+ All Categories
Home > Technology > Download It

Download It

Date post: 19-May-2015
Category:
Upload: jackie72
View: 1,033 times
Download: 2 times
Share this document with a friend
Popular Tags:
18
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP Security solutions, Securing your Adaptive Enterprise Speaker: Jim Fiannaca Date: 11/10/04
Transcript
Page 1: Download It

© 2004 Hewlett-Packard Development Company, L.P.The information contained herein is subject to change without notice

HP Security solutions,Securing your Adaptive Enterprise

Speaker: Jim FiannacaDate: 11/10/04

Page 2: Download It

Agenda

• Key security issues facing today’s enterprises

• Security trends and HP’s approach to security solutions

• HP Security solutions

Page 3: Download It

Today’s business challenges require IT to adapt

Ability to adapt quickly

Business challenges• Improve business

performance, quality and ROI, while reducing costs

• Minimize risk associated with change

• Drive new business models and direction

• Shorten time-to-market

• Enable mergers, acquisitions and divestitures

IT imperatives

• Link business and IT• Reduce costs,

ensure stability and flexibility

• Reduce complexity• Optimize assets

today and tomorrow

• Extend value and reach of the enterprise

Increased volume of change

An adaptive infrastructure is one that can quickly respond to and capitalize on change for business advantage

Page 4: Download It

Your business demands security• "Help me keep my business going in light of all

these threats!” • Financial regulations require tighter access control

to data and applications, better audit trails• Consumers, governments, and employees demand

more privacy and better confidentiality• More dynamic business environment requires more

dynamic, and more adaptive security measures

HP Security solutions enable business agility

Page 5: Download It

Why is security important to the adaptive enterprise? Consider the cost of downtime

Other expenses•Temporary employees•Equipment rental

Productivity • Number employees impacted x hours out x burdened hours =

Revenue • Direct loss• Compensatory payment• Lost future revenues• Billing losses• Investment losses

Know your downtime cost: Per hour, per day, over 2 days…

Financial performance

• Revenue recognition• Cash flow• Lost discounts (A/P)• Payment guarantees• Credit rating• Stock price

Damaged reputation • Customers• Suppliers• Financial markets• Banks• Business partners

•Overtime & travel costs•Extra shipping

expenses

Page 6: Download It

Source: Contingency Planning Research, 2002

Financial cost of downtime is relative to who feels the pain

Industry

Financial

Financial

Media

Retail

Retail

Transportation

Entertainment

Shipping

Financial

Application

Brokerage operations

Credit card sales

Pay-per-view

Home shopping (TV)

Catalog sales

Airline reservations

Tele-ticket sales

Package shipping

ATM fees

Average cost per hour of downtime (US$)

$ 7,840,000

$ 3,160,000

$ 183,000

$ 137,000

$ 109,000

$ 108,000

$ 83,000

$ 34,000

$ 18,000

Page 7: Download It

Time to recoveramount of data preserved

COST

LOSS

Maximum costof control

Acceptabledowntime

Money

Spend lesslose moreBreak even

How strong is the competition?How loyal are your customers?How easy would it be for them to switch?Do you have alternate sales channels?

Spend morelose less

Identifying your pain point

Page 8: Download It

HP Business Continuity services:Size, stability, and global presence

HP recovery facilities (includes hubs, satellites, data, and office facilities)

Page 9: Download It

Where do I start?• Simplification: Reduce overall infrastructure

complexity for better control, better management, and lower risk

• Standardization: Increase flexibility through standards-based security architectural design and implementation

• Modularity: Secure infrastructure building blocks at all levels of your architecture, across your distributed, heterogeneous environment

• Integration: Lower TCO through “Single Pane of Glass” view for system, security, identity and access management

Where do you see the most pain and ROI?

HP can help you assess and prioritize your enterprise security investments

IntegrationIntegration

SimplificationSimplification

StandardizationStandardization

ModularityModularity

HP adaptive enterprise

design principles

Page 10: Download It

Why HP for security & consulting?

• HP Consulting Services Security Practice has won “Best Security Service Award” at 2001 and 2002 Secure Computing magazine awards

• Over 20 years of security consulting experience with tens of thousands of customers.

• HP has 600 CISSP and SANS certified individuals to ensure our security solutions are properly aligned with your business needs

• HP has world-class security centers in the Americas and Asia Pacific that are continually researching hackers tools and tactics, security breaches and new attacks

• HP received its 5th consecutive most admired knowledge enterprise (MAKE) award in 2002

• HP is the largest Microsoft integrator in the world and Microsoft Gold Security Partner

Page 11: Download It

HP Business Continuity solutions: Dramatically increasing uptime while ensuring stability

Reference Architectures

People & Process

Services

Technology

• BroadVision

• Oracle CRM

• Oracle 9i

• Telecom billing

• ISM

• From single system RAS servers to UNIX to OpenVMS to NonStop

• Clustering fabric

• Middleware

• Anytime, anywhere storage

Technology, services and partnerships applied together to create solutions tailored to your unique needs

• Business continuity services

• Mission-critical support services

• Security services

• Experience

• Support

• Management

Page 12: Download It

Security infrastructure Enabling new, secure IT services• Incorporation of TCG standards into

HP technologies and solutions:– Hardware security appliances– Trusted Windows and HP-UX

• Secure, encrypted informationflow across trust domains

Identity Protecting your assets•Liberty Alliance for web services• logical and transient identities• identity based encryption (IBE)•Biometrics

Security management

Optimizing the infrastructure• Cyber disease control• Software-based security

policy enforcement

HP is investing in three key areas to support emerging security standards

HP R&D: Innovating in security

Page 13: Download It

Security designed in, not bolted on

• End to end offerings from point security products to multiple and integrated security solutions linked across the heterogeneous enterprise;

• Both information and infrastructure security;

• Expert security staff of 600+ CISSPs and SANS certified individuals; 32 countries for Cisco VPN Specialization Certifications;

• Strategic alliances and expertise with market leading security partners;

• Largest Microsoft integrator in the world and a Microsoft Gold Security Partner;

• Deep technical expertise and inventiveness to address today's security problems and tomorrow's opportunities – ~100 patents in security alone.

Page 14: Download It

Security solutions forWindows and ProLiant servers

• Wireless security solutions: – Secure wireless gateway – RSA PKI accelerator for mobile devices – Secure wireless entry points – Secure wireless cards for notebooks and handhelds• Firewall and secure e-mail servers

Prepackaged, integrated, tested and supported by HP

The HP/Microsoft Windows Security Enhancements (SE) products provide secure feature extensions and add the configurable functionality of multiple desktops, diskette auditing, denial of multiple logons and inter-domain trusts.

Largest Microsoft integrator in the world and a Microsoft Gold Security Partner

Page 15: Download It

Secure HP UNIX servers and HP-UX

• Authentication, Authorization and Audit (AAA) server• Mobile AAA server• LDAP server• Kerberos server• Bastille — HPUX lockdown• Host-based Intrusion Detection

System• IP Filter• Security Patch Check

“HP-UX is the most secure commercially-available UNIX.”

— D.H. Brown

Page 16: Download It

Protect physical PCs and components

• Disable hard drive removal• Smart Cover Sensor and Lock

guard against unauthorized chassis • Memory Change Alert —

Proactivelydetect unauthorized modifications

Ensure security of data transmission• Hardware Internet Protocol Security (IPsec) cards

Access control and authentication• Power-on password• DriveLock — password-protected access to notebook hard drives

Enhanced security• Fingerprint identification technology• Smart Card technology

HP ProtectTools –Winner of “Best Security

Product” TechXNY, 9/2003

Built-in security for access devices

Page 17: Download It

Strategic technology partnerships with

the industry leaders

Key partnerships & strategic alliances

Complementary services for business

consulting and solutions

implementation

Driving open and defacto standards

RSA SecurityNetegrityEntrust ISSCapella JetCAPSCheckPoint NokiaCisco Symantec

Entrust F-Securee-Security OblixInterlink NetworkTripWire MicrosoftK2 Defender SafeGuardSt. BernardBindViewSchlumbergereSentinelTrend Micro Critical PathMtech Courion

NetegritySymantec RSASchlumberger

MicrosoftNetegrityRSAEntrustCiscoNokia

Page 18: Download It

HP white on blue logo


Recommended