Download presentation
Presentation is loading. Please wait.
Published byMarjory Benson Modified over 9 years ago
1
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana Stepanova/ November 7 th, 2014
2
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Presentation HP Services Solution Architect More then 10 years in HP Strong technical background with onsite technical support as an engineer and Account Support Manager ITIL v3 Expert and Certified EXIN Instructor ISO/IEC 27001 Lead Auditor TOGAF 9 Certified HP, Microsoft product certifications
3
HP’s Approach to Information Security Security is in the top 5 IT Technology Priorities
4
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Challenges enterprises and governments are facing Nature and motivation of attacks (Fame to fortune, market adversary) 1 Research Infiltration Discovery Capture Exfiltration Transformation of enterprise IT (Delivery and consumption changes ) 2 Consumption Traditional DCPrivate cloudManaged cloudPublic cloud Virtual desktopsNotebooksTabletsSmart phones Delivery Regulatory pressures (Increasing cost and complexity) 3 Basel III
5
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Holistic security approach InformationSecurityServiceManagement (ISSM) Methodology Security is more than just technology and products People Determines if the right staff are performing the correct roles to oversee security Policy & Procedures Determines if the right set of policies and procedures are in place to govern the security and continuity Processes Determines if the proper security / continuity process models are in place to safeguard the transference of data between consumers and providers Products Determines if appropriate defense-in-depth technologies / solutions are in place to manage / mitigate risk Proof Determines if the correct validation methods, metrics, and / or Key Performance Indicators (KPIs) are used to track control effectiveness P1P1 P2P2 P3P3 P4P4 P5P5
6
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Disrupt the adversary, manage risk, and extend your capabilities HP Security Disrupt the adversary Security technology Reduce cost & complexity Advisory & management 5000+ Manage risk Risk & compliance
7
HP’s Security Services
8
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP’s security services AdviseTransformManage RoadmapOperate / EvolveImplementDesign Strategy Vulnerability Assessment HP and 3 rd party tools Network Security Design Security Products Implementation Service ArcSight TippingPoint Maturity Assessment HP P5 and CMM Penetration Testing HP and 3 rd Party Tools Audit ISO 27001, PCI DSS IS Strategy and architecture Define Security Controls HP and 3 rd party Risk Assessment HP P5 and CMM
9
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Next-Generation IPS Next-Generation Firewall Network Protector SDN Application Reputation Digital Vaccine Secure the perimeter and mobile worker Dynamic threat protection Secure the data and apps that matter Networking Create a security offering no other company can duplicate Our capabilities HP Security
10
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Converging network and security trends Network trends SLA requirements Network visibility Network complexity Security trends Emerging threats Scalability/managemen t Regulatory pressures Software Defined Networking (SDN) with HP Networking and HP Enterprise Security Products can solve networking and security challenges Pain pointsRequired solutions Changing infrastructure needs and network upgrades Flexible solutions that scale with changing customer requirements Evolving threats, increasing number of attack vectors and rising data breach costs High-performing solutions with high degree of security effectiveness and a low TCO New systems and applications deployed on the network Complete visibility to monitor network behavior and provide actionable security intelligence Mobile, BYOD and cloud trends adding network and security management complexity Easy-to-use management system that deploys updated policy configurations to all devices on the network Complicated management systems requiring overhead costs and dedicated resources Integrated application control, user behavior and IP monitoring through single management interface
11
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Log management, security information and event management (SIEM) A new approach: See everything with HP ArcSight Collect Collect logs from any device, any source, and in any format at high speed Consolidate Machine data is unified into a single format through normalization and categorization Correlate Real-time, cross-device correlation of events Collaborate Automate the process of event analysis, information sharing for IT GRC, IT security, and IT operations ApproachBenefit
12
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Assess Find security vulnerabilities in any type of software Assure Fix security flaws in source code before it ships Protect Fortify applications against attack in production Software security assurance Application assessment Application protection HP Fortify helps you protect your applications In-house Outsourced Commercial Open source
13
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Solutions for Cloud Deployments HP Arcsight SIEM ArcSight connectors On-premise data center HP Fortify App.Scanning HP TippingPoint vController SAAS Providers Private cloud HP ArcSight SIEM Off-premise data center HP Fortify App. Scanning HP TippingPoint vController Managed cloud Off-premise service provider Public cloud HP ArcSight SIEM HP Fortify App. Scanning HP TippingPoint vController
14
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.