-
Breaking News
You are here: Home » SME » HP Urges Customers to Rethink Security Strategy

HP Urges Customers to Rethink Security Strategy

HP Security Risk and Controls Advisory Service

HP Security Risk and Controls Advisory Service

With cyber crimes increasing day by day and the threat to the companies to is increasing at an unprecedented rate, HP has launched new products and services that enable enterprises to disrupt the adversary marketplace, manage risk and extend their security capabilities to better protect themselves against a growing threat landscape.

According to the Forbes Global 2000 companies report, almost 92 percent of data breaches have been recorded in the last 12 months.This growth is due to adversaries forming a more sophisticated and collaborative marketplace through which they share information and advanced data theft tools. Studies estimate that the global cybercrime black market has a value of $104 billion per year.

Evolving regulatory and legislative requirements are further adding to enterprises’ security burden, with an estimated average cost of noncompliance at $13.7 million for global organizations. Additionally, in the world of bring your own device (BYOD), IT no longer controls the endpoint, offering the adversary many more control points to attack.

HP’s new products and services enable enterprises to approach their security challenges with a single view of information security, and to manage risk and compliance. Leveraging HP’s industry-leading security research and security professionals, these new offerings are designed to help organizations disrupt the adversary marketplace, optimize their risk postures and extend their own capabilities.

“Enterprises today aren’t facing a single attacker; they are fighting a well-organized, well-funded adversary marketplace,” says Ranndeep Singh Chonker, Country Manager, HP Enterprise Security Products, India. “To succeed in thwarting attacks, you need a trusted partner that can provide end-to-end security with enhanced threat intelligence to disrupt the adversary. Only HP can deliver this,” he adds.

“An organization extends well beyond its four walls—it’s made up of a vast ecosystem of suppliers, devices that can go anywhere and, not to mention, a web that is literally worldwide,” shares Susanta Bhattacharya, Director, Infrastructure Technology Outsourcing (ITO) Portfolio, Enterprise Services, HP India. “HP helps clients reduce risk and manage the complexities of protecting the flow of information—both internally and externally—enabling them to focus on driving innovation.”

HP’s approach to security disrupts the lifecycle of an attack with prevention and real-time threat detection, from the application layer to the hardware and software interface.

New and enhanced HP offerings provide real-time threat disruption and self-healing technology combined with crowd-sourced security intelligence:

  • HP Threat Central, the industry’s first community-sourced security intelligence platform to facilitate automated, real-time collaboration among organizations in the battle against active cyber threats.
  • HP Tipping Point Next-Generation Firewall (NGFW)addresses risks introduced by cloud, mobile and BYOD by delivering easy-to-use, reliable, high-performance security effectiveness with granular application visibility and control.
  • HP ArcSight and HP Fortify offer data-driven security technologies, including HP ArcSight Application View, HP ArcSight Management Center, HP ArcSight Risk Insight and HP ArcSight Enterprise Security Manager (ESM) v6.5c ,that empower security operations teams to run more effectively with accelerated and real-time application-level threat detection.
  • HP SureStart, the industry’s first and only self-healing technology that automatically restores a system’s PC Basic Input/Output System (BIOS) to its previously safe state if attacked or corrupted, delivering a “future proof” technological breakthrough to HP Elite Book customers. This offering is part of the HP BIOSphere, a firmware ecosystem that automates data protection as well as robust configurability and manageability for HP business PCs.

As the adversary marketplace intensifies, internal security teams are struggling to respond to the velocity and severity of threats.

HP Managed Security Services (MSS) help internal security teams accelerate threat identification, response and remediation by providing expertise and advanced security intelligence. With HP MSS, intrusions are detected within 11.8 minutes, and 92 percent of major incidents are resolved within two hours of identification. HP MSS security professionals also possess global and regional knowledge of legal, regulatory and standard developments to improve overall risk posture.

New offerings from HP MSS and HP Enterprise Services help boost security posture, manage regulatory challenges and reduce risk. Despite spending more on cyber security, chief information officers (CIOs) and chief information security officers (CISOs) are still challenged with identifying, retaining and educating security professionals. HP Enterprise Security offers a combined 657 million hours of expertise that extend customers’ capabilities and complement existing resources.

The new HP Security Risk and Controls Advisory Service for Mobility enables organizations to understand, identify and implement an effective security strategy to manage employee-owned devices in the enterprise.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

About Kalpana Singhal

Kalpana Singhal is Co-Founder & Editor in Chief at Techplus Media. She is an Innovative & challenger Entrepreneur who started her journey from corporate communication in early 2001 with I.T. Industry followed by Lead - Editorial at BeautyIndia.in in 2008 . You can follow her on twitter, Google+ and Facebook.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>