Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SAN FRANCISCO, CA -- (Marketwired) -- 02/24/14 -- Extending its leadership in enterprise security, HP (NYSE: HPQ) is unveiling new solutions and services offerings that enable organizations to proactively share threat intelligence and openly collaborate as an industry to combat the growing ecosystem of adversaries.
Organizations worldwide spent approximately $46 billion on cybersecurity in 2013, yet the number of security breaches increased 20 percent and the cost of individual breaches increased 30 percent.(1) These trends demonstrate that cybercriminals are working harder and smarter to gain access to sensitive data and inflict damage on corporate reputations.
Through intelligence sharing, threat analysis and leading security solutions, organizations can strengthen their security posture, strategically invest to defend across the full attack life cycle and eliminate silos among their peers. HP's new offerings are based on industry-leading security research, solutions and expertise to address this opportunity.
"Collaboration is fueling unprecedented innovation in the criminal marketplace, enabling the ecosystem of adversaries to stay ahead of our defenses," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "Crowd-sourced threat intelligence from our vast community of customers, partners and researchers is essential in this battle against cybercrime; we need to stop chasing silver bullet technologies and start sharing actionable intelligence through our solutions, expertise and best practices if we are going to compete and win."
Intelligence sharing and collaboration are key
Collaboration within the underground marketplace is becoming more common and more effective. According to a recent survey of nearly 2,000 security professionals conducted by the Ponemon Institute, 60 percent of respondents said their enterprises were unable to stop exploits because of outdated or insufficient threat intelligence.(1)
Security organizations must mirror the adversary's approach, and share intelligence to formulate the most current and complete picture of emerging threats. HP's new offerings bring together solutions and services to help the industry build a united defense.
HP Threat Central, developed with HP Labs, provides a collaborative security intelligence platform that enables community members to share threat data and analysis, providing real-time intelligence on the adversaries, attack vectors, methods and motivations behind current threats.
The platform is now strengthened with the introduction of the HP Threat Central Partner Network, a collaboration of security vendors who stand behind the importance of threat intelligence sharing across the industry to combat the adversary. HP is initially working with partners including Arbor Networks, Blue Coat Systems, InQuest, ThreatGRID, TrendMicro and Wapack Labs, with the goal of delivering strategic threat intelligence feeds to further provide actionable indicators to the HP Threat Central community.
In addition to intelligence shared by community members and partners, HP Security Research and HP Enterprise Security Services will contribute intelligence feeds to the HP Threat Central platform. The platform also will power the HP ArcSight and HP TippingPoint portfolios, providing seamless integration for automated threat download and upload from HP ArcSight Enterprise Security Management (ESM) and automated action (blocking) of malicious IP addresses in the HP TippingPoint Next Generation Intrusion Prevention System (NGIPS) and HP TippingPoint Next Generation Firewall (NGFW) devices.
HP Targeted Threat Intelligence, enhanced by HP Threat Central, collects, collates and analyzes structured and unstructured data from social media, hacker forums and other traditional log data sources to provide organizations a more holistic view of the threat landscape.
"Chief information security officers (CISOs) and other senior-level security professionals must be able to plan not only for threats that exist now, but also for those that may emerge in as much as three years' time or beyond," wrote Rob McMillian, research director, and Kelly Kavanagh, principal research analyst, Gartner. They go on to write, "Assessing current and potential future threats requires advanced threat intelligence that most organizations are not capable of developing cost-effectively in-house."(2)
Banding together across the industry
To strengthen defenses across the threat landscape, HP is partnering with other vendors and introducing new offerings that expand access to security technology integrations, address open source vulnerabilities and support the use of standards-based solutions.
Empowering the front lines of security to strengthen security posture
With the increased awareness of high-profile security breaches, IT leaders require insight that can be easily communicated across the organization to help quantify risk and calculate the potential impact to the business. New and enhanced services from HP Enterprise Security Services enable organizations to adopt an intelligent security posture helping to disrupt the adversary, manage risk and extend their capabilities.
"As threats continue to intensify, security can no longer be a guessing game -- with reputation and shareholder value at stake, the business risk is far too significant," said Arthur Wong, senior vice president and general manager, Enterprise Security Services, HP. "With these value-added services, HP provides organizations the security intelligence to more effectively address the threat landscape with actionable, informed decisions."
To further extend existing capabilities, new enhancements also are now available for the HP ArcSight portfolio to facilitate more rapid deployments and accelerate time to value.
Additional information about HP Enterprise Security solutions and services is available at HP booth No. 3401 at the RSA Conference 2014, which is taking place this week in San Francisco. Information also is available at www.hpenterprisesecurity.com.
HP's annual enterprise security user conference, HP Protect, takes place September 8-11 in Washington, D.C.
About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.
(1) "Cost of Cyber Crime Study 2013," Ponemon.
(2) Gartner, How to Select a Security Threat Intelligence Service, Rob McMillan, Kelly M. Kavanagh, 16 October 2013 G00224158
This news release contains forward-looking statements that involve risks, uncertainties and assumptions. If such risks or uncertainties materialize or such assumptions prove incorrect, the results of HP and its consolidated subsidiaries could differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including but not limited to statements of the plans, strategies and objectives of management for future operations; any statements concerning expected development, performance, market share or competitive performance relating to products and services; any statements regarding anticipated operational and financial results; any statements of expectation or belief; and any statements of assumptions underlying any of the foregoing. Risks, uncertainties and assumptions include the need to address the many challenges facing HP's businesses; the competitive pressures faced by HP's businesses; risks associated with executing HP's strategy and plans for future operations; the impact of macroeconomic and geopolitical trends and events; the need to manage third-party suppliers and the distribution of HP's products and services effectively; the protection of HP's intellectual property assets, including intellectual property licensed from third parties; risks associated with HP's international operations; the development and transition of new products and services and the enhancement of existing products and services to meet customer needs and respond to emerging technological trends; the execution and performance of contracts by HP and its suppliers, customers, clients and partners; the hiring and retention of key employees; integration and other risks associated with business combination and investment transactions; the execution, timing and results of restructuring plans, including estimates and assumptions related to the cost and the anticipated benefits of implementing those plans; the resolution of pending investigations, claims and disputes; and other risks that are described in HP's Annual Report on Form 10-K for the fiscal year ended October 31, 2013, and that are otherwise described or updated from time to time in HP's Securities and Exchange Commission reports. HP assumes no obligation and does not intend to update these forward-looking statements.
© 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Add to Digg Bookmark with del.icio.us Add to Newsvine
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs