1 / 14

HP Security Services

HP Security Services. Svetlana Stepanova/ November 7 th , 2014. Presentation. HP Services Solution Architect More then 10 years in HP Strong technical background with onsite technical support as an engineer and Account S upport M anager ITIL v3 Expert and Certified EXIN Instructor

Download Presentation

HP Security Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HP Security Services Svetlana Stepanova/ November 7th, 2014

  2. Presentation HP Services Solution Architect • More then 10 years in HP • Strong technical background with onsite technical support as an engineer and Account Support Manager • ITIL v3 Expert and Certified EXIN Instructor • ISO/IEC 27001 Lead Auditor • TOGAF 9 Certified • HP, Microsoft product certifications

  3. HP’s Approach to Information Security Security is in the top 5 IT Technology Priorities

  4. Challenges enterprises and governments are facing Infiltration Discovery Research Nature and motivation of attacks (Fame to fortune, market adversary) 1 Capture Exfiltration Delivery Transformation of enterprise IT (Delivery and consumption changes) 2 Traditional DC Private cloud Managed cloud Public cloud Consumption Virtual desktops Notebooks Tablets Smart phones Regulatory pressures (Increasing cost and complexity) 3 • Basel III

  5. HP Holistic security approach InformationSecurityServiceManagement (ISSM) Methodology Security is more than just technology and products People Determines if the right staff are performing the correct roles to oversee security Policy & Procedures Determines if the right set of policies and procedures are in place to govern the security and continuity Processes Determines if the proper security / continuity process models are in place to safeguard the transference of data between consumers and providers Products Determines if appropriate defense-in-depth technologies / solutions are in place to manage / mitigate risk Proof Determines if the correct validation methods, metrics, and / or Key Performance Indicators (KPIs) are used to track control effectiveness P1 P2 P3 P4 P5

  6. HP Security Disrupt the adversary, manage risk, and extend your capabilities 5000+ Disrupt the adversary Security technology Reduce cost & complexityAdvisory & management Manage riskRisk & compliance

  7. HP’s Security Services

  8. HP’s security services Advise Transform Manage Strategy Roadmap Design Implement Operate / Evolve IS Strategy and architecture Audit ISO 27001, PCI DSS Network Security Design Security Products Implementation Service ArcSight TippingPoint Penetration Testing HP and 3rd Party Tools Vulnerability Assessment HP and 3rd party tools Define Security Controls HP and 3rd party Risk Assessment HP P5 and CMM Maturity Assessment HP P5 and CMM

  9. Our capabilities Create a security offering no other company can duplicate Networking Secure the data and apps that matter Next-Generation IPS HP Security Secure the perimeter and mobile worker Next-Generation Firewall Network Protector SDN Application Reputation Digital Vaccine Dynamic threat protection

  10. Converging network and security trends • Network trends • SLA requirements • Network visibility • Network complexity • Security trends • Emerging threats • Scalability/management • Regulatory pressures Software Defined Networking (SDN) with HP Networking and HP Enterprise Security Products can solve networking and security challenges

  11. A new approach: See everything with HP ArcSight Log management, security information and event management (SIEM) Approach Benefit Collect Collect logs from any device, any source, and in any format at high speed Machine data is unified into a single format through normalization and categorization Consolidate Correlate Real-time, cross-device correlation of events Automate the process of event analysis, information sharing for IT GRC, IT security, and IT operations Collaborate

  12. HP Fortify helps you protect your applications In-house Outsourced Commercial Open source Application assessment Software security assurance Application protection Assure Fix security flaws in source code before it ships Protect Fortify applications against attack in production Assess Find security vulnerabilities in any type of software

  13. HP Security Solutions for Cloud Deployments Off-premise service provider On-premise data center SAASProviders HP Arcsight SIEM HP Fortify App. Scanning HP TippingPoint vController HP ArcSight SIEM HP TippingPoint vController HP Fortify App.Scanning Off-premise data center HP Fortify App. Scanning HP TippingPoint vController HP ArcSight SIEM ArcSight connectors Public cloud Private cloud Managed cloud

  14. Thank you

More Related