Download It
-
Upload
jackie72 -
Category
Technology
-
view
1.033 -
download
2
Transcript of Download It
© 2004 Hewlett-Packard Development Company, L.P.The information contained herein is subject to change without notice
HP Security solutions,Securing your Adaptive Enterprise
Speaker: Jim FiannacaDate: 11/10/04
Agenda
• Key security issues facing today’s enterprises
• Security trends and HP’s approach to security solutions
• HP Security solutions
Today’s business challenges require IT to adapt
Ability to adapt quickly
Business challenges• Improve business
performance, quality and ROI, while reducing costs
• Minimize risk associated with change
• Drive new business models and direction
• Shorten time-to-market
• Enable mergers, acquisitions and divestitures
IT imperatives
• Link business and IT• Reduce costs,
ensure stability and flexibility
• Reduce complexity• Optimize assets
today and tomorrow
• Extend value and reach of the enterprise
Increased volume of change
An adaptive infrastructure is one that can quickly respond to and capitalize on change for business advantage
Your business demands security• "Help me keep my business going in light of all
these threats!” • Financial regulations require tighter access control
to data and applications, better audit trails• Consumers, governments, and employees demand
more privacy and better confidentiality• More dynamic business environment requires more
dynamic, and more adaptive security measures
HP Security solutions enable business agility
Why is security important to the adaptive enterprise? Consider the cost of downtime
Other expenses•Temporary employees•Equipment rental
Productivity • Number employees impacted x hours out x burdened hours =
Revenue • Direct loss• Compensatory payment• Lost future revenues• Billing losses• Investment losses
Know your downtime cost: Per hour, per day, over 2 days…
Financial performance
• Revenue recognition• Cash flow• Lost discounts (A/P)• Payment guarantees• Credit rating• Stock price
Damaged reputation • Customers• Suppliers• Financial markets• Banks• Business partners
•Overtime & travel costs•Extra shipping
expenses
Source: Contingency Planning Research, 2002
Financial cost of downtime is relative to who feels the pain
Industry
Financial
Financial
Media
Retail
Retail
Transportation
Entertainment
Shipping
Financial
Application
Brokerage operations
Credit card sales
Pay-per-view
Home shopping (TV)
Catalog sales
Airline reservations
Tele-ticket sales
Package shipping
ATM fees
Average cost per hour of downtime (US$)
$ 7,840,000
$ 3,160,000
$ 183,000
$ 137,000
$ 109,000
$ 108,000
$ 83,000
$ 34,000
$ 18,000
Time to recoveramount of data preserved
COST
LOSS
Maximum costof control
Acceptabledowntime
Money
Spend lesslose moreBreak even
How strong is the competition?How loyal are your customers?How easy would it be for them to switch?Do you have alternate sales channels?
Spend morelose less
Identifying your pain point
HP Business Continuity services:Size, stability, and global presence
HP recovery facilities (includes hubs, satellites, data, and office facilities)
Where do I start?• Simplification: Reduce overall infrastructure
complexity for better control, better management, and lower risk
• Standardization: Increase flexibility through standards-based security architectural design and implementation
• Modularity: Secure infrastructure building blocks at all levels of your architecture, across your distributed, heterogeneous environment
• Integration: Lower TCO through “Single Pane of Glass” view for system, security, identity and access management
Where do you see the most pain and ROI?
HP can help you assess and prioritize your enterprise security investments
IntegrationIntegration
SimplificationSimplification
StandardizationStandardization
ModularityModularity
HP adaptive enterprise
design principles
Why HP for security & consulting?
• HP Consulting Services Security Practice has won “Best Security Service Award” at 2001 and 2002 Secure Computing magazine awards
• Over 20 years of security consulting experience with tens of thousands of customers.
• HP has 600 CISSP and SANS certified individuals to ensure our security solutions are properly aligned with your business needs
• HP has world-class security centers in the Americas and Asia Pacific that are continually researching hackers tools and tactics, security breaches and new attacks
• HP received its 5th consecutive most admired knowledge enterprise (MAKE) award in 2002
• HP is the largest Microsoft integrator in the world and Microsoft Gold Security Partner
HP Business Continuity solutions: Dramatically increasing uptime while ensuring stability
Reference Architectures
People & Process
Services
Technology
• BroadVision
• Oracle CRM
• Oracle 9i
• Telecom billing
• ISM
• From single system RAS servers to UNIX to OpenVMS to NonStop
• Clustering fabric
• Middleware
• Anytime, anywhere storage
Technology, services and partnerships applied together to create solutions tailored to your unique needs
• Business continuity services
• Mission-critical support services
• Security services
• Experience
• Support
• Management
Security infrastructure Enabling new, secure IT services• Incorporation of TCG standards into
HP technologies and solutions:– Hardware security appliances– Trusted Windows and HP-UX
• Secure, encrypted informationflow across trust domains
Identity Protecting your assets•Liberty Alliance for web services• logical and transient identities• identity based encryption (IBE)•Biometrics
Security management
Optimizing the infrastructure• Cyber disease control• Software-based security
policy enforcement
HP is investing in three key areas to support emerging security standards
HP R&D: Innovating in security
Security designed in, not bolted on
• End to end offerings from point security products to multiple and integrated security solutions linked across the heterogeneous enterprise;
• Both information and infrastructure security;
• Expert security staff of 600+ CISSPs and SANS certified individuals; 32 countries for Cisco VPN Specialization Certifications;
• Strategic alliances and expertise with market leading security partners;
• Largest Microsoft integrator in the world and a Microsoft Gold Security Partner;
• Deep technical expertise and inventiveness to address today's security problems and tomorrow's opportunities – ~100 patents in security alone.
Security solutions forWindows and ProLiant servers
• Wireless security solutions: – Secure wireless gateway – RSA PKI accelerator for mobile devices – Secure wireless entry points – Secure wireless cards for notebooks and handhelds• Firewall and secure e-mail servers
Prepackaged, integrated, tested and supported by HP
The HP/Microsoft Windows Security Enhancements (SE) products provide secure feature extensions and add the configurable functionality of multiple desktops, diskette auditing, denial of multiple logons and inter-domain trusts.
Largest Microsoft integrator in the world and a Microsoft Gold Security Partner
Secure HP UNIX servers and HP-UX
• Authentication, Authorization and Audit (AAA) server• Mobile AAA server• LDAP server• Kerberos server• Bastille — HPUX lockdown• Host-based Intrusion Detection
System• IP Filter• Security Patch Check
“HP-UX is the most secure commercially-available UNIX.”
— D.H. Brown
Protect physical PCs and components
• Disable hard drive removal• Smart Cover Sensor and Lock
guard against unauthorized chassis • Memory Change Alert —
Proactivelydetect unauthorized modifications
Ensure security of data transmission• Hardware Internet Protocol Security (IPsec) cards
Access control and authentication• Power-on password• DriveLock — password-protected access to notebook hard drives
Enhanced security• Fingerprint identification technology• Smart Card technology
HP ProtectTools –Winner of “Best Security
Product” TechXNY, 9/2003
Built-in security for access devices
Strategic technology partnerships with
the industry leaders
Key partnerships & strategic alliances
Complementary services for business
consulting and solutions
implementation
Driving open and defacto standards
RSA SecurityNetegrityEntrust ISSCapella JetCAPSCheckPoint NokiaCisco Symantec
Entrust F-Securee-Security OblixInterlink NetworkTripWire MicrosoftK2 Defender SafeGuardSt. BernardBindViewSchlumbergereSentinelTrend Micro Critical PathMtech Courion
NetegritySymantec RSASchlumberger
MicrosoftNetegrityRSAEntrustCiscoNokia
HP white on blue logo