SlideShare a Scribd company logo
HP Enterprise Security




Aarij M Khan
Director of Product Marketing
HP Enterprise Security Products

©2011 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice
The Problem
Mega trends
                   Evolving Business
                        Models


     Technology
    Advancements



                      Changing
                      Workforce
3
IT architectures are evolving rapidly….

    Users             Users                 Users              Users

  Application        Application          Application         Application

  Platform            Platform

    O/S                O/S

  Network
                                                               Mobile
   Physical           IaaS                  PaaS
                                                              Backend


                New architecture create security challenges     Transparent
                                                                Abstracted
                Security protection must focus on users and
                applications
Cyber crime is increasing…
Threat and risks are expanding in frequency and intensity
And traditional security solutions are falling short!
     Technology                                                Information
    Application Scanning                                                 End Point
    Firewall                                                           Applications
    IPS                                                          Network Scanners
    SIEM                                                               Compliance
    Anti-X                                                                    User
    Web                                                              IT Operations

                            Traditional Solutions         Bolted On
                                                Architecture-Specific
                                                         Lacking Automation
                                      Bolted On              Limited Context
                                 Architecture-Specific
                                 Lacking Automation
                                   Limited Context


         Multiple Technologies    Lots of Information      No Intelligence
SECURITY IS A MAJOR CIO CHALLENGE
Attack surface has grown as control & visibility have declined


                                         26% more pressing than closest
                                         challenge for cloud adoption




7 © Copyright 2011 Hewlett-Packard Development Company, L.P.
  The information contained herein is subject to change without notice.
The Solution
HP Business Risk Management Strategy
    Using Security Intelligence Platform
                                         Business
                                Risk management & compliance

                         Security                           IT




                                                                               Mobile
                            Users          Rollup to       Users
                                           security
                                         intelligence
                         Applications                   Applications




                                                                         Virtual
             Unify the
             security       Data                           Data
              layers
                                         Integrate        Systems
                           Systems




                                                                       Cloud
                                        Security & IT
                                        management
                          Networks                       Networks

9
HP Enterprise Security
•       1,500 security professionals from ArcSight, Fortify and TippingPoint teams
•       1,500 security professionals in HP Enterprise Security Services
•       Top five security company by market share (leader in SIEM, Log Mgt, AppSec, Network Security)
Magic Quadrant for Network Intrusion                                                 Magic Quadrant for Static and Dynamic                                                Magic Quadrant for Security Information
Prevention Systems                                                                   Application Security Testing                                                         and Event Management
December 2010.                                                                       December 2010 and December 2011.                                                     May 2011.




                                                  =HP




    The Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from HP.
HP has the only security intelligence
platform that gives clients the insight to proactively
manage their specific enterprise threats and risks.
HP Security Intelligence Platform
  The only security intelligence platform that gives clients the insight to proactively manage
  their specific enterprise security threats and risks

                                                                                        Establish complete visibility
                                         Security Intelligence Platform
                                               IT PERFORMANCE SUITE                     across all applications and
                                                                                        systems
                                                   Information
                                                            Information
Contextual Information                                                                  Analyze vulnerabilities in
                                                                                        applications and operations
   Complete Visibility                                                                  to understand risk
  Research-Backed                                                                       Respond adaptively to
                                                                                        build defenses against the
Automated, Proactive &
      Adaptive
                                               Operations                 Application   exploitation of vulnerabilities
                                                                                        Measure security effectiveness
         Hybrid
 (Physical/Virtual/Cloud)                                                               and risk across people, process,
                                                                                        and technology to improve over
                                                                                        time
                                                ENTERPRISE SECURITY SERVICES
  12   Enterprise Security – HP Confidential
ESP Security Solutions

Universal Log    Regulatory         Proactive          Insider Threat
Management       Compliance         Network Security   Intelligence




      Advanced Threat   Privacy Breach   Data Leakage        Application
      Intelligence      Intelligence     Monitoring          Security
The Product Solutions




Enterprise Security – HP Confidential
  14
INDUSTRY LEADING HP SECURITY SOLUTIONS
   Magic Quadrant for Network                                                      Magic Quadrant for Static                                            Magic Quadrant for Security
   Intrusion Prevention Systems                                                    Application Security Testing                                         Information and Event Management
   6 December 2010.                                                                13 December 2010.                                                    13 May 2011.




                                                =HP




  The Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from HP.
1
  © Copyright 2011 Hewlett-Packard Development Company, L.P.
5
  The information contained herein is subject to change without notice.
Information

  HP ArcSight Solution Architecture
  A comprehensive platform for monitoring modern threats and risks, augmented by
  services expertise and the most advanced security user community, Protect724



Establish complete visibility                                        Event
                                                                   Correlation
Analyze events in real time to deliver insight
                                                        User                      Controls
Respond quickly to prevent loss                       Monitoring                 Monitoring
                                                                     Data
                                                                    Capture
Measure security effectiveness across                  Fraud                       App
people, process, and technology to improve            Monitoring                 Monitoring
over time
                                                                      Log
                                                                   Management
HP TippingPoint Network Defense System
                                                                                    Operations   Applications
A complete set of security solutions that address today's advanced security
threats at the perimeter and core of your business.


 Scalable Infrastructure to address
 current and future security deployment              Next Gen IPS             Next Gen Firewall
 models (NG IPS/FW)

 Dynamic Analytics and policy                                         Net
                                                                    Network
                                                                    Defense
 deployment with real time (NG Mgmt)                                 System
                                                                      wrk
 Predictive Intelligence to proactively
 address current and future threat activity            DVLabs
                                                                              Next Gen Mgmt
 (DV Labs)                                             Research
HP Fortify Software Security Center
                                                                                                   Applications
Identifies and eliminates risk in existing applications and prevents the introduction
of risk during application development, in-house or from vendors.


                                                           Protects business critical applications from
                                                           advanced cyber attacks by removing security
                                                           vulnerabilities from software
                              In-house        Outsourced   Accelerates time-to-value for achieving secure
                                                           applications
                                                           Increases development productivity by enabling
                                                           security to be built into software, rather than
                                                           added on after it is deployed
                                                           Delivers risk intelligence from application
                                                           development to improve operational security
                                Commercial   Open source


   Enterprise Security – HP Confidential
A real world example: RSA




Enterprise Security – HP Confidential
  19
What happened in the RSA breach?

 Finance person receives      Opens to see 2012 Recruitment            RAT program installed utilizing
       a junk email                 plan with .xls file                  Adobe Flash vulnerability




         NMAP scan of network to
        collect sensitive information                 Poison Ivy malware is initiated




       Collect data over a               Split file, encrypt, ftp to
                                                                                RSA is in the headlines
         period of time                    good.mincesur.com
What if RSA was using HP ESP solutions?

1                                           2                                          3

      Finance person receives
     Security model is broken with       Use HP TippingPoint Recruitment
                                          Opens to see 2012 solutions to             UseRAT program installed to eliminate
                                                                                         HP Fortify solutions utilizing
    bolted on a junk email
              security at every layer    block traffic from malicious senders
                                                   plan with .xls file                     Adobe Flash vulnerability
                                                                                         vulnerabilities in applications




      5                                                          4
          Use HP ArcSightof network to
                NMAP scan solutions to correlate                   Use HP TippingPoint solutions to block
          roles and responsibilities against tasks
              collect sensitive information                          malicious Ivy malware is initiated
                                                                      Poison payload at the perimeter




      6    Use HP ArcSight solutions to monitor
              Collect data over a and             7 Use HP TippingPoint HPblock traffic to
                                                                          to
                                                          Split file, encrypt, ftp to to     8   Effective Enterprise
               your users, applications,            malicious domain and     ArcSight            RSA is in the headlines
                                                                                                    Security!
                 period of time
                      infrastructure                correlate good.mincesur.com access
                                                              login/logout with network
Intelligent ESP Integrations




Enterprise Security – HP Confidential
  22
Secure Application Lifecycle Management
    Fortify intelligence integrated with HP ALM and HP Quality Center
•   Software Security Center or WebInspect submits
    security vulnerabilities to HP Application Life Cycle
    Management (ALM) or HP Quality Center as defects

•   Security Vulnerabilities can then be managed as
    software defects by development teams

•   Software Security Center remains the system of
    record for security vulnerabilities
    –   Enables development teams to manage security
        vulnerabilities just like any other defect
    –   Formalizes workflow for addressing security
        vulnerabilities
    –   Improves security assurance for applications
Reputation Security Monitor
 Identify bots and quarantine devices for remediation
                                                   ThreatLinQ



                                    RepDV   LightHouse Events Filters   Malware Analysis
1) Connection activity is                                 Updates to ESM via ThreatLinQ
   reported by FW. ESM
   correlates coms to C&C                                                                  3) SMS sends action set to IPS.
   via RepDV to internal       1                                                              Endpoints are now blocked and
   private IP and user ID’s                                                                   quarantined for remediation
                                                   2) ESM instructs SMS to quarantine
                                                      internal endpoints for remediation
                                                                    2                                                 Policy Mgmt
                                                                                                                      (SMS)

                                                                                                       3              3
                                      1
                                                      4



                                                     4) Identity based reporting
                                                                                                 IPS                 IPS
                                                        provides visibility to endpoint
                 Correlation Zone                       infection by dept/groups                       Enforcement Zone
Adaptive Web Application Firewall (WAF) Technology
Adaptive technology to protect web applications                        HP WebInspect Scan    1


•   What it is
                                                                              Internet
    –   Advanced web application scanning to uncover                                                                3
        vulnerabilities combined with adaptive IPS response
    –   WebInspect information passed to WebAppDV to auto-              SSL


        generate IPS filters for virtual vulnerability patch                                  4
                                                                        IPS

•   Benefits                                                                                                    2
    –   Protection for custom and commercial web applications                                    Vulnerability Report
    –   Inspection of encrypted and non-encrypted traffic (ideal for
        web commerce apps)
    –   Elimination of tuning required by legacy WAFs

                                                                         Vulnerability Page and Parameter
Why HP Enterprise Security Products
•        Industry-leading, automated security solutions and visibility
     –   ArcSight, Fortify, TippingPoint all MQ Leaders/Best in Class
     –   Security intelligence delivered in context
     –   Trusted, proactive and automated action
     –   Cloud-ready

•        Worlds best research for security intelligence and risk management
     –   Best in class application security and network security research
     –   Discovers more vulnerabilities than the rest of the market combined

•        Integrated with leading IT operations solutions
     –   Universal Log Management tied to Systems Event Management
     –   Enhanced asset and threat modeling
     –   A key component of the HP IT Performance Suite

27
THANK YOU




Enterprise Security – HP Confidential
  28

More Related Content

PPT
Ibm security overview 2012 jan-18 sellers deck
PPTX
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
PDF
VSD Infotech
PPT
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
PDF
Symantec Enterprise Mobility - Mobile World Congress February 2012
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PDF
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
PDF
Security brochure 2012_ibm_v1_a4
Ibm security overview 2012 jan-18 sellers deck
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
VSD Infotech
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Symantec Enterprise Mobility - Mobile World Congress February 2012
Sådan undgår du misbrug af kundedata og fortrolig information
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Security brochure 2012_ibm_v1_a4

What's hot (19)

PDF
Csirs Trabsport Security September 2011 V 3.6
PPTX
Trend Micro - 13martie2012
PDF
Introduction - Trend Micro Deep Security
PDF
Security Intelligence
PDF
Outlook emerging security_technology_trends
PDF
Trend Micro Dec 6 Toronto VMUG
PPT
Trend micro real time threat management press presentation
PPT
Microsoft Forefront - Secure Endpoint Solution Presentation
PDF
IBM per la sicurezza del Datacenter
PDF
International approaches to critical information infrastructure protection ...
PDF
Bi cloud saa_s
PDF
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
PDF
Trend Micro - Virtualization and Security Compliance
PDF
Security In A Hybrid MAM and MDM World
PPTX
Complete Security with Sophos and Softchoice
PDF
Regulatory Compliance Financial Institution
PDF
DFlabs corporate profile 01-2013
PDF
eircom Managed Security
Csirs Trabsport Security September 2011 V 3.6
Trend Micro - 13martie2012
Introduction - Trend Micro Deep Security
Security Intelligence
Outlook emerging security_technology_trends
Trend Micro Dec 6 Toronto VMUG
Trend micro real time threat management press presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
IBM per la sicurezza del Datacenter
International approaches to critical information infrastructure protection ...
Bi cloud saa_s
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Trend Micro - Virtualization and Security Compliance
Security In A Hybrid MAM and MDM World
Complete Security with Sophos and Softchoice
Regulatory Compliance Financial Institution
DFlabs corporate profile 01-2013
eircom Managed Security
Ad

Viewers also liked (12)

PPT
IBM Rational AppScan Product Overview
PPT
IBM Rational AppScan Technical Overview
PDF
HP Enterprise Software: Making your applications and information work for you
POTX
Agile Linguistic QA, by Vince He, HP Enterprise
PPTX
Hewlett Packard Entreprise | Stormrunner load | Game Changer
PDF
HP Helion OpenStack step by step
PPTX
Hp fortify source code analyzer(sca)
PDF
Hewlett Packard Enterprise (HPE) Service Virtualization (SV)
PPTX
HPE Agile Manager and ALM Overview
PPTX
Application Performance Management 9.30 HPE whats new | 360 View
PPTX
IoT Platform Meetup - HP Enterprise
PPTX
IBM Rational AppScan Product Overview
IBM Rational AppScan Technical Overview
HP Enterprise Software: Making your applications and information work for you
Agile Linguistic QA, by Vince He, HP Enterprise
Hewlett Packard Entreprise | Stormrunner load | Game Changer
HP Helion OpenStack step by step
Hp fortify source code analyzer(sca)
Hewlett Packard Enterprise (HPE) Service Virtualization (SV)
HPE Agile Manager and ALM Overview
Application Performance Management 9.30 HPE whats new | 360 View
IoT Platform Meetup - HP Enterprise
Ad

Similar to Day 3 p2 - security (20)

PDF
Ibm rational day-france_what's next
PDF
Nebezpecny Internet Novejsi Verze
PDF
Security Patterns How To Make Security Arch Easy To Consume
PPT
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PDF
INFOSEC LANDSCAPE AND RESEARCH TRENDS
PPT
Unleash Business Innovation with the Next Generation of Cloud Computing
PPTX
IBM Software Day 2013. Turning opportunities into outcomes
PPTX
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
PPT
What is behind the cloud
PDF
The Cloud according to VMware
PDF
Sccm 2012 overview - chris_estonina
PDF
Qradar ibm partner_enablement_220212_final
PDF
Cloud Security - Made simple
PDF
Intel Cloud Summit: Greg Brown McAfee
PDF
Axxera Security Solutions
PPT
Asigra Product Marketing Strategy
PDF
Strategy Cloud and Security as a Service
PDF
Enterprise Security Architecture: From access to audit
PPT
Jeffrey Nick
PDF
My PC Mistook Me For A Hat
Ibm rational day-france_what's next
Nebezpecny Internet Novejsi Verze
Security Patterns How To Make Security Arch Easy To Consume
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
INFOSEC LANDSCAPE AND RESEARCH TRENDS
Unleash Business Innovation with the Next Generation of Cloud Computing
IBM Software Day 2013. Turning opportunities into outcomes
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
What is behind the cloud
The Cloud according to VMware
Sccm 2012 overview - chris_estonina
Qradar ibm partner_enablement_220212_final
Cloud Security - Made simple
Intel Cloud Summit: Greg Brown McAfee
Axxera Security Solutions
Asigra Product Marketing Strategy
Strategy Cloud and Security as a Service
Enterprise Security Architecture: From access to audit
Jeffrey Nick
My PC Mistook Me For A Hat

More from Lilian Schaffer (20)

PDF
Collaborative Defence
PDF
3rd day hp it
PDF
3rd day big data
PDF
3rd day itsm
PDF
1st day 1 - hp and hp s oftware overview
PDF
1st day 3 - agility vs risk
PDF
1st day 4 - financial services & insurance technology trends and challenges
PDF
2nd day 1 - alm overview
PDF
1st day 2 - blueprint
PDF
2nd day 2 - bsm overview
PDF
Hplabs overviewnn
PDF
Project and portfolio management
PDF
Dev ops intro
PDF
It performance suite_overview_ebc_11062012
PDF
Hp software strategy
PDF
Day 3 P5 Hp Art
PDF
Day 3 p5 - hp art
PDF
Day 1 p1 time of remarkable change
PDF
Day 1 p3 - project and portfolio management
PDF
Day 1 p4 - application lifecycle management
Collaborative Defence
3rd day hp it
3rd day big data
3rd day itsm
1st day 1 - hp and hp s oftware overview
1st day 3 - agility vs risk
1st day 4 - financial services & insurance technology trends and challenges
2nd day 1 - alm overview
1st day 2 - blueprint
2nd day 2 - bsm overview
Hplabs overviewnn
Project and portfolio management
Dev ops intro
It performance suite_overview_ebc_11062012
Hp software strategy
Day 3 P5 Hp Art
Day 3 p5 - hp art
Day 1 p1 time of remarkable change
Day 1 p3 - project and portfolio management
Day 1 p4 - application lifecycle management

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Modernizing your data center with Dell and AMD
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
GamePlan Trading System Review: Professional Trader's Honest Take
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
20250228 LYD VKU AI Blended-Learning.pptx
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced Soft Computing BINUS July 2025.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Monthly Chronicles - July 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto

Day 3 p2 - security

  • 1. HP Enterprise Security Aarij M Khan Director of Product Marketing HP Enterprise Security Products ©2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
  • 3. Mega trends Evolving Business Models Technology Advancements Changing Workforce 3
  • 4. IT architectures are evolving rapidly…. Users Users Users Users Application Application Application Application Platform Platform O/S O/S Network Mobile Physical IaaS PaaS Backend New architecture create security challenges Transparent Abstracted Security protection must focus on users and applications
  • 5. Cyber crime is increasing… Threat and risks are expanding in frequency and intensity
  • 6. And traditional security solutions are falling short! Technology Information Application Scanning End Point Firewall Applications IPS Network Scanners SIEM Compliance Anti-X User Web IT Operations Traditional Solutions Bolted On Architecture-Specific Lacking Automation Bolted On Limited Context Architecture-Specific Lacking Automation Limited Context Multiple Technologies Lots of Information No Intelligence
  • 7. SECURITY IS A MAJOR CIO CHALLENGE Attack surface has grown as control & visibility have declined 26% more pressing than closest challenge for cloud adoption 7 © Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 9. HP Business Risk Management Strategy Using Security Intelligence Platform Business Risk management & compliance Security IT Mobile Users Rollup to Users security intelligence Applications Applications Virtual Unify the security Data Data layers Integrate Systems Systems Cloud Security & IT management Networks Networks 9
  • 10. HP Enterprise Security • 1,500 security professionals from ArcSight, Fortify and TippingPoint teams • 1,500 security professionals in HP Enterprise Security Services • Top five security company by market share (leader in SIEM, Log Mgt, AppSec, Network Security) Magic Quadrant for Network Intrusion Magic Quadrant for Static and Dynamic Magic Quadrant for Security Information Prevention Systems Application Security Testing and Event Management December 2010. December 2010 and December 2011. May 2011. =HP The Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from HP.
  • 11. HP has the only security intelligence platform that gives clients the insight to proactively manage their specific enterprise threats and risks.
  • 12. HP Security Intelligence Platform The only security intelligence platform that gives clients the insight to proactively manage their specific enterprise security threats and risks Establish complete visibility Security Intelligence Platform IT PERFORMANCE SUITE across all applications and systems Information Information Contextual Information Analyze vulnerabilities in applications and operations Complete Visibility to understand risk Research-Backed Respond adaptively to build defenses against the Automated, Proactive & Adaptive Operations Application exploitation of vulnerabilities Measure security effectiveness Hybrid (Physical/Virtual/Cloud) and risk across people, process, and technology to improve over time ENTERPRISE SECURITY SERVICES 12 Enterprise Security – HP Confidential
  • 13. ESP Security Solutions Universal Log Regulatory Proactive Insider Threat Management Compliance Network Security Intelligence Advanced Threat Privacy Breach Data Leakage Application Intelligence Intelligence Monitoring Security
  • 14. The Product Solutions Enterprise Security – HP Confidential 14
  • 15. INDUSTRY LEADING HP SECURITY SOLUTIONS Magic Quadrant for Network Magic Quadrant for Static Magic Quadrant for Security Intrusion Prevention Systems Application Security Testing Information and Event Management 6 December 2010. 13 December 2010. 13 May 2011. =HP The Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from HP. 1 © Copyright 2011 Hewlett-Packard Development Company, L.P. 5 The information contained herein is subject to change without notice.
  • 16. Information HP ArcSight Solution Architecture A comprehensive platform for monitoring modern threats and risks, augmented by services expertise and the most advanced security user community, Protect724 Establish complete visibility Event Correlation Analyze events in real time to deliver insight User Controls Respond quickly to prevent loss Monitoring Monitoring Data Capture Measure security effectiveness across Fraud App people, process, and technology to improve Monitoring Monitoring over time Log Management
  • 17. HP TippingPoint Network Defense System Operations Applications A complete set of security solutions that address today's advanced security threats at the perimeter and core of your business. Scalable Infrastructure to address current and future security deployment Next Gen IPS Next Gen Firewall models (NG IPS/FW) Dynamic Analytics and policy Net Network Defense deployment with real time (NG Mgmt) System wrk Predictive Intelligence to proactively address current and future threat activity DVLabs Next Gen Mgmt (DV Labs) Research
  • 18. HP Fortify Software Security Center Applications Identifies and eliminates risk in existing applications and prevents the introduction of risk during application development, in-house or from vendors. Protects business critical applications from advanced cyber attacks by removing security vulnerabilities from software In-house Outsourced Accelerates time-to-value for achieving secure applications Increases development productivity by enabling security to be built into software, rather than added on after it is deployed Delivers risk intelligence from application development to improve operational security Commercial Open source Enterprise Security – HP Confidential
  • 19. A real world example: RSA Enterprise Security – HP Confidential 19
  • 20. What happened in the RSA breach? Finance person receives Opens to see 2012 Recruitment RAT program installed utilizing a junk email plan with .xls file Adobe Flash vulnerability NMAP scan of network to collect sensitive information Poison Ivy malware is initiated Collect data over a Split file, encrypt, ftp to RSA is in the headlines period of time good.mincesur.com
  • 21. What if RSA was using HP ESP solutions? 1 2 3 Finance person receives Security model is broken with Use HP TippingPoint Recruitment Opens to see 2012 solutions to UseRAT program installed to eliminate HP Fortify solutions utilizing bolted on a junk email security at every layer block traffic from malicious senders plan with .xls file Adobe Flash vulnerability vulnerabilities in applications 5 4 Use HP ArcSightof network to NMAP scan solutions to correlate Use HP TippingPoint solutions to block roles and responsibilities against tasks collect sensitive information malicious Ivy malware is initiated Poison payload at the perimeter 6 Use HP ArcSight solutions to monitor Collect data over a and 7 Use HP TippingPoint HPblock traffic to to Split file, encrypt, ftp to to 8 Effective Enterprise your users, applications, malicious domain and ArcSight RSA is in the headlines Security! period of time infrastructure correlate good.mincesur.com access login/logout with network
  • 22. Intelligent ESP Integrations Enterprise Security – HP Confidential 22
  • 23. Secure Application Lifecycle Management Fortify intelligence integrated with HP ALM and HP Quality Center • Software Security Center or WebInspect submits security vulnerabilities to HP Application Life Cycle Management (ALM) or HP Quality Center as defects • Security Vulnerabilities can then be managed as software defects by development teams • Software Security Center remains the system of record for security vulnerabilities – Enables development teams to manage security vulnerabilities just like any other defect – Formalizes workflow for addressing security vulnerabilities – Improves security assurance for applications
  • 24. Reputation Security Monitor Identify bots and quarantine devices for remediation ThreatLinQ RepDV LightHouse Events Filters Malware Analysis 1) Connection activity is Updates to ESM via ThreatLinQ reported by FW. ESM correlates coms to C&C 3) SMS sends action set to IPS. via RepDV to internal 1 Endpoints are now blocked and private IP and user ID’s quarantined for remediation 2) ESM instructs SMS to quarantine internal endpoints for remediation 2 Policy Mgmt (SMS) 3 3 1 4 4) Identity based reporting IPS IPS provides visibility to endpoint Correlation Zone infection by dept/groups Enforcement Zone
  • 25. Adaptive Web Application Firewall (WAF) Technology Adaptive technology to protect web applications HP WebInspect Scan 1 • What it is Internet – Advanced web application scanning to uncover 3 vulnerabilities combined with adaptive IPS response – WebInspect information passed to WebAppDV to auto- SSL generate IPS filters for virtual vulnerability patch 4 IPS • Benefits 2 – Protection for custom and commercial web applications Vulnerability Report – Inspection of encrypted and non-encrypted traffic (ideal for web commerce apps) – Elimination of tuning required by legacy WAFs Vulnerability Page and Parameter
  • 26. Why HP Enterprise Security Products • Industry-leading, automated security solutions and visibility – ArcSight, Fortify, TippingPoint all MQ Leaders/Best in Class – Security intelligence delivered in context – Trusted, proactive and automated action – Cloud-ready • Worlds best research for security intelligence and risk management – Best in class application security and network security research – Discovers more vulnerabilities than the rest of the market combined • Integrated with leading IT operations solutions – Universal Log Management tied to Systems Event Management – Enhanced asset and threat modeling – A key component of the HP IT Performance Suite 27
  • 27. THANK YOU Enterprise Security – HP Confidential 28