CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
2 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HACKTIVIST INSIDER CYBER CRIMINAL
5 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Security Research Efforts Worldwide Malware Research HP Security Research (HPSR) Software Security Research Field Intelligence Fortinet 9% MICROSOFT PUBLIC VULNERABILITY ACKNOWLEDGEMENTS 2006-2013 Cisco/ Checkpoint SourceFire 1% 1% Palo McAfee Alto Stonesoft Networks 3% 8% IBM 8% Juniper 0% HP Tipping Point [PERCENT AGE] 6 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Threat Central Partners InQuest Open Source Feeds Threat Central Threat DB Private TC Forum Private Community Sector Community Threat Central Threat Central enables Bi-directional collaboration Actionable and Automated Standards-based open sharing Integrated directly with ArcSight and TippingPoint HP Security Research TC Portal Global Community HP Confidential. This information is not to be shared without the approval from HP. 7 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
8 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
84% of breaches occur at the application layer 9/10 mobile applications are vulnerable to attack 9 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Application Defender Application Security Simplified Visibility Actionable information through interactive dashboards and alerts HP Application Defender 1,2,3 Simplicity Install quickly and easily with a three-step deployment, get protection up and running in minutes Protection Stop attacks from inside the application. 10 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
11 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
229days average time to detect breach 2014 January February March April May June July August September October November December 2015 January February March April 12 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP ArcSight, act with laser clarity against threats that matter Collect Analyze Prioritize Transform Big Data into actionable security intelligence Real-time correlation of data across devices to find threats Cyber forensics, fix what matters most first 13 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
14 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
16 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP HAVEn helps you monitor the assets that matter HP ArcSight with IDOL People generate data IDOL Machines generate data ESM 17 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
18 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
19 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Mulţumesc! Petr Hněvkovský hnevky@hp.com Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank you Petr Hněvkovský hnevky@hp.com Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Key drivers Massive growth of machine data, regulations and transformation SECURITY How will you detect and investigate cybersecurity incidents? COMPLIANCE How will you pass your audits? IT OPERATIONS How will you troubleshoot your network? 22 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Transactional Impact of Use-Cases Transformational HP ArcSight Use Cases We cover the spectrum of use-cases and growth paths for Security Risk Management Advanced SI & OC Security Monitoring & Response Compliance Get me something that lets me check the box and meet requirements. We just got breached and we are in the news. Get someone in here to help me. I need to secure my company in the new world of cloud, mobility and social. I want to start thinking about risk more broadly and how I should be looking at IT risk. Operational Management Stakeholder Involvement C-Level 23 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Data to security intelligence Data Collection See Integration Analytics Understand Monitor & Respond Act A methodical, iterative approach Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP ArcSight Security Intelligence Platform A comprehensive platform for monitoring modern threats and risks, augmented by services expertise and the most advanced security user community, Protect724 Event Correlation Establish complete visibility User Monitoring Fraud Monitoring Data Capture Log Management Controls Monitoring App Monitoring Analyze events in real time to deliver insight Respond quickly to prevent loss Measure security effectiveness across people, process, and technology to improve over time 25 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Benefits Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP ArcSight delivers 4 hours to respond to a breach ArcSight enables forensic investigation and a quick response to a data breach that otherwise would take 24 days 10 minutes to fix an IT incident Full-text searching of any data enables incident resolution that otherwise would take 8 hours 5 minutes to generate IT GRC report ArcSight content generates IT GRC reports that otherwise would take 4 weeks 3 days to run an IT audit Search results yield audit-quality logs that otherwise would take 6 weeks 2 days to fix a threat vulnerability Seamless integration allows faster remediation, that otherwise would take 3 weeks 27 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
With ArcSight Get Control Get Efficient Get Compliant Transform Big Data into actionable intelligence Faster resolution with fewer resources Automate your compliance out-ofthe box 28 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP ArcSight is also loved by critics HP; 23,6% Point solutions, 45% #1 Gartner s magic quadrant in 2013 ranks ArcSight in top quadrant for the 10 th consecutive time IDC 2012 report: HP s revenue is more than that of next two vendors combined in worldwide SIEM market Gartner s critical capability in 2012 ranks ArcSight as #1 in meeting customer s requirement; Ranked #1 in 8 out of 12 categories 29 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.