© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.

Slides:



Advertisements
Similar presentations
THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Advertisements

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. trans for ma tion : a.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. AppPulse mobile Get insights.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Leveraging Threat Intelligence.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Software Defined Networking.
Security Controls – What Works
The State of Security Management By Jim Reavis January 2003.
Unified Logs and Reporting for Hybrid Centralized Management
MIGRATION FROM SCREENOS TO JUNOS based firewall
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted. For HP.
© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. PCI Compliance & Technology.
February/March 2011 HP CLOUD SERVICE AUTOMATION Hemanth Dattatreya HP Software.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Enable Cloud with Virtual.
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Buying factors – HP.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Apache and Hadoop are.
Lessons Learned in Smart Grid Cyber Security
© Copyright 2010 Hewlett-Packard Development Company, L.P. 1 MORE THAN A DIGIT(AL) SHIFT Frank Huynen Director Strategy & Innovation.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Marketing Information Technology in Emerging Markets: Hewlett-Packard in Latin America.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Security Information and Event Management
Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Simplifying IT, Empowering Business.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Vodafone Business Cloud
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
Protect your Digital Enterprise
Fourth Dimension Technologies
Real-time protection for web sites and web apps against ATTACKS
Federated IdM Across Heterogeneous Clouding Environment
YOUR DIGITAL TRANSFORMATION JOURNEY
Enterprise Productivity Services
Making Information Security Manageable with GRC
Healthcare Cloud Security Stack for Microsoft Azure
Validating Your Information Security Program (ISP 3 of 3)
Healthcare Cloud Security Stack for Microsoft Azure
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Presentation transcript:

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana Stepanova/ November 7 th, 2014

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Presentation HP Services Solution Architect More then 10 years in HP Strong technical background with onsite technical support as an engineer and Account Support Manager ITIL v3 Expert and Certified EXIN Instructor ISO/IEC Lead Auditor TOGAF 9 Certified HP, Microsoft product certifications

HP’s Approach to Information Security Security is in the top 5 IT Technology Priorities

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Challenges enterprises and governments are facing Nature and motivation of attacks (Fame to fortune, market adversary) 1 Research Infiltration Discovery Capture Exfiltration Transformation of enterprise IT (Delivery and consumption changes ) 2 Consumption Traditional DCPrivate cloudManaged cloudPublic cloud Virtual desktopsNotebooksTabletsSmart phones Delivery Regulatory pressures (Increasing cost and complexity) 3 Basel III

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Holistic security approach InformationSecurityServiceManagement (ISSM) Methodology Security is more than just technology and products People Determines if the right staff are performing the correct roles to oversee security Policy & Procedures Determines if the right set of policies and procedures are in place to govern the security and continuity Processes Determines if the proper security / continuity process models are in place to safeguard the transference of data between consumers and providers Products Determines if appropriate defense-in-depth technologies / solutions are in place to manage / mitigate risk Proof Determines if the correct validation methods, metrics, and / or Key Performance Indicators (KPIs) are used to track control effectiveness P1P1 P2P2 P3P3 P4P4 P5P5

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Disrupt the adversary, manage risk, and extend your capabilities HP Security Disrupt the adversary Security technology Reduce cost & complexity Advisory & management Manage risk Risk & compliance

HP’s Security Services

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP’s security services AdviseTransformManage RoadmapOperate / EvolveImplementDesign Strategy Vulnerability Assessment HP and 3 rd party tools Network Security Design Security Products Implementation Service ArcSight TippingPoint Maturity Assessment HP P5 and CMM Penetration Testing HP and 3 rd Party Tools Audit ISO 27001, PCI DSS IS Strategy and architecture Define Security Controls HP and 3 rd party Risk Assessment HP P5 and CMM

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Next-Generation IPS Next-Generation Firewall Network Protector SDN Application Reputation Digital Vaccine Secure the perimeter and mobile worker Dynamic threat protection Secure the data and apps that matter Networking Create a security offering no other company can duplicate Our capabilities HP Security

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Converging network and security trends Network trends SLA requirements Network visibility Network complexity Security trends Emerging threats Scalability/managemen t Regulatory pressures Software Defined Networking (SDN) with HP Networking and HP Enterprise Security Products can solve networking and security challenges Pain pointsRequired solutions Changing infrastructure needs and network upgrades Flexible solutions that scale with changing customer requirements Evolving threats, increasing number of attack vectors and rising data breach costs High-performing solutions with high degree of security effectiveness and a low TCO New systems and applications deployed on the network Complete visibility to monitor network behavior and provide actionable security intelligence Mobile, BYOD and cloud trends adding network and security management complexity Easy-to-use management system that deploys updated policy configurations to all devices on the network Complicated management systems requiring overhead costs and dedicated resources Integrated application control, user behavior and IP monitoring through single management interface

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Log management, security information and event management (SIEM) A new approach: See everything with HP ArcSight Collect Collect logs from any device, any source, and in any format at high speed Consolidate Machine data is unified into a single format through normalization and categorization Correlate Real-time, cross-device correlation of events Collaborate Automate the process of event analysis, information sharing for IT GRC, IT security, and IT operations ApproachBenefit

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Assess Find security vulnerabilities in any type of software Assure Fix security flaws in source code before it ships Protect Fortify applications against attack in production Software security assurance Application assessment Application protection HP Fortify helps you protect your applications In-house Outsourced Commercial Open source

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Solutions for Cloud Deployments HP Arcsight SIEM ArcSight connectors On-premise data center HP Fortify App.Scanning HP TippingPoint vController SAAS Providers Private cloud HP ArcSight SIEM Off-premise data center HP Fortify App. Scanning HP TippingPoint vController Managed cloud Off-premise service provider Public cloud HP ArcSight SIEM HP Fortify App. Scanning HP TippingPoint vController

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Thank you