Enterprise Security and Risk Management



Similar documents
HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

High End Information Security Services

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Changing the Enterprise Security Landscape

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

What is Security Intelligence?

DEMONSTRATING THE ROI FOR SIEM

Find the intruders using correlation and context Ofer Shezaf

HP ESP 2013 Solution Roadmap

Решения HP по информационной безопасности

Demonstrating the ROI for SIEM: Tales from the Trenches

Q1 Labs Corporate Overview

Cloud and Data Center Security

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

How To Buy Nitro Security

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Continuous Network Monitoring

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

IBM QRadar Security Intelligence April 2013

End-user Security Analytics Strengthens Protection with ArcSight

The Benefits of an Integrated Approach to Security in the Cloud

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Five Ways to Use Security Intelligence to Pass Your HIPAA Audit

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Security Operation Centre 5th generation

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation

Ecom Infotech. Page 1 of 6

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

2010 State of Virtualization Security Survey

Security of Cloud Computing for the Power Grid

Netzwerkvirtualisierung? Aber mit Sicherheit!

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

IBM Security Intelligence Strategy

QRadar Security Intelligence Platform Appliances

Strengthen security with intelligent identity and access management

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Payment Card Industry Data Security Standard

Extreme Networks Security Analytics G2 Vulnerability Manager

Preemptive security solutions for healthcare

Solving the Security Puzzle

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

IBM Security Strategy

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

The Evolution of Application Monitoring

HP NonStop Server Security and HP ArcSight SIEM

From the Bottom to the Top: The Evolution of Application Monitoring

1 Introduction Product Description Strengths and Challenges Copyright... 5

Securing your IT infrastructure with SOC/NOC collaboration

Assuring Application Security: Deploying Code that Keeps Data Safe

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Enterprise Security Solutions

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products

All about Threat Central

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

Data Center Infrastructure Management

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Ovation Security Center Data Sheet

Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

How To Manage Security On A Networked Computer System

Dynamic Service Desk. Unified IT Management. Solution Overview

Quest One Identity Solution. Simplifying Identity and Access Management

Vulnerability Management

Obtaining Enterprise Cybersituational

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Caretower s SIEM Managed Security Services

NERC CIP VERSION 5 COMPLIANCE

Worldwide Security and Vulnerability Management Forecast and 2013 Vendor Shares

QRadar SIEM 6.3 Datasheet

Information & Asset Protection with SIEM and DLP

Best Practices for Building a Security Operations Center

HP Next-Generation Network Security Solutions Radoslav Georgiev Technical Consultant HP Networking

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Big Data, Big Risk, Big Rewards. Hussein Syed

CloudPassage Halo Technical Overview

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

RSA Identity Management & Governance (Aveksa)

IBM Security IBM Corporation IBM Corporation

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Swordfish

Transcription:

Enterprise Security and Risk Management

Growth, innovation, efficiency depend on security HP protects what matters Banking Manufacturing Public Sector $9 trillion USD per day 1000+ Business processes 13 million Citizens per year 2

Coleman Parkes Research Security awareness is going in the right direction Security executives are starting to have a seat at the table However, a majority do not have a security strategy in place Security intelligence is on the rise However, reactive measures still dominate resources and budget Information risk strategy adoption 34 % 21 % 45 % Yes No Planning 70 60 50 40 30 20 10 0 Time Reactive vs proactive Budget reactive proactive 3

Coleman Parkes Research Innovation and technology challenges Cloud services can often be secure But awareness of the buyers is often lacking Big data is a big opportunity Provided the data is secure while in use, in transit, at rest Mobility is difficult at many levels But the number of devices, apps, locations keeps growing 4

HP presents intelligent security Build it in. Make it intelligent. Protect what matters. Market-leading technology Enterprise perspective Experienced people Choice of delivery models Products Services Hybrid 5

HP helps customers move from security to risk management Assess Transform Optimize Manage HP Security Discovery Workshop HP Comprehensive Application Threat Analysis Service HP Data Center Protection Services HP Secure Boardroom A methodical, iterative approach 6

The news Embargo until Sept 10

Today s announcements Information Security Management HP Security for Public Sector HP Data Center Protection Services Security Operations Data Center Network Application Users & devices HP ArcSight Enterprise Security Manager HP Next Generation Intrusion Prevention Systems HP Information Security PULSE HP Imaging Printing Security Solutions 8

HP Security for Public Sector Features Assured Identity new features include identity proofing, privileged user management and federation features. Comprehensive Applications Threat Analysis on Demand now available via the HP Fortify On Demand portal. Security Operations Center Consulting Services provide clients the opportunity to have their own intelligent cybersecurity security operations center designed by HP industry-experienced specialists for their site.* 9 * Not applicable to U.S. Public Sector which has its own security consulting and SOC service Problems it solves Insufficient insight and ability to manage threat posture Continuing escalation of costs driven by identity fraud Vulnerability of applications and data Mounting regulations and budget reductions Customer Benefits Assured Identity Reduction in fraud and improper payments through identity proofing Increased productivity and reduced costs via federation features and as a service delivery option Reduced risk and stronger compliance via privileged user management CATA on Demand Risk and expense reduction through comprehensive early detection Compliance requirements are built into applications Security Operations Center Consulting Services Provides comprehensive view of security control conditions Clients maintain awareness and control over their security operations

HP Datacenter Protection Services Features HP Datacenter Protection Service Optimization: HP experts evaluate clients existing physical and logical controls to help improve security effectiveness and maximize operational efficiency. Clients receive actionable recommendations to optimize existing security operations infrastructure and controls, such as security program consolidation or the elimination of unnecessary technology investments. HP Datacenter Governance, Risk and Compliance Readiness Service HP experts analyze the impact of new cybersecurity and privacy regulations. Experts provide recommendations on how to improve governance; risk and compliance practices to address gaps between current and future required controls, helping clients manage risk and reduce costs. HP Datacenter Protection Management Service HP experts evaluate existing security monitoring and management practices to identify issues or opportunities for improvement. Following a comprehensive analysis, HP provides a detailed assessment and roadmap for improving their security monitoring and management. Problem it Solves Too often, security is an afterthought or excluded from an overall data center planning initiatives resulting in operational inefficiencies, compliance issues, new threats and loss of critical data. Furthering this complexity is the introduction of big data, adoption of cloud computing, and mobility expansion. Virtualized environments require an integrated security solution that spans the entire data center, as opposed to siloed, fragmented point-solutions for each system. Customer Benefits Optimization of existing security and governance controls ensures that cost of reducing risk is commensurate with the value of the information and assets. A future state data center t ensures that data privacy and security standards are not violated. Efficient logical and physical threat and vulnerability monitoring and management integrated with overall data center operations to provide a real-time consolidated view of risk leading to quick and efficient resolutions of security events and operation outage conditions. 10

HP TippingPoint NX Platform Next Generation IPS Problem it solves Organizations are constantly under attack. Sensitive information is accessed and pulled out of an organization through network connections Performance and configuration become bottlenecks in the enterprises effort to detect and protect their organization Features Based on X-Armour, HP s new break-through architecture First in market to support 16 segments of 10GbE in a 2U form factor A 60% performance increase from prior versions with 13Gbps inspected throughput in the 7100NX Offers pluggable interface modules for easier customization The four available interface modules are: 10GbE with 8 ports (4 segments), 40GbE with 2 ports, 1GbE fiber with 12 ports, 1Gbe copper with 12 port Customer Benefits Protect hybrid environments from a single console Reduces rack space requirements significantly Built to perform in the most demanding data centers with Updated with weekly intelligence from industry leading global researchers This configuration makes the HP NGIPS the best solution for current and next generation data centers where 10GbE networks are typically deployed 11

HP ArcSight ESM 6.0c with CORR Engine Problem it solves The large amount of security event data makes it extremely difficult to extract relevant, timely, and actionable information without the ability to quickly analyze Detecting and preventing both internal and external information security risks without the help of advanced log analysis, correlation and reporting is ineffective Features The first ArcSight SIEM software product to use the HP CORR (Correlation Optimized Retention and Retrieval) engine Compared with advanced RDBMS versions, ESM 6.0c offers 300%-500% faster correlation CORR engine provides highly efficient data storage-- up to 20 times less storage--for all SIEM use cases HP ArcSight CORR technology can now be deployed as an appliance and as a software Customer Benefits Reduces threat and risk impacting the enterprise network Reduced cost of security via faster collection/correlation, simplified analysis and more efficient storage Lower cost of compliance via automated regulatory reporting and continuous controls monitoring 12

HP Introduces Information Security Pulse Problem it solves Many enterprise organizations do not have visibility into cyber threats and attacks Many enterprise organizations do not realize the extent to which their information may be exposed to exploits, if they are not using HP IPS solutions Features Free access to trending threat and attack data from HP DVLabs Provides geographic-based situational awareness information Provides customizable news feed feature Available for ipad, iphone, Android, WebOS and web Customer Benefits Provides customers with free access to HP Dvlabs proprietary cyber threat data Helps people in security and non-security roles to see and understand the threats and attack trends that may affect their enterprise Helps educate customers about cyber security situational awareness 13

HP Imaging and Printing Security Assessment Features HP Imaging and Printing Security Assessment Reviews the entire print environment from a security and compliance perspective Recommends how to maintain and verify compliance with defined security policies Delivers a print security policy unique to the customers environment and risk tolerance HP Access Control for Healthcare Supports Cerner and Meditech ERM systems Provides audit log of who is faxing, scanning, copying, and printing protected patient health information Offers a user one-time sign-on for authentication HP Imaging & Printing Security Center Broader HP device & operating system compatibility Automatically connects supported HP devices upon device install, reboot or reset, and configures them with a customerdefined security policy Powerful password management capabilities, including the ability to automatically set device passwords out-of-box Problem it solves HP Imaging and Printing Security Assessment Prevents risks associated with unattended documents on a printer, data processing from PC to device, and information on hard drives. HP Access Control for Healthcare Need to address print environment security across their fleet. Users require convenient authentication ; on-the-go print solutions HP Imaging & Printing Security Center Challenges with creating a valid security policy Difficulty securing fleet as devices are added, moved, or serviced. Regulations & industry standards require complex compliance Customer Benefits Imaging and Printing Security Assessment Prevents data loss and information leaks and ensure compliance Addresses data lifecycle protection for printing and imaging HP Access Control for Healthcare Reduces costs, eliminates paper waste from unclaimed print jobs Enhances device security and management and improves companywide printing policies HP Imaging & Printing Security Center Guides customers through creating a valid security policy Provides quick & easy deployment of security across the fleet with a single security policy Provides ongoing security monitoring to keep devices compliant 14

Thank you