-
Breaking News
You are here: Home » CHANNEL » HP Join Hands with Security Vendors to Battle Cyber Crime

HP Join Hands with Security Vendors to Battle Cyber Crime

HP Join Hands with Security Vendors to Battle Cyber Crime

HP Join Hands with Security Vendors to Battle Cyber Crime

HP Threat Central Partner Network, a collaboration of security vendors sharing threat intelligence across the industry to combat adversaries. HP is initially working with partners including Arbor Networks, Blue Coat Systems, InQuest, ThreatGRID, TrendMicro and Wapack Labs, to deliver strategic threat intelligence and actionable indicators to the HP Threat Central community.

According to a recent survey of 234 organizations conducted by the Ponemon Institute, the number of security breaches increased 20 percent and the cost of individual breaches increased 30 percent over last year.(1) These trends indicate that cybercriminals are working harder and smarter to gain access to sensitive data and inflict damage on corporate reputations.

With organizations in Asia Pacific and Japan (APJ) experiencing cyber-crimes caused by malicious insiders, denial of service and web-based attacks that they are unable to stop due to outdated or insufficient threat intelligence, enterprises need to strengthen their security posture to defend their organizations.

“Advanced attack techniques and collaboration in the criminal market place is fuelling an increased rate of costly security breaches in APJ,” said Jyoti Prakash, country director – HP ESP (India & SAARC countries) “Crowd-sourced threat intelligence from our vast community of customers, partners and researchers is essential in this battle against cybercrime. By sharing actionable intelligence through our solutions, expertise and best practices, organizations can more effectively address the new threat environment.” HP is unveiling new solutions and services that enable organizations to proactively share threat intelligence and openly collaborate as an industry to combat the growing ecosystem of adversaries.

Intelligence sharing and collaboration are key

Security organizations must mirror the adversary’s approach, and share intelligence to formulate the most current and complete picture of emerging threats.

HP’s new offerings bring together solutions and services to help the industry share intelligence and build a united defense against adversaries.

HP Threat Central, developed with HP Labs, provides a collaborative security intelligence platform that enables community members to share threat data and analysis, providing real-time intelligence on adversaries, attack vectors, methods and motivations behind current threats.

The platform is now strengthened with the introduction of the HP Threat Central Partner Network, a collaboration of security vendors sharing threat intelligence across the industry to combat adversaries. HP is initially working with partners including Arbor Networks, Blue Coat Systems, InQuest, ThreatGRID, TrendMicro and Wapack Labs, to deliver strategic threat intelligence and actionable indicators to the HP Threat Central community.

In addition to intelligence shared by community members and partners, HP Security Research and HP Enterprise Security Services will contribute intelligence feeds to the HP Threat Central platform. The platform also will power the HP ArcSight and HP TippingPoint portfolios, providing seamless integration for automated threat download and upload from HP ArcSight Enterprise Security Management (ESM) and automated action (blocking) of malicious IP addresses in the HP TippingPoint Next Generation Intrusion Prevention System (NGIPS) and HP TippingPoint Next Generation Firewall (NGFW) devices.

HP Targeted Threat Intelligence, enhanced by HP Threat Central, collects, collates and analyzes structured and unstructured data from social media, hacker forums and other traditional log data sources to provide organizations a more holistic view of the threat landscape.

“Chief information security officers (CISOs) and other senior-level security professionals must be able to plan not only for threats that exist now, but also for those that may emerge in as much as three years’ time or beyond,” wrote Rob McMillian, research director, and Kelly Kavanagh, principal research analyst, Gartner.  They go on to write, “Assessing current and potential future threats requires advanced threat intelligence that most organizations are not capable of developing cost-effectively in-house.”(2)

Banding together across the industry

To strengthen defenses across the threat landscape, HP is partnering with other vendors and introducing new offerings that expand access to security technology integrations, address open source vulnerabilities and support the use of standards-based solutions.

•           Enabling integration with leading security companies to provide an advanced layer of protection, HP introduces the HP TippingPoint Advanced Threat application programming interface (API). Offered via the HP TippingPoint Security Management System (SMS), the HP TippingPoint Advanced Threat API provides access to HP Threat Central and advanced threat appliance solutions by delivering in-line blocking at wire speed with HP TippingPoint NGIPS and HP TippingPoint NGFW devices. To support the API, HP introduces the HP TippingPoint Advanced Threat API Program, welcoming partners including Blue Coat Systems, Damballa, Lastline and TrendMicro to decrease the proliferation of advanced malware within enterprise networks.

•           With the rapid adoption of open-source software, the HP Fortify Open Review Project provides an in-depth source of security intelligence to both identify and report on security vulnerabilities in widely used open-source software components. Additionally, with the integration of Sonatype’s component life cycle management (CLM) analysis technology, HP Fortify on Demand customers can identify third-party and open-source software components, detect known vulnerabilities or license risk, and prioritize remediation.

•           HP Enterprise Secure Key Manager (ESKM) 4.0 unifies and automates an organization’s encryption controls by securely creating, protecting, serving, controlling and auditing access to encryption keys.

Share and Enjoy

  • Facebook
  • Twitter
  • Delicious
  • LinkedIn
  • StumbleUpon
  • Add to favorites
  • Email
  • RSS

About Kalpana Singhal

Kalpana Singhal is Co-Founder & Editor in Chief at Techplus Media. She is an Innovative & challenger Entrepreneur who started her journey from corporate communication in early 2001 with I.T. Industry followed by Lead - Editorial at BeautyIndia.in in 2008 . You can follow her on twitter, Google+ and Facebook.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>