Changing the Enterprise Security Landscape

Similar documents
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

The Evolution of Application Monitoring

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Security Operation Centre 5th generation

Решения HP по информационной безопасности

HP Fortify Software Security Center

Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products

Bezpečnosť dát v HP Cloude

Find the intruders using correlation and context Ofer Shezaf

Q1 Labs Corporate Overview

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Connected Intelligence and the 21 st Century Digital Enterprise

QRadar SIEM and FireEye MPS Integration

HP NonStop Server Security and HP ArcSight SIEM

Is your software secure?

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

Big Data and Security: At the Edge of Prediction

What is Security Intelligence?

Software EMEA Performance Tour Berlin, Germany June

Enterprise Security and Risk Management

IBM QRadar Security Intelligence April 2013

HP Cyber Security Control Cyber Insight & Defence

HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015

IBM Security Intelligence Strategy

How To Buy Nitro Security

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

FIVE PRACTICAL STEPS

End-user Security Analytics Strengthens Protection with ArcSight

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Discover Security That s Highly Intelligent.

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

CYBER SECURITY, A GROWING CIO PRIORITY

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader

From the Bottom to the Top: The Evolution of Application Monitoring

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

2012 North American Managed Security Service Providers Growth Leadership Award

The Benefits of an Integrated Approach to Security in the Cloud

Security Intelligence Solutions

Protect Your Universe with ArcSight

HP Next-Generation Network Security Solutions Radoslav Georgiev Technical Consultant HP Networking

Application Security Center overview

Become a hunter: fi nding the true value of SIEM.

Assuring Application Security: Deploying Code that Keeps Data Safe

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

The Future of the Advanced SOC

Mobility. Exploiting and Maintaining the New Face of Engagement. Huseyin Ozel CT, HP EMEA Enterprise Mobility September 2015

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Vulnerability Management

Security strategies to stay off the Børsen front page

SourceFireNext-Generation IPS

How to Choose the Right Security Information and Event Management (SIEM) Solution

Security Information & Event Management (SIEM)

the challenge our mission our advisors

2011 Forrester Research, Inc. Reproduction Prohibited

IBM Security Strategy

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

HP TIPPINGPOINT ADAPTIVE REAL-WORLD SECURITY. Stefan Schmid Sales Manager Central & Eastern Europe & Middle East s.schmid@hp.com

Master big data to optimize the oil and gas lifecycle

HP Business Service Management 9.2 and

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

DEMONSTRATING THE ROI FOR SIEM

The webinar will begin shortly

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

HIGH-RISK USER MONITORING

Securing your IT infrastructure with SOC/NOC collaboration

Log management & SIEM: QRadar Security Intelligence Platform

HP ESP 2013 Solution Roadmap

INSERT COMPANY LOGO HERE

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Address C-level Cybersecurity issues to enable and secure Digital transformation

Cyber Security Risks for Banking Institutions.

Metrics that Matter Security Risk Analytics

IT Security Strategy and Priorities. Stefan Lager CTO Services

Transcription:

Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

Topics Current Industry Trends Enterprise Security Vision Solution Overview Intelligent ESP Integrations & Real World Examples Enterprise 2 Security HP Confidential

Rise Of The Cyber Threat Enterprises and Governments are experiencing the most AGGRESSIVE THREAT ENVIRONMENT in the history of information.

Security Awareness at Board Level Client Security Leadership is under immense pressure CIO CEO SHAREHOLDERS CISO Chief Information Security Officer sits at heart of the enterprise security response

Disruptive Technology Trends OPEN & EXTENDED Security of Information Capital Security 2.0 Proactive Risk Management CONSUMERIZATION Mobility, Device & Social Media CLOUD Public, Private, Adoption BIG DATA Content, Context, Unstructured FORTRESS Reactive Perimeter Security

Enterprise Security Priorities Manage INFORMATION RISK in the era of mobile, cloud, social media Protect against increasingly sophisticated CYBER THREATS Improve REACTION TIME to security incidents Reduce costs and SPEND WISELY Achieve COMPLIANCE in a predictable and cost-effective way 6

Enterprise Security Vision

HP has the only security intelligence platform that gives clients the insight to proactively manage their specific enterprise threats and risks. 8

HP Security Intelligence Platform Security Intelligence Platform Information Establish complete Visibility across all applications and systems Analyze vulnerabilities in applications and operations to understand risk Operations Applications Respond adaptively to build defenses against the exploitation of vulnerabilities Measure security effectiveness and risk across people, process, and technology to improve over time Security Services 9

Solution Overview

HP ESP: a new security intelligence model #4 Risk Management Security IT Management Application Security #3 Security Intelligence Applications Information Security Operational Security #2 Provide Context Information Operations #1 See Everything

HP Enterprise Security 1,400 security professionals from HP ArcSight, Fortify and TippingPoint teams Top five security company by market share (leader in SIEM, Log Mgt, AppSec, Network Security) HP has the potential to become =HP a security powerhouse with a broad portfolio of security offerings application, network security and security information and event management (SIEM) that HP is currently integrating both organizationally and technologically. (Gartner Magic Quadrant for Dynamic Security Testing, Dec 2011) The Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from HP.

HP Fortify Software Security Center Identifies and eliminates risk in existing applications and prevents the introduction of risk during application development, in-house or from vendors. Applications In-house Commercial Outsourced Open source Protects business critical applications from advanced cyber attacks by removing security vulnerabilities from software Accelerates time-to-value for achieving secure applications Increases development productivity by enabling security to be built into software, rather than added on after it is deployed Delivers risk intelligence from application development to improve operational security

HP TippingPoint Network Defense System A complete set of security solutions that address today's advanced security threats at the perimeter and core of your business. Operations Applications Scalable Infrastructure to address current and future security deployment models (NG IPS/FW) Dynamic Analytics and policy deployment with real time (NG Mgmt) Predictive Intelligence to proactively address current and future threat activity (DV Labs) Next Gen IPS DVLabs Research Net wrk Network Defense System Next Gen Firewall Next Gen Mgmt

HP TippingPoint has Microsoft coverage a month before other vendors -26 Days 146/163 Covered P A T C H A V A I L A B L E Number of days after patch that vendor delivers coverage 0 Day 117/163 Covered +1 Day 59/163 Covered 39/163 Covered +2 Days 144/163 Covered +3 Days 131/163 Covered Other IPS Vendors 15

HP ArcSight Solution Architecture A comprehensive platform for monitoring modern threats and risks, augmented by services expertise and the most advanced security user community, Protect724 Information Establish complete visibility Analyze events in real time to deliver insight Respond quickly to prevent loss Measure security effectiveness across people, process, and technology to improve over time User Monitoring Fraud Monitoring Event Correlation Data Capture Controls Monitoring App Monitoring Log Management

MODERN BREACHES SHARE A PATTERN Acquire target, sneak in, hop around (Perimeter doesn t help) Get privileged access to critical assets (Impact takes time) Conduct the crime for an extended time (Early detection matters)

HP ArcSight Does Three Things Better Than Anyone Collect Consolidate Correlate Enterprise Data Collection Collect events from any device on the network Raw, or categorized for better analysis Extend to new data types whenever needed, without HP ArcSight involvement Today s choices will not limit tomorrow s strategy

HP ArcSight Does Three Things Better Than Anyone Collect Consolidate Correlate Universal Log Management Complete management of any data to support security, compliance and IT operations Search + report on years of data to investigate outages and incidents quickly and easily Cut SAN/storage cost with cheap simple management of petabytes of log data Deploy one solution to manage enterprise-wide log data

HP ArcSight Does Three Things Better Than Anyone Collect Consolidate Correlate Cutting-edge Threat Analysis ThreatDetector Pattern recognition and anomaly detection to identify new threats Analyze roles, identities, histories and trends to detect business risk violations The more you collect, the smarter it gets Detect and then prevent attacks you can t predict

Intelligent ESP Integrations & Real World Examples

2 HP EnterpriseView Holistic, business-centric view of IT risk Decision intelligence for maximum efficiency Dynamic analysis

THANK YOU