HP Enterprise Security Products - Licencias OnLine

Transcription

HP Enterprise SecurityProductsThinking like a Cyber CriminalRamon SierraDistribution PBM Latin America Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Security SolutionsPortfolio Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Fases de un ataqueResearchInfiltrationAdvanced Persistent ThreatsDiscoverDenial of service attacksTheirecosystemOurenterpriseCaptureWeb hackingExfiltration Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Executive order leads Sony drops PSN breachappeal after risk assessment D'OH! Use Tumblrto 'build it right'on iPhone or 1security guidelinesgive yourdata breach, cites confidentiality of network securityPaul Christman, Special for CyberTruth10:38 a.m. EDT July 10, 2013Every day, the federal government is faced withthe task of protecting vital data and assets forour nation's security. The need for a strongcybersecurity framework and resilient protectionagainst attacks was amplified in 2012, whenfederal agencies reported nearly 50,000incidents of cyber attacks.as reason for walking away from appealBy Steve Ragan, Staff WriterJuly 15, 20132013Tumblr's iOS app fails to log users inthrough a secure (SSL) server, it hasemerged. As a result users' plaintextpasswords are exposed to anyoneable to sniff traffic on any Wi-Finetwork an iOS user happens to useMathew J. Schwartzto connectEdwardto the popularThumb drives helped NSA whistle-blowercats'n'grumbleSnowden transport top-secret data from the free-content platform.agency.If the NSA can't keep a lid on thumb drives, canyou?Thumb Drive Security:Snowden 1, NSA 0In Hours, Thieves Took 45 Million in A.T.M. Scheme Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.password to theWORLD By John Leyden, July

Cómo proteger a la organizaciónEducate users / usecounterintelligenceResearchBlock adversaryInfiltrationaccessFind Discoverand apturethe importantasset Plan to mitigateExfiltrationdamage Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

“If you know the enemy andknow yourself, you need notfear the result of a hundredbattles.” —Sun Tzu, The Art of War

HACKTIVIST Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP Security ResearchEcosystemPartnerHP Global ResearchESS SANS, CERT, NIST, OSVDB, software & reputation vendors 2650 Researchers 2000 Customers sharing data www.hp.com/go/HPSRblog 6X the Zero Days than the next 10 competitors combined. Top security vulnerability research organization for the past threeyears—Frost & Sullivan HP Security Research Teams: DV Labs, ArcSight, Fortify,HPLabs, Application Security Center and Enterprise SecurityServices Collect network and security data from around the globeFSRG Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP TippingPoint protects users, apps and data with marketleading network re and installwith centralizedmanagementIndustry leadingsecurity intelligencewith weekly DVLabsupdatesNGIPS with99.99999%network uptimetrack record Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Heartbleed vulnerability protection on Day 1 Every second matters! OpenSSL Vulnerability affecting 2/3of the world’s web servers HP TippingPoint customers areprotected on Day 1 via Digital Vaccine Virtual patch stops attack and theft ofcritical customer information Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

84%of breaches occur at theapplication layer9/10 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.mobile applications arevulnerable to attack

HP Fortify helps you protect your applicationsIn-houseOutsourcedCommercialOpen sourceApplicationassessmentSoftwaresecurity ix security flaws in sourcecode before it shipsFortify applications againstattack in productionFind securityvulnerabilities in any typeof software Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

How you see our worldGet sales dataGet the usernameGet the passwordEdit my accountRemember the userGenerate reports Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

How an attacker sees our worldInsufficient data storageSQL injectionData leakageCross site scriptingSensitive information disclosureImproper session handlingWeak server side controlsClient side injection Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP Fortify named leader in Gartner AST MQ2014 Gartner Magic Quadrant for Application Security Testing Once again, Gartner not only acknowledgedFortify’s years of successful marketexecution but also called out several areas inwhich HP is leading in delivering on newtechnologies to stay ahead of the bad guys. Strengths: · Comprehensive SAST capabilities - the mostbroadly adopted SAST tool in the market. · Evolved AST to address iOS and Android mobileapps. · Innovative IAST capabilities · Early innovator with runtime application selfprotection (RASP) technology. Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

SAPEnterprise software Client outcome Significantly enhanced the security of SAPsoftware, with increased number of securitypatches since 2010 Met board requirements for product security Protected revenue-generating applicationsand customer reputation Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

229daysaverage time to detect2013 January February March April May June July August SeptemberOctober November December 2014 January FebruarybreachMarch April Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP ArcSight, act with laser clarity against threats thatmatterCollectTransform Big Datainto actionable securityintelligenceAnalyzeReal-time correlation ofdata across devices tofind threats Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.PrioritizeCyber forensics, fixwhat matters most first

Machine data is everywhereLogsEventsflowsLogs/ events/ flowsStructured/ rawUsers/ employee dataAppPPApplicationsCloudDevices/ NetworkVirtualMobile devicesPhysical Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Problem with the current approachStale technologiesTrade off86%IT frustrationLack ofscalability Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.of corporations cannotdeliver the right³Source: Coleman Parkes Surveyinformation, at the righttime³

Customers are generating lots of avelPlex eDCCPingMeeBayDragonDictionProductSAPGoGrid LinkedInReferenceConfiguratorCCCHosting.comUPS Mobile Bromium AtlassianCRMHPTata CommunicationsbuzzdBills of MaterialLifestyleEngineeringAmazon Web toryScanner Pro LimeLightNetDocuments ZohoQuality quareTaleoHCMQvidianDatapipeEducation PinterestHitachiHylandCost ManagementOpenTextIBMMRMSage NetSuiteUnisysManufacturing ProjectsWorkscapeOrder EntryiHandyMainframeClient/serverMobile, social,big data & the cloudThe InternetCash dexBaiduERPHCMGamesHootsuiteYahoo!XeroxYouTubeTime and ExpensenebulaSerifMicrosoftAtlassianHP ePrintAccounts Fixed ScheduleElemicaADP VirtualEdgeYandexPayrollPhoto & VideoActivityPLMSCMTwitterKhan eCyberShiftAdobeSales tracking &RenrenSuccessFactors Entertainment ViberYahooTime AtlassianAttendanceSugarCRMServiceSabaSocial Sonar6CYworldQuadremData WarehousingMobileFrame.comClaim ProcessingKenexaSonar6Jive peTumblr.IntacctToggldotCloudFringAmazonExact OnlineCornerstone onDemandMozyCookie Doodle XingNewRelicSoftscape FinancialForce.comMailChimpPingMeUtilities ZyngaAh! Fasion ullNECFijitsuSmugMugRackspaceMobilieIronFlickrFed Ex MobileProductivityTwitterPaint.NETTripIt Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.23,148 appsdownloaded400,710 adrequestsEvery60 seconds2000 lyrics playedon Tunewiki1500 pingssent on PingMe34,597 peopleusing Zinio208,333 minutes ofAngry Birds played New technology More Data to manage -big data creates businessvalue -uncover unseen patterns -develop sharper insights

HP ArcSight named leader in Gartner SIEM MQ 2013 HP ArcSight named a leader in the GartnerMagic Quadrant for Security Information andEvent Management (SIEM), 10 years in a row. The most visionary product in the GartnerSIEM MQ Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP Atalla helps you secure your sensitive informationPaymentssecurityCloud and DataSecurityInformationProtection & ControlSecure payments andtransacting systemsEncrypt and protect keysand data in public, hybrid,and private cloudsEmbed security at thepoint of creation forsensitive enterprise data Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

130Since 2009, time to resolve an attack has grown% Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP Enterprise SecuritySecurityPerformance SuiteHP GlobalResearchDV-LabsFSRG HP-LabsESSProfessional Services, Support, Education and Global Partners. Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.32

HP SecurityDisrupt the adversary, manage risk, and extend your capabilities5000 Disrupt theadversarySecurity technologyManage riskRisk & compliance Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.Reduce cost &complexityAdvisory &management

HP Security’s industry-leading scale9 out of 1010 out of 10Major banksTop telecoms5000 HP Security ProfessionalsUS Department of DefenseAll major branches8SecurityOperationsTop software companies Centers9 out of 10900 HP managed security customers23bnMonthly security events Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.47mHP Secured User Accounts

Thank You

which HP is leading in delivering on new technologies to stay ahead of the bad guys. Strengths: · Comprehensive SAST capabilities -the most . Heroku RightScale New Relic CloudSigma cloudability nebula Zillabyte dotCloud BeyondCore Mozy Viber Fring Toggl MailChimp Hootsuite Fed Ex Mobile DocuSign HP ePrint iSchedule Khan Academy