• No results found

HP security solutions. Securing your infrastructure for an adaptive enterprise

N/A
N/A
Protected

Academic year: 2021

Share "HP security solutions. Securing your infrastructure for an adaptive enterprise"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

HP security solutions

(2)

When HP asks CIOs about security, the overwhelming response we get is “Help me keep my business going in the face of all the threats out there.” Enterprises are spending increasingly large amounts to keep their networks up and running. Onslaughts of viruses and worms can severely affect IT system performance, availability, and employee productivity. Companies with geographically dispersed operations worry that unsecured access will jeopardize data integrity and customer privacy. For other businesses, the real concern is that inexpensive, easy-to-install wireless access points are extending the network beyond IT’s ability to protect it. And there is the question of ex-employees who may be able to penetrate vital systems.

Beyond threats to security, there are new technologies, regulatory requirements, and business models that also challenge the security infrastructures in place. The Internet has created new business opportunities and efficiencies but at the cost of increased IT complexity. As the enterprise expands to include business partners, customers, and suppliers, companies must secure access

to vital information assets without compromising their networks. As web services evolve, new models for identity, access, and security management are needed to improve data, application, and business process integrity. With customers, consumers, and governments demanding greater data security and privacy—through legislation such as the Gramm-Leach-Bliley Financial Services Modernization Act in the U.S., Basel II in the European Union, and the Privacy Act in Australia— companies must extend their security investments to include auditing and reporting. All stakeholders’ expectations are higher than ever, and IT must safely deliver the right information to the right users at the right time.

Meeting enterprise needs today

and tomorrow

To help you keep your business going in light of all these threats and challenges, HP offers a comprehensive set of security solutions that range from individual productivity devices to data centers, encompassing system and network security, integrated identity and access management for business applications, and security management. In addition to our Certified Information Systems Security Professional (CISSP) experts, our acknowledged expertise in business continuity consulting can help you further prepare for the full range of threats to the availability and stability of your core infrastructure—whether from communications disruptions, application problems, unexpected peaks in customer traffic, or full-scale disasters.

“HP consultants are not only well educated, they are up to

date on security issues. They know what they are talking

about, and they know how to communicate their expertise

to the group at large.” Michael Lardschneider, corporate

information security officer, Munich Re, a leading global

re-insurance company

What does security mean to your

enterprise?

(3)

enterprise-ready secure technologies and security solutions. We’ve committed significant financial and people resources to security across all HP business units and are working in a number of areas:

• Secure products and solutions—a full range of HP platforms, products, and solutions integrated with robust partner technologies to help you build a secure, trustworthy infrastructure. HP Atalla cryptographic hardware, HP Security Enhancements for Microsoft Windows Products, HP ProtectTools Embedded Security and Smart Card Security Software, HP StorageWorks Secure Manager, HP Adaptive Network Architecture, and HP ProCurve Adaptive EDGE Architecture™ are a few of our powerful security building blocks.

• Security services—a full range of services that assist you with every aspect of security operations—from risk assessment and security policy definition to trustworthy infrastructure design, integration, deployment, training, management, and support

• Security standards—vigorous participation in key security standards activities such as the Liberty Alliance for web services, Trusted Computing Group (TCG), Server Specific Working Group, Conformance Working Group, and BioAPI for biometrics

• Secure, flexible architectures—integration of HP and partners’ security technologies into our comprehensive suite of security solutions and our powerful Darwin Reference Architecture for the Adaptive Enterprise

Keeping up with change at Timex Corporation

For Timex to maintain and extend its global dominance in the jewelry and fashion accessory consumer category, the company must have a flexible, adaptable IT infrastructure that can support rapid company and marketplace changes. Timex switched to Microsoft®Windows®Server 2003 on HP ProLiant servers to

provide “serious services” to internal end users. Chief among these new services was the move to a single sign-on procedure provided by Active Directory. “Microsoft Active Directory and Windows Server 2003 on HP ProLiant servers reduced our overall costs of managing our infrastructure, improved security, eliminated redundancy, and provided the adaptive infrastructure we must have to compete,“ said Aaron Forstrum, technical services manager, Timex Corporation. “We have confidence in our long-standing relationship with HP and Microsoft. I can’t speak any more highly of either company. The benefits for Timex have been tremendous, and we all know that here. HP’s expertise and solutions reduced our design, testing, and implementation efforts. HP provided a strong support team for us, which helped us address our company IT needs.”

Our experience has also demonstrated that when security is integrated into enterprise solutions, companies are better able to decisively address issues of cost, risk management, quality of service, and business agility. As part of our Adaptive Enterprise initiative to help you achieve greater business agility, HP has invested

(4)

Benefits at a glance

When you work with HP, you engage with an organization that invents, designs, delivers, manages, and supports business-enabling, cost-effective security components and solutions across distributed, heterogeneous environments. HP offers a complete lifecycle of security solutions.

Whether you choose a consulting and design

engagement or a package that includes ongoing support, HP is a partner you can trust. We have helped enterprises in every part of the globe. We bring an in-depth

understanding of local conditions as well as breadth and depth of experience to your situation, and we deliver solid business benefits.

One-stop shopping for end-to-end solutions

HP end-to-end security solutions are mapped to the security lifecycle model: strategy and policy planning and enforcement; security awareness training; trustworthy infrastructure design, integration, implementation, and testing; web and business-enabling applications deployment and management; multivendor product support; and business continuity and disaster recovery planning. Our Certified Information Systems Security Professional (CISSP) experts can act as the single point of contact in any security engagement, simplifying complex deployments and ongoing support scenarios. We have teamed with recognized security partners such as Check Point, Cisco, Entrust, Internet Security Systems, Netegrity, Nokia, RSA, Symantec, and others to offer a full suite of integrated protection options. Regardless of where your organization is in the security lifecycle, HP can offer the appropriate solution.

Implementing a secure server infrastructure

Headquartered in Belgium, Isabel SA helps countries worldwide to conduct secure electronic transactions. When the company recently decided to implement a new server infrastructure, security was a prime consideration. “We needed a company capable of adapting its technology to meet our highly specialised requirements in areas such as security. Of all the companies we looked at, only HP offered the right combination of industry knowledge and breadth of services,” said Philippe Dermine, CIO at Isabel.

(5)

Lower total cost of ownership (TCO)

Implementing the right security solution can be complex, time-consuming, and potentially expensive. HP experts will work with you to deliver protection that meets your current needs and anticipated growth—while avoiding the opportunity costs of a reactive approach. We understand that today’s heterogeneous operating environments must be carefully integrated in order to provide the right level of protection and to pave the way for an adaptive

Industry standards based

HP understands that point products and solutions can create siloed security implementations that do not effectively contain risk and can even hinder enterprise adaptiveness. HP delivers robust, industry-standards-based infrastructure, management, and security solutions designed to meet your specific business needs. Our collaborative approach enables us to readily incorporate security into the most complex enterprise infrastructures, bridging current applications and new web services across a heterogeneous operating system and application environment.

Industry-specific capabilities

With a wealth of experience in industries such as financial services, manufacturing, telecommunications, and government—plus acknowledged expertise in business continuity consulting—HP provides cost-effective solutions that address risk mitigation and management, as well as infrastructure and application security. We can also meet specific business requirements in banking, payments, B2B integration, and mobile services

deployment. We’ve developed a structured security methodology that helps protect our own organization— and can protect yours, too.

A global presence

HP operates in more than 160 countries worldwide. Our 600-plus security practitioners with CISSP, GIAC, Cisco, CMMI, and Microsoft certifications have responded to a wide variety of security infrastructure needs. We are certified in 32 countries for Cisco VPN Specialization Certifications. Our unique blend of business continuity experience, engineering skill, commitment to open systems, and ability to design and deploy holistic solutions helps keep your systems up and running. We have a global service network of 16 strategically located Customer Support Centers that deliver 24 x 7 problem-solving through the telephone, Internet, and electronic service tools. If you choose to simplify IT management and want to facilitate ongoing IT/business strategy alignment, HP managed services solutions offer the same level of infrastructure security and control that HP requires in its own internal operations.

Enabling secure printing

The 21 Dutch Chambers of Commerce handle more than 500,000 export-related documents a year. Executives wanted to improve efficiency by processing these documents digitally over the Internet. However, preserving security was a prime concern. HP and partners delivered a solution that enables secure, one-off document printing and transmission as well as significantly simplified workflow. This has led to a reduction in turnaround time for the authentication of documents.

As a research-intensive educational institution, the University of Alberta emphasizes the role of technology in teaching and learning. The university chose and implemented an HP ProCurve Networking solution because it helps deliver a secure network, protecting highly confidential, potentially valuable information— and peace of mind—for faculty and students.

(6)

Key security offerings

In accord with its view that an adaptive enterprise must offer “security anywhere and everywhere,” HP offers five key solution families.

Planning and Governance Solutions help your enterprise

gauge security risks and the potential for damage as well as define its security vision and strategy. They create security policies and infrastructures and prepare employees for security implementations. Specific solutions include Security Strategy and Policy Services; Risk, Threat, and Vulnerability Assessments; and Security Training and Awareness.

Trustworthy Infrastructure Solutions help you implement

appropriate technologies to secure an end-to-end IT infrastructure that includes data centers, networks, productivity tools, end-user desktops, and wireless devices. Specific solutions include Infrastructure Architecture Design and Implementation Services, Physical Asset Protection, Network Security, System and Host Security, Secure Storage, Secure Printing, Secure E-mail, and Application Scanning.

Identity and Access Management Solutions strengthen

application-level enterprise security through improved identity and access management and provisioning. Our award-winning HP ProtectTools Embedded Security and Smart Card Security Manager solutions, which run on selected HP business desktops and notebooks, help protect data at its most vulnerable point. Integrated biometric readers on HP iPAQ Pocket PCs and supported file encryption solutions work to provide secure mobility. HP OpenView Select Access provides easy-to-use and rapid time-to-value authorization management. HP’s enterprise-scale design and implementation experience

with Microsoft Active Directory and Passport; Netscape Server Directory for HP-UX and LDAP-UX integration technologies; and solutions from Netegrity, RSA, Entrust, and Critical Path makes us uniquely qualified to help you design and deploy the best solution for your heterogeneous platform. Best of all, we can help you improve return on security investments by integrating your identity and access management implementations with business applications portals and web services— whether you choose to implement with J2EE,

Microsoft .NET, or both.

Security Management Solutions provide security

management at all levels of the infrastructure stack. HP Security Management Solutions include Security Event Correlation, Security Incident Management, and Managed Security. Integrating solutions from BindView, eSecurity, Nokia, St. Bernard, Symantec, and TripWire with HP OpenView, we can provide you with a “single-pane-of-glass” view of systems and security management. The HP Client Management Solution seamlessly integrates with HP OpenView and provides PC management functionality that includes configuration change alerts, remote chassis lock, and backup and recovery functionality.

HP is also furthering its capabilities in policy-based security management. With solutions that range from productivity devices to data centers, HP can significantly streamline your security management efforts and reduce TCO. We also offer managed security services to enterprises that prefer to further simplify IT management through on-demand and managed offerings.

Business and Commerce Enabling Security Solutions help

meet industry-specific security requirements. Our Secure Internet Banking, Secure Payment, and eCommerce Back Office solutions deliver reliable, comprehensive, real-time high-value transaction processing for retail chains and wholesale financial institutions worldwide. HP Mobile Services Delivery Platform (MSDP) is an integrated suite of software products and solutions that enable mobile network operators to develop, deploy, deliver, and manage mobile voice and data e-services quickly, cost effectively, and securely. The HP Fraud Management Solution is an industry leader in telecommunications fraud detection and presentation in the wireless industry. Sixty-six carriers worldwide are using it to protect more than 150 million subscribers from various fraud schemes.

Enabling commerce at Visa

The Visa Debit Processing Service (DPS) handles approximately one billion transactions almost every 70 days—a staggering number by any standard. Network encryption products from the HP Atalla Security Products Group handle DPS encryption needs. “Data integrity, scalability, and availability are the three most significant issues that we need to address in terms of making our business successful,” Larry Van Vleet, vice president of Technology and Strategic Planning at Visa DPS, comments. “And that’s why Visa DPS relies on the NonStop platform to handle our mission critical processing.”

(7)

Why HP?

Why choose HP for your enterprise security needs? Current HP customers will tell you that there are several good reasons. First, HP has significant technical expertise to meet your security needs. HP experts have provided ethical hacking, vulnerability analysis, and secure design services. We have designed, implemented, and supported enterprise-scale solutions involving individual productivity devices, data centers, and wired and wireless networks. HP solutions meet the full range of your infrastructure security needs.

Second, with its breadth and depth of experience, HP has encountered—and resolved—almost every conceivable security scenario. We have seen first-hand the costs of business-debilitating network attacks and abuses. We understand legal liability and the damage that regulatory non-compliance can do to your brand. We have a proven track record of helping global and multinational enterprises with their broad security needs and local concerns.

Next is HP’s commitment to deliver cost-effective design, implementation, and support services that are based on industry standards. Our strong partnerships and “one-stop shop” capabilities mean that our consultants can offer a wide range of services as well as hardware and software solutions that lower your TCO. And HP trusted solutions for multivendor, multilayered environments allow your security environment to adapt to growing needs.

Finally, as a corporation, HP has invested strongly in security. HP builds security into our products and the Darwin Reference Architecture that serves as the foundation for all HP services and solutions. Hundreds of customers worldwide, who represent all industries, have deployed our robust solutions. HP Labs brings deep technical expertise and inventiveness to address today’s problems and tomorrow’s opportunities. We have applied for and received approximately one hundred patents for security-oriented intellectual property alone. HP ProtectTools on the HP Compaq Business Desktop d530 series was awarded the “Best Security Product” of TechXNY in summer 2003. Real-time host intrusion detection for HP-UX holds five patents for the only product of its kind. In addition, the HP Consulting and Integration Security Practice was a recent winner of the “Best Security Service” award from Secure Computing magazine.

Act now

With security breaches and malicious attacks growing exponentially, there is no time like the present to investigate enhancing your enterprise’s security provisions. Our security solutions are built for the long haul. We’ll be there when you need us.

For more information

For more information about how HP can work with you to create a more secure enterprise IT environment, please visit us at www.hp.com/go/security.

Controlling user access

When Toyota Motor Europe Marketing and Engineering (TMME) needed to consolidate its IT infrastructure to support its continued growth and to prepare for the opening of a new manufacturing plant, it turned to HP Consulting and Integration for functional and technical expertise in several specific areas, including IT security, e-business, IT Service Management (ITSM), Windows NT®,

Windows 2000, and Systems Management Server (SMS). With vital ongoing marketing activities and 1,100 employees representing more than 20 different nationalities, TMME’s general manager of IS found the partnership “outstandingly successful.”

(8)

To learn more, visit www.hp.com.

© 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty

References

Related documents

The estimated social cost of night time crashes under category V (safety related) lighting in urban areas is around $310 M per year, around 8% out of a nationwide total of around

The central hypothesis is aerobic exercise will attenuate the harmful arterial remodeling, endothelial dysfunction, and decreased NO bioavailability caused by MetS and chronic

Our services for the Microsoft environment address platform security, integrated identity and access management for business applications and portals, e-mail security, secure

 Security of broadband networks and cyber security of large infrastructure in Cohesion Policy  Internal security fund for cyber protection of law enforcement / border

Data Center Network Application Users & devices HP Security for Public Sector HP Data Center Protection Services HP ArcSight Enterprise Security Manager. HP

Access entry tool for feta to compare nutrient output data of food codes to estimate population distribution of the questionnaire file will enable future researchers using the

This survey is intended to determine which proposal to exchange treatment vehicle information will be the easiest for everyone to implement in SEND 3.1. We have supplied 4 SEND

Using a dictator game with a costly exit option and with Amnesty International as the recipient, we find that nurse students are more generous when placed in the role