Beruflich Dokumente
Kultur Dokumente
Rethinking
your enterprise
security
Critical priorities to consider
Table of contents
3 Executive summary
3 Change your security posture
4 The problem with a traditional approach to security
4 Build a sustainable security ecosystem
5 Start the journey to end-to-end security
5 Address the critical security priorities
7 Rethink your security strategy
8 Find out more
Executive summary
Technology is the fabric of the global community. And information
is the worlds most valuable commoditynow created, consumed,
and delivered with always-on connectivity.
The fact is that the world is constantly evolving, and always connected,
and your enterprise must be too. A business that embeds technology
into everything it does positions itself to meet whatever challenges
come along. But in a world where everything and everyone are
connected, that business can be open to harm.
Responding to continuous opportunity means you have to be
constantly aware: one step ahead of cyber attacks, and one step
ahead of security breaches. Your enterprise needs to be always
aware and ready to respond to the associated risks, so that you
avoid compliance issues, financial loss, and reputation damage.
Security for todays enterprise is not just about malware and
firewalls. As every chief information security officer (CISO) knows,
threats are now more persistent, sophisticated, and unpredictable
than ever before. CISOs also know that, in reality, it is impossible
to fully secure everything. Forward-thinking enterprises realize
that they need to focus on a sustainable approach to security
and risk managementone that is designed to address the new
wave of vulnerabilities that prevail due to increasing trends in IT
consumerization, mobility, social media, cloud computing, cyber
crime, and nation-state attacks.
HPs approach to helping you navigate these vulnerabilities is to
help you assess, transform, manage, and optimize an end-to-end
security environment.
Security operations
Data center
security
Network
security
Application
security
Endpoint
security
1. Assess
Assess your risk tolerance profile, compliance requirements,
operational requirements, organizational capabilities,
and resources
2. Transform
Transform your organizations approach to security from
managing it in silos to taking a holistic view
3. Manage
Manage the associated security transformation programs
required to deliver security in the most effective way, adopting
best-of-breed security technologies and flexible sourcing models
4. Optimize
Optimize by continually monitoring the environment to proactively
recommend operational and process improvements and initiatives
that will deliver an enhanced security and risk posture
Ask yourself:
Secure applications
You need to secure all the software that is a part of your business
processwhether it is software you build, outsource, use from open
source, or purchase. It is essential to identify risks in production
software, provide secure application lifecycle methodologies
for new application development, and enable rapid and costeffective remediation.
Ask yourself:
How can I reduce security liability for licensed, cloud, and
in-house apps?
How can I start to build security into the early phase of
software development?
How can I control the use of non-approved apps and downloads?
Compliance and
audit
Security
performance
management
Security
supplier
management
Threat and
risk
management
Security
architecture
Training and
awareness
Incident
management
Security change
control
Security operations
Risk assessment
and mitigation
Accreditation
and acceptance
testing
Identity and
access
management
Monitoring and
alerting
Security
information and
event
management
Data center
security
Network
security
Application
security
Endpoint
security
Intrusion prevention
Application delivery
Mobile security
Network security
Application security
Ask yourself:
How can I secure all of our endpoints without causing enormous
constraints on the business units?
How can I ensure secure printing both inside and outside
the firewall?
How do I mitigate risk due to an increasingly mobile workforce and
device sprawlsmartphones, tablets, non-supported devices?
How can your enterprise gain?
With an effective strategy for securing mobile devices and users,
you can:
Reduce risk by securing all endpoints, regardless of location
Reduce cost via central management and tool consolidation
Enable business agility through securing the mobile workforce
30%
market cap
reduction
as a result
of recent events
44%
of all data
breaches involve
third-party
mistakes
$6.75M
average cost
associated
with
data breach
Get connected
hp.com/go/getconnected