Be Fast, but be Secure a New Approach to Application Security July 23, 2015



Similar documents
Managing the Challenges of Cloud Management November 7, 2013

What s New With HP Service Manager and Universal CMDB December 18, 2014

Решения HP по информационной безопасности

Are you ready to light up your Cloud? July 7, 2015

How to Consolidate your App Monitoring Strategy: End-to-End User Experience Monitoring for Your BSM October 20, 2015

Big Data Analytics: Today's Gold Rush November 20, 2013

Advanced Configuration Management with HP UCMDB Configuration Manager & UCMDB Browser

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Changing the Enterprise Security Landscape

What s New for HP Service Anywhere & Service Manager September 15, 2015

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

How to Automate SOX/PCI Breach Detection with UCMDB-CM June 27, 2013

Security Operation Centre 5th generation

Applications Performance Management for Mobile Applications September 18, 2013

The Evolution of Application Monitoring

What is New: HP LoadRunner 12.02, HP Performance Center 12.20, StormRunner 1.30

Securing your IT infrastructure with SOC/NOC collaboration

HP Business Service Management 9.2 and

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

From the Bottom to the Top: The Evolution of Application Monitoring

Find the intruders using correlation and context Ofer Shezaf

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Actionable insight for IT BIG Data - HP Operations Analytics August 22, 2013

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

HP Fortify Software Security Center

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA

IBM QRadar Security Intelligence April 2013

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Introducing IBM s Advanced Threat Protection Platform

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

On the Edge of Mobility Building a Bridge to Quality October 22, 2013

ALERT LOGIC FOR HIPAA COMPLIANCE

Introduction to Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

IBM Security IBM Corporation IBM Corporation

End-user Security Analytics Strengthens Protection with ArcSight

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

HP Fortify application security

DevOps: Old-School IT lessons for a New-World of IT Opportunities. February 16, 2012

Connected Intelligence and the 21 st Century Digital Enterprise

Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products

How to Keep a Cloud Environment Current, Secure and Available October 16, 2014

HP Application Security Center

The Cloud App Visibility Blindspot

The New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe

Is your software secure?

The Benefits of an Integrated Approach to Security in the Cloud

How To Understand The Value Of Cloud Computing For An Enterprise Company

What is Security Intelligence?

Q1 Labs Corporate Overview

AM chargeback/ TCO reporting for business services

PCI DSS Reporting WHITEPAPER

Enterprise Security and Risk Management

Average annual cost of security incidents

I D C A N A L Y S T C O N N E C T I O N

Vistara Lifecycle Management

Boosting enterprise security with integrated log management

The Emergence of Security Business Intelligence: Risk

CYBER SECURITY, A GROWING CIO PRIORITY

Devising a Server Protection Strategy with Trend Micro

Runtime Application Self Protection (RASP) Making Applications Self Protecting, Self Diagnosing and Self Testing

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

Devising a Server Protection Strategy with Trend Micro

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

McAfee Server Security

Caretower s SIEM Managed Security Services

The Sophos Security Heartbeat:

Assuring Application Security: Deploying Code that Keeps Data Safe

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Vulnerability Management

Breaking down silos of protection: An integrated approach to managing application security

Application Security 101. A primer on Application Security best practices

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

PCI DSS Top 10 Reports March 2011

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY

Transcription:

Be Fast, but be Secure a New Approach to Application Security July 23, 2015 Copyright 2015 Vivit Worldwide Copyright 2015 Vivit Worldwide

Brought to you by Copyright 2015 Vivit Worldwide

Hosted by Paul Peissner Vivit DevOps SIG Leader Copyright 2015 Vivit Worldwide

Today s Speakers Gerben Verstraete Chief Technologist Professional Services HP Software Cindy Blake Product Marketing Manager HP Software Copyright 2015 Vivit Worldwide

Housekeeping This LIVE session is being recorded Recordings are available to all Vivit members Session Q&A: Please type questions in the Questions Pane Copyright 2015 Vivit Worldwide

Webinar Control Panel Toggle View Window between Full screen/window mode. Questions Copyright 2015 Vivit Worldwide

Be fast but be secure A new approach to application security Cindy Blake and Gerben Verstraete/ July 2015 #AppDefender

Velocity is new normal hybrid deliver the key & you better get it right 50 Percentage of Percentage businesses expect to be digital in 24 months 1 trillion applications by 2020 50 % apps deleted upon finding a bug 100 billion connected devices in 2020 30 X increase in the number of apps 81 Percentage of IT org. believe cloud provides competitive solutions for IT 25+ releases per quarter per app by 2020 46 % of organizations using agile 30 cost reduction for business operations by smart machines by 2018 43 Percentage of projects delivered business 1 value 1st time of every $5 spent on packaged software will be cloud based(2018) 84 % of breaches at the app layer 3 seconds before a user abandons an app 37 percentage of orgs that host apps externally

The number of apps is growing Increasing platforms and complexity many delivery models PRODUCTION LEGACY SOFTWARE OUTSOURCED COMMERCIAL OPEN SOURCE IN-HOUSE DEVELOPMENT

Current solutions protect the perimeter Yet, 84% of breaches occur in the application software

The ratio of spending between perimeter security and application security is 23-to-1. Joseph Feiman, Gartner analyst Maverick* Research: Stop Protecting Your Apps: It s Time for Apps to Protect Themselves, Sept 25, 2014

Challenges to overcome Lack of visibility Business damage in the form of productivity losses Infrastructure performance events are not seen in the context of security events Disparate data sources and management systems limits organizations to understand the impact of anomalies Device and device components moving in and out of the infrastructure unnoticed Inability to pin point Responding to and resolving incidents are both time consuming and costly Lack of integrated data sources and a true understanding of the business impact Limited ability to respond to new vulnerabilities\threats Comprehensive malicious code attacks Securing complex applications (legacy and modern) is challenged by business pressures Borderless consumption models of applications in the cloud and across mobile platforms Security as an afterthought, not fully embedded in the entire application lifecycle Governance and Compliance No integrated approach to keep service infrastructure compliant with releases across global infrastructure Cumbersome processes to meet audit requirements and reporting capabilities Security has build a silo within many organizations, not integrating as a partner across the lifecycle

Security has to be embedded in everything IT does EA PMO Testers Dev IT Value Chain Users LOB IT Ops IT Engineers Strategy to Portfolio Requirement to Deploy Request to Fulfill Detect to Correct Drive IT portfolio to business innovation Build what the business wants, when it wants it Catalog, fulfill, and manage services and track usage Anticipate and resolve service issues Plan Define Dev Build Test Deploy Release Operate 13 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Traditional NOCs and SOCs will need to converge IT Security User Provisioning Identity & Access Mgmt Application Security Database Encryption Anti-Virus, Endpoint Firewall, Email Security See Everything Act IT Operations Performance & Availability User Management App Lifecycle Mgmt Operations Mgmt Network Mgmt See Everything Understand Context Proactive Risk reduction 14 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Key focus areas Proactive Exposure Analyses Continuous discover what you have in order to protect your applications Security Asset Lifecycle Managemen t Augmented Cyber Operations Detect, Contain and Prioritize Continuous Security and IT Operations correlating events and understand business context Prevent and Respond Continuous manage compliance across complex services infrastructures and automated event remediation Security Compliance & Automated Remediation Secure Application Lifecycle Managemen t Design Secure Continuous Development and Testing with integrated security processes and technology 15 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Continuous Application Security Scan it Test it Defend it HP App Defender Application Development Production / Operations

Application Security Testing Application Security Testing is a best practice, but remediation before production is difficult to implement = 3 weeks + to remediation Application Security talent is very difficult to find Process need to be defined so that everything is standardized and efficient Developers are not measured to think about security

Application Security Testing Application Security Testing is a best practice, but remediation before production is difficult to implement = 3 weeks + to remediation C+ Application Security talent is very difficult to find Process need to be defined so that everything is standardized and efficient Developers are not measured to think about security

Common challenges to removing software vulnerabilities You lack access to the code of critical applications Your security scan just found 100+ app vulnerabilities where to begin? Your vendor told you a patch will be ready in 3 months You have no idea what vulnerabilities you have Your app is end-of-life and you really do not want to invest the resources Developer resources are constrained

Maximum Days to Announce Remediation Source: HP Cyber Risk Report, 2015 We were hoping that critical vulnerabilities would be the fastest to fix. Interestingly, this was not always the case. One possible reason could be that most organizations tend to fix and verify all critical and high vulnerabilities first. Hence, the developers could be prioritizing their tasks from a single bucket based on the ease of completing the task, rather than the severity of the issue. www.hp.com/go/cyberrisk

Traditional approaches rely on Web Application Firewalls (WAFs) Over the Wire works great until it s bypassed Tools are available to exploit WAF s signature based approach and more An example from BlackHat 2012 See RASP vs WAF study by the SANS Institute

When does it make sense to rely on RASP? As a virtual patch You lack access to the code of critical applications Your security scan just found 100+ app vulnerabilities Your vendor told you a patch will be ready in 3 months You have no idea what vulnerabilities you have Time to market pressure START For defense in depth You want contextual insight into your application s security

Security can be agile You can deliver software quickly and without compromise using continuous, integrated, and automated methods for overall application health. Fail forward with known security vulnerabilities - let HP Application Defender protect those vulnerabilities with compensating controls while you remediate the code.

Without compromising performance Rapid application development is difficult when juggling application performance and secure coding. Confidently deploy your RASP solution with granular and transparent performance metrics - let HP App Pulse show you how. Model your defense pre-production to confidently predict load and performance. Try them both for free App Pulse free trial App Defender free trial

Application Defender Technology Target Program Monitor <Rule> Application Server Program Point Event Event Handler Action Event Handler Chain Log

Application Defender Integrated with your NOC\SOC Target Program Monitor <Rule> NOC\SOC Operations (choice) Application Server Program Point Event Event Handler Event Handler Chain Operations Bridge (OMi) ArcSight ESM AppView Action Log

HP Security Research HP Fortify runtime technology HP Application Defender Application Security Simplified Visibility Actionable and accurate insight from within the application to pinpoint vulnerabilities for protection or remediation HP Application Defender 1,2,3 Simplicity Install quickly and easily with a three-step deployment, get protection up and running in minutes Protection Stop attacks categorically or for specific vulnerabilities.

Simplicity Quick Installation Up and running in less than 5 minutes 3 easy steps Easy In Service Updates Rulepack Agent Binary Accurate application protection and grouping

Visibility Quick access to specific vulnerability events Easy filtering of realtime and historical data Accurate presentation of event trigger and stack trace detail

Protection Quick protective action against attacks from within your application Easy identification of top vulnerability events by criticality Accurate results from within application logic and data flows

Try it today Contact your sales executive Learn more and begin your trial at hp-application-defender.com No cost. Monitor and protect one application for as long as you choose. When you are ready to purchase, this SaaS offer is priced per application instance with discounts for more applications and for longer contracts. Prices start at $149 for one app per month

Questions? HP-Application-Defender.com HPAppDefender@hp.com Cindy.Blake@hp.com Gerben.Verstraete@hp.com

HP Big Data Conference 2015 August 10-13, 2015 at Westin Waterfront Hotel in Boston, MA All members can Register Now via the unique Vivit link: https://hpbigdata2015.wegbox.com/vivit Copyright 2015 Vivit Worldwide

Thank you Complete the short survey and opt-in for more information from HP Software. www.hp.com www.vivit-worldwide.org Copyright 2015 Vivit Worldwide