for Managed Service Providers

BlackStratus for Managed Service Providers BLACKSTRATUS FOR MSP SOLUTION GUIDE PAGE TM BlackStratus for Managed Service Providers With BlackStratus MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and

More information

Extreme Networks Security Analytics G2 Risk Manager

Extreme Networks Security Analytics G2 Risk Manager DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

nfx One for Managed Service Providers

nfx One for Managed Service Providers NFX FOR MSP SOLUTION GUIDE nfx One for Managed Service Providers With netforensics MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and increase your bottom line

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

Brochure HP Workflow Discovery for FSI

Brochure HP Workflow Discovery for FSI Brochure HP Workflow Discovery for FSI Enhance productivity, improve processes and reduce costs Businesses today need to run more efficiently, and you re probably considering every alternative to help

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

Boosting enterprise security with integrated log management

Boosting enterprise security with integrated log management IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education

RSA Archer Training. Governance, Risk and Compliance. Managing enterprise-wide governance, risk and compliance through training and education RSA Archer Training Governance, Risk and Compliance Managing enterprise-wide governance, risk and compliance through training and education www.emc.com/rsa-training 1 RSA Archer Training Table of Contents

More information

PCI DSS Reporting WHITEPAPER

PCI DSS Reporting WHITEPAPER WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

HP Service Manager software

HP Service Manager software HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service

More information

HP Operations Agent for NonStop Software Improves the Management of Large and Cross-platform Enterprise Solutions

HP Operations Agent for NonStop Software Improves the Management of Large and Cross-platform Enterprise Solutions HP Operations Agent for NonStop Software Improves the Management of Large and Cross-platform Enterprise Solutions HP Operations Agent for NonStop software manages HP NonStop servers and brings NonStop

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event

More information

Fortify. Securing Your Entire Software Portfolio

Fortify. Securing Your Entire Software Portfolio Fortify 360 Securing Your Entire Software Portfolio Fortify Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security threats. Craig Schumard,

More information

Current IBAT Endorsed Services

Current IBAT Endorsed Services Current IBAT Endorsed Services Managed Network Intrusion Prevention and Detection Service SecureWorks provides proactive management and real-time security event monitoring and analysis across your network

More information

How To Manage A Privileged Account Management

How To Manage A Privileged Account Management Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least

More information

HP and netforensics Security Information Management solutions. Business blueprint

HP and netforensics Security Information Management solutions. Business blueprint HP and netforensics Security Information Management solutions Business blueprint Executive Summary Every day there are new destructive cyber-threats and vulnerabilities that may limit your organization

More information

High End Information Security Services

High End Information Security Services High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

NEC Managed Security Services

NEC Managed Security Services NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

Leveraging security from the cloud

Leveraging security from the cloud IBM Global Technology Services Thought Leadership White Paper IBM Security Services Leveraging security from the cloud The who, what, when, why and how of cloud-based security services 2 Leveraging security

More information

Alcatel-Lucent Services

Alcatel-Lucent Services SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or

More information

Demonstrating the ROI for SIEM: Tales from the Trenches

Demonstrating the ROI for SIEM: Tales from the Trenches Whitepaper Demonstrating the ROI for SIEM: Tales from the Trenches Research 018-101409-01 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters:

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Application Security Center overview

Application Security Center overview Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &

More information

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK

PREMIER SERVICES MAXIMIZE PERFORMANCE AND REDUCE RISK MAXIMIZE PERFORMANCE AND REDUCE RISK 1 BROCHURE COMPLEXITIES IN MISSION CRITICAL SYSTEMS CONTINUE TO INCREASE Mission critical communications systems have become increasingly complex as more features and

More information

Solutions to Meet Your PCI Compliance Needs A whitepaper prepared by Coalfire Systems and HP

Solutions to Meet Your PCI Compliance Needs A whitepaper prepared by Coalfire Systems and HP Solutions to Meet Your PCI Compliance Needs A whitepaper prepared by Coalfire Systems and HP 1 P a g e Table of Contents Executive Summary... 3 The Payment Card Industry Data Security Standard... 3 PCI

More information

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief

HP End User Management software. Enables real-time visibility into application performance and availability. Solution brief HP End User Management software Enables real-time visibility into application performance and availability Solution brief Figure 1 HP End User Management lets you proactively identify application performance

More information

Monitoring and Operating a Private Cloud with System Center 2012 R2 (20246) H8Q03S

Monitoring and Operating a Private Cloud with System Center 2012 R2 (20246) H8Q03S HP Education Services course data sheet Monitoring and Operating a Private Cloud with System Center 2012 R2 (20246) H8Q03S Course Overview In this course, you will receive an overview of a private cloud

More information

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Security-as-a-Service (Sec-aaS) Framework. Service Introduction Security-as-a-Service (Sec-aaS) Framework Service Introduction Need of Information Security Program In current high-tech environment, we are getting more dependent on information systems. This dependency

More information

HP Private Cloud Solutions

HP Private Cloud Solutions HP Private Cloud Solutions Get on the fast track to on-demand shared services delivery Solution brief Quickly moving toward the cloud More and more organizations are realizing the benefits of a dramatically

More information

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software Accelerating Software Security With HP Rob Roy Federal CTO HP Software If we were in a cyberwar today, the United States would lose. Mike McConnell Former DNI, NSA. Head of Booz Allen Hamilton National

More information

FIVE PRACTICAL STEPS

FIVE PRACTICAL STEPS WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND

More information

HP ProCurve Networking certification for resellers. Place yourself above the competition

HP ProCurve Networking certification for resellers. Place yourself above the competition HP ProCurve Networking certification for resellers Place yourself above the competition HP ProCurve Certified Professional program tracks Highest certification HP ProCurve Program Sales certifications

More information

Hewlett Packard Enterprise connects with SharePoint Driving communication and collaboration helps HPE maximize the value of employees

Hewlett Packard Enterprise connects with SharePoint Driving communication and collaboration helps HPE maximize the value of employees Case Study Objective Bridge time, space, and culture to connect over 250,000 employees located in every region of the world Hewlett Packard Enterprise connects with SharePoint Driving communication and

More information

MCITP: Enterprise Administrator 2010 Boot Camp H6C09S

MCITP: Enterprise Administrator 2010 Boot Camp H6C09S HP Education Services course data sheet MCITP: Enterprise Administrator 2010 Boot Camp H6C09S Course Overview Validate your Exchange Server skills with the MCITP: Enterprise Messaging Administrator certification.

More information

Address IT costs and streamline operations with IBM service desk and asset management.

Address IT costs and streamline operations with IBM service desk and asset management. Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT

More information

www.siemens.com/learningcloud Training Catalog

www.siemens.com/learningcloud Training Catalog www.siemens.com/learningcloud Training Catalog Siemens Power Academy Energy Management Software 1 Table of Contents Product Training Focus EnergyIP Platform Smart Grid Applications Data Analytics Adapters

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

IBM Rational AppScan: enhancing Web application security and regulatory compliance. Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Detect & Investigate Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW Detect & Investigate Threats. OVERVIEW HIGHLIGHTS Introducing RSA Security Analytics, Providing: Security monitoring Incident investigation Compliance reporting Providing Big Data Security Analytics Enterprise-wide

More information

Start Anywhere and Go Everywhere with Cloud Services for HR

Start Anywhere and Go Everywhere with Cloud Services for HR SAP Brief SAP Services Cloud Services for Human Capital Management Objectives Start Anywhere and Go Everywhere with Cloud Services for HR Propel your business to success Propel your business to success

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

HP CLOUDSYSTEM. An integrated platform for private, public, and hybrid clouds

HP CLOUDSYSTEM. An integrated platform for private, public, and hybrid clouds HP CLOUDSYSTEM An integrated platform for private, public, and hybrid clouds The industry s most complete cloud system for enterprises and service providers Solution brief It s a fact of life: cloud computing

More information

Dynamic Service Desk. Unified IT Management. Solution Overview

Dynamic Service Desk. Unified IT Management. Solution Overview I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and

More information

MCITP: Sharepoint Administrator Boot Camp (10174, 10231) H6C10S

MCITP: Sharepoint Administrator Boot Camp (10174, 10231) H6C10S HP Education Services course data sheet MCITP: Sharepoint Administrator Boot Camp (10174, 10231) H6C10S Course Overview Prepare for the MCTS and MCITP SharePoint 2010 certifications. Gain the cloud-related

More information

Table of Contents. Technical paper Open source comes of age for ERP customers

Table of Contents. Technical paper Open source comes of age for ERP customers Technical paper Open source comes of age for ERP customers It s no secret that open source software costs less to buy the software is free, in fact. But until recently, many enterprise datacenter managers

More information

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach

More information

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value. SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,

More information

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Windows Server 2003 migration: Your three-phase action plan to reach the finish line

Windows Server 2003 migration: Your three-phase action plan to reach the finish line WHITE PAPER Windows Server 2003 migration: Your three-phase action plan to reach the finish line Table of contents Executive summary...2 Windows Server 2003 and the big migration question...3 If only migration

More information

IBM Rational AppScan: Application security and risk management

IBM Rational AppScan: Application security and risk management IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

Cisco Network Optimization Service

Cisco Network Optimization Service Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings

More information

HP Service Manager software. The HP next-generation IT Service Management solution is the industry-leading consolidated IT service desk.

HP Service Manager software. The HP next-generation IT Service Management solution is the industry-leading consolidated IT service desk. software The HP next-generation IT Service solution is the industry-leading consolidated IT service desk. : setting the standard for IT service management solutions with a robust lifecycle approach to

More information

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Security. Security consulting and Integration: Definition and Deliverables. Introduction Security Security Introduction Businesses today need to defend themselves against an evolving set of threats, from malicious software to other vulnerabilities introduced by newly converged voice and data

More information

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility

More information

Table of contents. 1. Introduction. 1.1 Training Products. 1.2 Training Enrollment. 2. Advanced Architect Course. 3.

Table of contents. 1. Introduction. 1.1 Training Products. 1.2 Training Enrollment. 2. Advanced Architect Course. 3. Table of contents 1. Introduction 1.1 Training Products 1.1.1 Certification Courses 1.1.2 Tailored Training Sessions 1.1.3 Self-paced Online Training 1.2 Training Enrollment 1.2.1 How to enroll? 1.2.2

More information

Remote Management Services Portfolio Overview

Remote Management Services Portfolio Overview Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On

More information