Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
WASHINGTON, DC -- (Marketwired) -- 09/17/13 -- HP (NYSE: HPQ) today announced new products and services that enable enterprises to disrupt the adversary marketplace, manage risk and extend their security capabilities to better protect themselves against a growing threat landscape.
Cybercrime continues to increase, with 92 percent of Forbes Global 2000 companies reporting data breaches in the last 12 months.(1) This growth is due to adversaries forming a more sophisticated and collaborative marketplace through which they share information and advanced data theft tools. Studies estimate that the global cybercrime black market has a value of $104 billion per year.(2)
Evolving regulatory and legislative requirements are further adding to enterprises' security burden, with an estimated average cost of noncompliance at $13.7 million for global organizations.(2) Additionally, in the world of bring your own device (BYOD), IT no longer controls the endpoint, offering the adversary many more control points to attack.
HP's new products and services enable enterprises to approach their security challenges with a single view of information security, and to manage risk and compliance. Leveraging HP's industry-leading security research and security professionals, these new offerings are designed to help organizations disrupt the adversary marketplace, optimize their risk postures and extend their own capabilities.
"Enterprises today aren't facing a single attacker; they are fighting a well-organized, well-funded adversary marketplace," said Art Gilliland, senior vice president and general manager, Enterprise Security Products, HP. "To succeed in thwarting attacks, you need a trusted partner that can provide end-to-end security with enhanced threat intelligence to disrupt the adversary. Only HP can deliver this."
"An organization extends well beyond its four walls -- it's made up of a vast ecosystem of suppliers, devices that can go anywhere and, not to mention, a web that is literally worldwide," said Arthur Wong, senior vice president and general manager, Enterprise Security Services, HP. "HP helps clients reduce risk and manage the complexities of protecting the flow of information -- both internally and externally -- enabling them to focus on driving innovation."
Disrupting the adversary through next-generation solutions
HP's approach to security disrupts the life cycle of an attack with prevention and real-time threat detection, from the application layer to the hardware and software interface.
New and enhanced HP offerings provide real-time threat disruption and self-healing technology combined with crowd-sourced security intelligence:
Manage risk exposure through security services
As the adversary marketplace intensifies, internal security teams are struggling to respond to the velocity and severity of threats.
HP Managed Security Services (MSS) help internal security teams accelerate threat identification, response and remediation by providing expertise and advanced security intelligence. With HP MSS, intrusions are detected within 11.8 minutes, and 92 percent of major incidents are resolved within two hours of identification.(3) HP MSS security professionals also possess global and regional knowledge of legal, regulatory and standard developments to improve overall risk posture.
New offerings from HP MSS and HP Enterprise Services help boost security posture, manage regulatory challenges and reduce risk:
Extending capabilities with personnel depth
Despite spending more on cybersecurity, chief information officers (CIOs) and chief information security officers (CISOs) are still challenged with identifying, retaining and educating security professionals. HP Enterprise Security offers a combined 657 million hours of expertise that extend customers' capabilities and complement existing resources.
The new HP Security Risk and Controls Advisory Services for Mobility enable organizations to understand, identify and implement an effective security strategy to manage employee-owned devices in the enterprise.
HP's annual enterprise security event, HP Protect, takes place Sept. 16-19 in Washington, D.C.
HP's premier EMEA client event, HP Discover, takes place Dec. 10-12 in Barcelona, Spain.
About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.
(1) Ponemon Institute, "Enterprise Security Benchmark Survey," November 2012.
(2) Ponemon Institute, "Mega Trends in Cyber Security Expert Opinion Study," May 2013.
(3) HP internal research: Average time from intrusion through HP acknowledgement, effective June 2013. Volume of incidents, global threat activity and quantity of monitored data logs may vary.
This news release contains forward-looking statements that involve risks, uncertainties and assumptions. If such risks or uncertainties materialize or such assumptions prove incorrect, the results of HP and its consolidated subsidiaries could differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including but not limited to statements of the plans, strategies and objectives of management for future operations; any statements concerning expected development, performance, market share or competitive performance relating to products and services; any statements regarding anticipated operational and financial results; any statements of expectation or belief; and any statements of assumptions underlying any of the foregoing. Risks, uncertainties and assumptions include the need to address the many challenges facing HP's businesses; the competitive pressures faced by HP's businesses; risks associated with executing HP's strategy; the impact of macroeconomic and geopolitical trends and events; the need to manage third party suppliers and the distribution of HP's products and services effectively; the protection of HP's intellectual property assets, including intellectual property licensed from third parties; risks associated with HP's international operations; the development and transition of new products and services and the enhancement of existing products and services to meet customer needs and respond to emerging technological trends; the execution and performance of contracts by HP and its suppliers, customers and partners; the hiring and retention of key employees; integration and other risks associated with business combination and investment transactions; the execution, timing and results of restructuring plans, including estimates and assumptions related to the cost and the anticipated benefits of implementing those plans; the resolution of pending investigations, claims and disputes; and other risks that are described in HP's Quarterly Report on Form 10-Q for the fiscal quarter ended April 30, 2013 and HP's other filings with the Securities and Exchange Commission, including HP's Annual Report on Form 10-K for the fiscal year ended October 31, 2012. HP assumes no obligation and does not intend to update these forward-looking statements.
© 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Add to Digg Bookmark with del.icio.us Add to Newsvine
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs