What generation of security does your organization utilize? If your answer involves nuisance programs—it might just be time for an update.
This blog post discusses the five generations of security operations and what the next generation of security operations centers look like.
Today at Interop 2013, HP TippingPoint announced Security Management System (SMS) 3.6 along with the new large enterprise SMS XL 2000 hardware platform.
How much damage would a security breach cause for your organization? A Security Operations Center provides your organization with centralized security monitoring and embedded operations to handle incidents and events of concern.
Find out how a Security Operations Center can power your organization and provide you with the additional protection you need. Keep reading to find out how to best integrate it into your system.
Big Data is both a blessing and a curse. Harvesting insight from ‘big data’ sources can unlock powerful intelligence about potential security threats. And, you may already have the tools needed. This first in a series of articles will look at two such tools: HP ArcSight and HP Autonomy, explaining the fundamental premise behind using them together.
Next, we’ll look at how to bring them together to solve problems very different from those for which they were deployed. Keep reading to find out how to harness the power of big data for information security.
Today HP announced the expansion of the HP TippingPoint NX Series Next Generation Intrusion Prevention System portfolio. The new HP S75000NX, S6200NX and S2600NX NGIPS appliances round out the family NX family to provide 20 Gbps, 10Gbps and 3Gbps network inspection respectively in a 2U form factor.
The third Annual HP SW Government Summit is coming in April and you don’t want to miss it. This complementary experience will show you how to maintain your focus on security and innovation in the face of sequestration and tight budgets.
Continue reading to find out how to stretch your budget and keep up with technological advancements.
Written by Monique Robinson
Federal Marketing, HP Software
Customers rely Maintaining the security of customer data and privacy has always been an important consideration for communications service providers (CSPs).
But the cost of cybercrime is increasing rapidly. According to a Ponemon Institute research report, the average annualized cost of cybercrime for a CSP organization in the United States is $8.91 billion 1. That’s up from $5.28 billion just three years ago.
Alain recommends that a comprehensive security solution should address five key priorities:
- Manage information risk by identifying threats
- Protect against increasingly sophisticated cyberthreats
- Improve reaction time to security incidents
- Increase the efficiency of security management
- Achieve compliance in a predictable and cost-effective way
It was a busy week for HP last week at RSA Conference 2013 with many announcements and releases. HP integrated its portfolio across products and groups to deliver a true Big data solution and Big security for Big data problems.
For the first time, organizations can automatically apply sentiment analysis and event information to their Big Data and security event platforms to gain real-time visibility into the internal and external threat landscape with the HP enterprise security solutions.
The top announcements are:
- ArcSight & Hadoop
- ArcSight & Autonomy
- ArcSIght & Vertica
- ArcSight Express 4.0
- ArcSight cloud connector
- ArcSight Reputation Security Monitor 1.5
Art Gilliland, the head of security group at Hewlett-Packard said that bad guys are depending on the big data such as combination of application vulnerabilities, network gaps, machine data, and social media to know who you are, where you go, and what you do to target specific company, group or even machine. So, this issue can be resolved through big data security intelligence platforms.
HP ArcSight Express comes fitted with everything an enterprise needs to give it complete visibility into who, what, and where of an event. HP ArcSight Express incorporates the following features:
• IdentityView—Ties together a user’s accounts with their roles and aggregates the activity of that user
• Threat Detector—Detects complex threats to the organization, using a heuristic pattern analysis o historical data events
• NetFlow Analysis—Understands how network bandwidth is being consumed, so that suspicious activities are correctly prioritized and investigated
Express 4.0 uses the latest data store, so that it can process much more events in real-time. This provides you with immediate analysis of log and event data so organizations can be armed with knowledge of attacks, giving you the upper hand needed to battle cyber criminals.
In under 10 minutes, HP ArcSight Express 4.0 can give you visibility into your environment so you can tell whether your business is under attack. HP ArcSight Express 4.0 can process more events, faster. It integrates with collectors straight out of the box, and it integrates with big data, so that context can be applied intelligently to events happening in your environment.
HP introduces the new HP Reputation Security Monitor 1.5, an update to a solution that integrates the power of two market-leading products: HP ArcSight for SIEM and HP DVLabs for threat intelligence. Now even more sophisticated attacks can be detected and blocked with new capabilities that provide greater insight and integration with other HP enterprise security tools.
Here are some great tips and tricks on how to get to RSA. Also, I’ve included some fun things to do in San Francisco that never get old. Hope to see you on the showroom floor!
For the first time, organizations can automatically apply sentiment analysis and event information to their Big Data and security event platforms to gain real-time visibility into the internal and external threat landscape.
HP’s Security Information and Event Management (SIEM) solution, which is HP ArcSight ESM 6.0c is now seamlessly integrated with Autonomy’s IDOL content analysis engine. This combination automatically recognizes the context, concepts, sentiments and usage patterns related to how users interact with all forms of data.
The top speaking engagement from HP that you should not miss at RSA Conference 2013 in San Francisco
- Lessons learned from cybercriminals can be applied to boost an organization’s overall security strategy
- Innovation Sandbox—Mobile Security
- The Real Economics of Cybercrime
- Can You Trust Your Mobile Applications?
- How the Constitution Protects Your Cell Phone and Laptop Encryption Key
This year, I will be attending the RSA Conference with some of the most intelligent men and women I know in the security field. They will be demonstrating products, solutions and the HP Software enterprise security portfolio on the showroom floor. In this post I’ve outlined HP’s participation in the event. During the event you can find up-to-date information and videos from RSA at www.hp.com/go/backstage.
What will happen to Software-defined Data Centers in the face of Cloud, Saas and other flexible models if they don't adapt?
Guest post by: John Pirc, Director, HP Security Research
Author (Blackhatonomics, Cybercrime and Espionage)
A recent Gartner's report published on Jan 4, 2013 on 'SIEM Market Trends, Solutions, Assessment and Select Product Profiles 2013' wrote that "ArcSight has been the most visible product in the SIEM space since at least 2005, and ArcSight SIEM tools are currently used in many of the largest SIEM deployments in the world". Gartner recommends the vendors looking for SIEM solution that "ArcSight ESM software should be on the list for every large organization building an SOC".
Have you seen the 2013 Global State of Information Security Survey (GISS) from CIO Magazine, CSO Magazine and Price Waterhouse Coopers? It reveals an interesting trend in regard to security programs and it highlights a shift in security priorities. Today I want to discuss a Security Maturity model to help assess where security capabilities will head in 2014. I also want to provide a framework for you to assess your own capabilities—without bias of self-confidence.
HP operations analytics combines the powerful analytic capabilities of HP ArcSight Logger and HP Business Service Management (BSM) solutions to provide a comprehensive view into performance and availability metrics, machine data, events and logs.
HP ArcSight Logger helps turn volumes of raw data into actionable insight by unifying search, reporting, alerting and analysis across all types of IT data. It provides real-time insights into complex unstructured data for dynamic IT environments.
“As IT infrastructure grows the amount of data IT must collect and manage continues to increase, yet many organizations do not have the right tools to collect, store and analyze these overwhelming amounts of raw data and events” said Art Gilliland, senior vice president, Enterprise Security Products, HP
HP introduces the new ArcSight Logger 5.3, an update to industry-leading universal log management solution that unifies searching, storing, and analysis of logs, events and flows to a single-pane-of-glass. The new Logger 5.3 has been enhanced overall from the way it is deployed and used.
So with all these enhancements, now, you can deploy Logger in minutes on ANY environment, deploy Connectors easily and collect logs, events, and flows from more than 315+ distinct log generating sources, manage Connectors easily, and manage both structured and unstructured data efficiently with better search tools, and better inline dashboards, and drill-down reports. This is truly the BEST universal log management solution in the market.
Confused by all the security offerings at HP Discover? Don't worry, we have a guide for you. This cheat sheet will help you decide what sessions and exhibits you will want to prioritize.
In the advancing world of threat intelligence, focusing on the attacker’s communications and actions can provide greater ability to identify and block attacks before they do harm. Such intelligence about the ‘bad guys’ requires expertise and investigation typical of the most engrossing spy novels. Two of HP’s security experts share examples of the techniques they use and the insight they are able to achieve. How you obtain this capability is the challenge. Subscription services will play an important role in bringing this level of sophisticated threat intelligence within reach to a large number of enterprises.
Security is not a seasonal event. Yet the holiday shopping season brings with it heightened challenges for security and risk management, some of which are unique to the retail industry. Several HP security experts weigh in with cautions and advice. These seasoned individuals have written books, advised F100 companies and U.S. U.S. agencies, and have been first responders brought in to investigate historic security breaches and prevent their repeat.
Read on for cautions and advice about their three main areas of concern: shopping volumes, seasonal employees, and the general greater risk of attack that the season brings.
by Norm Follet, Director of Solutions Design and Demo Group
Enterprise security is stronger with a coordinated approach. Here is an explanation of how HP Enterprise Security products TippingPoint, ArcSight and Fortify can work in concert to provide a defense in depth solution.
Did you know that it takes around 24 days to resolve a cyber-attack? The cost of resolution of each incident is estimated at $600,000 per incident. The research indicates an upward trend of increased attack by 42% year on year. In absolute terms, each of those companies had more than 100 attacks every week.
Do you know most spyware is developed by legitimate companies and the odds are that you probably have some on your computer right now?
The fact is most developers stuck doing security testing have little to no training on security or testing tools.
Do you think of your development tools, object libraries, or applets add-ons as a security risk?
Software & Corprate hacking is big business and if you wanted to know someone information where the best place to start? we need to discuss the security risk of internal applications and how developing stucture in SDLC can help.
More than ever before, it is imperative that an organisation becomes agile, flexible and dynamic enough to innovate ‘change.’ A key driver of change should and could be the IT organisation that delivers innovation by providing the business with the ability to react and exploit opportunities.