Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial...

61

Transcript of Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial...

Page 1: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 2: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Micro Focus Security, Risk and Governance Sneak Peek

Nick NikolsVP, StrategySecurity, Risk & Governance

Page 3: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Security, Risk & GovernanceMicro Focus Portfolio

DATA GOVERNANCE & PROTECTION

APPLICATION SECURITY

IDENTITY & ACCESS MANAGEMENT

ENDPOINT SECURITY

SECURITY OPERATIONS

INFORMATION ARCHIVING

ANALYTICS & MACHINE LEARNING

Page 4: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Sneak Peek - Endpoint Security

Darrin VandenBos

Product Manager, Endpoint Security

Page 5: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Unified Endpoint Management and Protection

Software Patching

Application Control

Wireless Access

USB and Hardware Communication

Disk and Data Encryption

Removable Storage Access

Personal Firewall

Inventory

Device Configuration

Asset Management

W

Software Delivery

Remote Management

10

OS Deployment

ZENworks

Workstations | LaptopsServers

Mobile Devices

WindowsMacLinuxiOS

Android

Page 6: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Innovation Focused on Mitigating Device Risk

IDENTIFY TRACK REMEDIATE

Page 7: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Patching Software VulnerabilitiesMitigating flaws in 3rd party commercial software

In 2018, the U.S. National Vulnerabilities Database added CVE IDs for over 16,000 potential security vulnerabilities

How do you know which CVEs impact your endpoints?

How do you prioritize so many vulnerabilities?

0

2000

4000

6000

8000

10000

12000

14000

16000

18000

2017 2018 2019

Total CVEs (2017 -2019)

High

Medium

Low

Page 8: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Patching Software Vulnerabilities…the ZENworks way

ZENworks retrieves NVD CVEs that are applicable to your devices

Each CVE displays its vulnerable device count

One-click remediation deploys required patches

Page 9: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Mitigating Overall Device Risk

Factors other than software vulnerabilities put devices at risk

How do you know the overall risk level?

How do you identify the devices that are most at risk?

Patch Currency

Software Vulnerabilities

Encryption Status

Last Contact Time

Anti-Malware Currency

Location Frequency

Operating System Version

XP

Page 10: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Mitigating Overall Device Risk…the ZENworks way

Select the risk factors that are important to you

ZENworks monitors the factors and calculates the device risk

You use ZENworks endpoint security to mitigate risks where possible

Patch Currency

Software Vulnerabilities

Encryption Status

Last Contact Time

Anti-Malware Currency

Location Frequency

Operating System Version

XP

Page 11: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Mitigating Device Risk through Behavior AnalyticsZENworks and Interset UEBA enabling intelligent endpoint detection and response

Abnormal behavior can be an indicator of a compromised device

How do you cut through the noise to identify and remediate the risk ?

INTERSETEstablishes normal

behavior for files copied to removable drives is

less than 20 MB per day

Detects anomalous copy of 200 GB

INTERSETGenerates risk

warning that displays in both Interset and ZENworks consoles

ZENWORKSEnforces automated

policy to lock down file copies on the device

Page 12: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 13: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Sneak Peek – Data Governance and Protection

Reiner Kappenberger

Product Lead, Data Security

Eric Popiel

Systems Engineering, Data Security

Page 14: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Data Protection Insight for Analytics and Compliance

Page 15: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Data Protection Events

Page 16: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Data Protection by Format/Field

Page 17: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Data Protection Details for Analytics

Page 18: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Discovering Sensitive Information in Rich Media

Page 19: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Unstructured PII Is Everywhere

Transactions

eMail Texts / Instant Messages

Photos

Audio Video

Drawings

How do you identify AND

protect it?

Page 20: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Micro Focus IDOLArtificial Intelligence analytics for Image, Video, Text, Audio

500+ Analytics Functions

150+ Data Repositories

1000+ Data Types

150+ Languages

30+ GDPR Grammars

Page 21: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

PII document image identification

• Use key identifiers:

• OCR PII Entities

• Face detect

• Logo recognition

• Classification of document does not require exact match

Page 22: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Original

Analysed

Redacted

PII document image redaction

Page 23: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

PII data redacted audio files

Page 24: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Face analysisFace detectionLocate all the faces in an image

Face demographicsGender, Ethnicity, Age identification

Face stateSpectacles, Facial expression, Eye locations

Face recognitionIdentify the person in a detected faceDecide whether two images depict the same person

Found “President Obama” Face

Page 25: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Face recognition and redaction

Page 26: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Simplify and Accelerate PII Compliance

Micro Focus IDOL = AI for PII Protection

Page 27: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 28: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Sneak Peek – Identity and Access Management

Chan Yoon

Product Lead, Access Management

Rick Wagner

Product Lead, Identity Governance and Administration

Tim Sedlack

Product Lead, Privileged Access Management

Page 29: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Access

SINGLE SIGN-ON

MOBILE ACCESS

ACCESS CONTROL

APPLICATION FEDERATION

ANALYTICSRISK-BASED

ACCESS

SOCIAL IDENTITY

CONSUMER ACCESS

API AND SERVICES ACCESS

MULTI-FACTOR AUTHENTICATION

SELF SERVICE

Page 30: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Integration with Interset UEBA

behavioral metrics

Independent Access Management risk

service

Automated user / role creation and removal for

SaaS platforms

Windows Hello for BusinessNational ID IntegrationsZero/Thin Client Support

Secure API Management for micro-services, REST based web services, IoT devices and legacy API systems

Page 31: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

APIs Vulnerabilities are a Growing Focus of Outsiders

StarvaPanera

SalesforceUSPS

Venmo

Page 32: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Secure API Manager

Extends capability to secure micro-services, REST based web services, IoT devices and legacy API systems

Adds additional security, including risk-based access & step-up authentication for APIs & clients

Leverages Access Manager for Authentication & Authorization of APIs

Page 33: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Universal Policy Administrator

Page 34: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Universal Policy Administrator (UPA)Centralize policy management across the entire enterprise

Non domain-joined Windows

AD/GPO

• Unifies policy silos with a single normalized format

• Centralizes policy compliance and troubleshooting

• Provides policy change management and administrator delegation

• Addresses potential policy collisions and gaps

• Works natively

*dates and priorities are subject to change based on customer feedback.

Q4 2019*

1H 2020*2H 2020*

2021+*

UPA

Page 35: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Identity Governance and Administration

Page 36: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Governance Analytics – Decision SupportProviding Context to an Application Approval and Certification Review

Page 37: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Governance Analytics – Identity InspectionProviding Context to the Governance Administrators & Auditors

Page 38: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Governance Analytics – User Story LineProviding Context to the Governance Administrators & Auditors

Page 39: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Governance Analytics – Identity InspectionProviding Context to the Governance Administrators & Auditors

Page 40: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Governance Analytics – Unstructured DataProviding Identity Context for Unstructured Data

Page 41: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 42: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Sneak Peek – Application Security

Scott Johnson

Fearless Leader, Application Security

Page 43: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Innovation/Roadmap Themes

Integration Automation Agility

On-premise / On Demand

Fortify Ecosystem

Software Security Research

Static Analysis – SCA

Scan and Assess Source Code

Dynamic Analysis – WebInspect

Web Application Vuln Scanning

Runtime Analysis – App Defender

Application Protection & Monitoring

Page 44: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Fortify Development Lifecycle Integrations

IDEs CI/CD SERVERSBUILD TOOLS

TICKETING SYSTEMS

OPEN SOURCE

SOURCE CONTROL

DEVELOPER TRAINING

Plan/Govern

Operate/Monitor Deploy/Release

Develop/Test

Agile Development

Continuous Integration

Continuous Delivery

Product

Page 45: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

One more thing…

Page 46: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

AppSec ModernizationFortify as Infrastructure

Point/Pick your cloud provider

Pick your Fortify Solution(s)

Start Scanning with new or

latest version

Fortify SCA

Fortify SSC & Tools

Fortify WebInspect

YPC

Your Private Cloud

Page 47: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

WebInspectAPI

CL I

AppSec ModernizationFortify as Infrastructure w/ Containerized DAST

Page 48: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

AppSec ModernizationSAST Modular Scanning 2020

Dependencies Scanned

Rules

Application

SSC

AWB

Scan ApplicationGenerate RulesHigh Quality

Relevant Results

48

Page 49: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

AppSec ModernizationDon’t forget the DAST

Page 50: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

FortifyNexGen AppSec!

Page 51: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 52: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Sneak Peek – Security Operations

Michael Mychalczuk

Product Lead, Security Operations

Mario Daigle

Product Lead, Interset

Page 53: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Demo

Page 54: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 55: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 56: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 57: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 58: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Thank YouTo all of our Sponsors

Platinum

Gold

Silver

Page 59: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide

Passport to Prizes

1st prize: $1,000 AMEX gift card 2nd prize: $500 AMEX gift card 3rd prize: $250 AMEX gift card

Any Micro Focus station

Any Micro Focus station

Any Micro Focus station

Any Micro Focus station

Any Micro Focus station

Page 60: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide
Page 61: Micro Focus Security, Risk and Governance › 8DC84502FD6047A8BCE011E...Spectacles, Facial expression, Eye locations Face recognition Identify the person in a detected face Decide