Protect your digital enterprise...USERS APPS DATA Today’s digital Enterprise needs a new style of...
Transcript of Protect your digital enterprise...USERS APPS DATA Today’s digital Enterprise needs a new style of...
Protect your digital enterprise
Transformto a hybrid
infrastructure
Enableworkplace
productivity
Protectyour digitalenterprise
Empowerthe data-drivenorganization
Transformto a hybrid
infrastructure
Enableworkplace
productivity
Empowerthe data-drivenorganization
Protect yourdigital enterprise
Protect your most prized digital assets whether they are on premise, in the cloud or in between.
Managing risk in today’s digital enterprise
Rapid transformation of enterprise IT
Shift to hybrid
Mobile connectivity
Big data explosion
Cost and complexity of regulatory pressures
Compliance
Privacy
Data protection
Increasingly sophisticated cyber attacks
More sophisticated
More frequent
More damaging
USERS
APPS DATA
Today’s digital Enterprise needs a new style of protection
5
Off Premise
Protect your most business-critical digital assetsand their interactions, regardless of location
device
Off Premise
BIG DATA
IaaS
SaaS
PaaS
BYOD
On Premise
Protect your digital enterprise
Prevent Detect & Respond Recover
Build it in
Identify the threats you face, assess your
organization’s capabilities to protect your
enterprise,
Harden your applications, protect your
users, and encrypt your most important data
Proactively detect and
manage breaches
Help reduce time-to-breach-resolution
with a tight coupling of analytics,
correlation, and orchestration.
Establish situational awareness to find
and shut down threats at scale
Safeguard continuity
and compliance
Drive resilience and business continuity
across your IT environments, systems, and
applications.
Reduce risk with enterprise-wide governance,
risk & compliance strategies
• Identify the threats you face
• Assess your organization’s
capabilities to protect your enterprise
• Build proactive defenses into user
management, applications, and data
Prevent
Detect & Respond
Recover
Build Security into the fabric of your organization
Everything encrypted at the end point
Traditional data security
• Simplified Compliance
• More Secure Analytics
• Easier Move to the Cloud
• Safer Back-End Storage
Data Centric Security for end-to-end protection
Develop Test Deploy
• 84% of breaches target applications
• Applications have become the new perimeter
Traditional Application Security
Operate
Develop
Test
Deploy
• Secure Development• Find and fix as developer codes
• Security Testing• Expand testing to web, mobile and cloud applications in
production
• Software Security Assurance• Programmatic approach to securing applications at scale
Securing the new SDLC
Protecting Heartland Payment Systems’ digital enterprise
reduction in scope of
merchant PCI compliance
customer confidence and
data compliance
reduction in critical software
vulnerabilities
1,000’s to 0Regain79%
Help reduce time to breach resolution with:
• Analytics
• Correlation
• Orchestration
Prevent
Detect & Respond
Recover
Proactively detect and manage breaches
Expanded perimeter requires finding the known and the unknown
Security Monitoring and Management
Analytics
HPE Security DMA
HPE Security UBA
HPE Security Application Defender
Unknown
=Security Intelligence Automation
+ +SIEM
HPE SecurityArcSight ESM
Known
Threat Central
ThreatIntelligence
Unknown
HPE is helping du Telecom to protect their digital enterprise
of attacks detected within 24 hours decrease in response time reduced security and situational
awareness expenditures
85%95%95%
Drive resilience and business continuity
across:
• IT environments
• Systems
• Applications
Prevent
Detect & Respond
Recover
Safeguard continuity & compliance
Rapid response when threats become realityGlobal Incident Response from HPE and Mandiant, a FireEye Company
− Rapid deployment of industry leading incident response teams to your site
− Multilingual support when and where you need it− Full enterprise visibility through proprietary tools and techniques
purpose built for large scale incident response− Expertise, methodologies and IP from HPE and Mandiant consultants
Features
− Reduces the damage caused by advanced, targeted attacks
− Engages experienced teams with deep domain expertise
− Minimizes downtime and establishes ongoing response plans
Problems it solves
− Stops prolonged exposure to minimize financial, reputation damages
− Addresses legal and regulatory evidence requirements
− Relieves overburdened staff in reactive environments
Client benefits
Texas
UK
Australia
Toronto
Virginia
Costa Rica
Germany
Bulgaria
Malaysia
India
Protect your digital enterprise at scale
19
application security and network access
control (Gartner)
data security (Gartner)
SIEM (Gartner)
Leader 10managed
global SOCs
42business continuity
and recovery centers
managed security services
(Forrester)
Technology
Consulting
Managed Services
LeaderVisionaryLeader 5000+security
professionals
20
Protect your digital enterprise
Accelerate Security