Presentation is loading. Please wait.

Presentation is loading. Please wait.

HP & Symantec Security Solution Partnership

Similar presentations


Presentation on theme: "HP & Symantec Security Solution Partnership"— Presentation transcript:

1 HP & Symantec Security Solution Partnership
Will someone introduce us? Guy – introduction of self Chris – introduction of self Guy – why we are here and what we want to talk about HP & Symantec Security Solution Partnership Steve Godfrey : HP Security Practice Principal

2 HP – Symantec Partnership
Agenda Why HP & Symantec Today’s security challenges Enterprise security journey HP/Symantec - Security Solutions Partnership Proactive Security approach Benefits of the HP/Symantec Partnership Chris – run through the agenda HP – Symantec Partnership

3 HP – Symantec Partnership
Why HP & Symantec ? Leveraging the best in the industry Symantec World’s leading security vendor Comprehensive Security Technologies HP World’s largest information technology company Leader in IT Management solutions Proven integration of complex multi-vendor environments One stop shop for holistic security solutions Comprehensive Solutions for the next stage of your security journey Enable alignment between IT security and the business Reduced risk through two major global players Guy – cover first bullet and sub bullets Chris cover bottom 4 bullets HP – Symantec Partnership

4 The Top Security Challenges
Analysing and mitigating increasingly complex threats Protecting information throughout its lifecycle Measuring, tracking and reporting on security metrics March 2007 Keep The Bad Guys Out Keep The Good Guys In Guy – run through the Forrester Quote – see below for background only from article – need not go through all of this CISOs FACE NEW CHALLENGES AND COULD USE SOME HELP Every new year brings new attack strategies from hackers, greater pressure from management for results, the potential of changing legislative and regulatory environments, and shifting organizational priorities. CISOs face the challenge of: 1. Analyzing and mitigating increasingly complex threats. CISOs are threatened by the complexity of attacks and an increase in the number of zero-day vulnerability exploits.1 Most worrying are targeted threats, meaning those meant to snare the customers or employees of a single company or community.2 Rootkits — attack tools that conceal their presence on the victim’s machine — have also been a popular strategy for attackers in 2006 and prove to be exceedingly difficult to detect and remove. Just keeping track of new vulnerabilities, detecting which ones are applicable to you, and applying appropriate configuration changes and patches is not enough anymore. CISOs need help in devising strategies to monitor, protect, and respond to complex threats.3 2. Measuring, tracking, and reporting on security metrics. Executive management now expects regular progress reporting from the CISO and justification of the security spending dollars they propose.4 Business partners want reports for security accountability as well. Having a well defined metrics program not only fulfills all these external expectations but also enables the CISO to measure the effectiveness of the security program.5 CISOs need help in using metrics to measure their security posture, set their goals, track their progress, prioritize their security initiatives, and justify their security spending. 3. Protecting information throughout its life cycle. Sources including government regulations and copious press coverage of data loss and identity theft have increased the pressure on businesses to better protect information. CISOs are struggling to comply with new regulations to safeguard consumer, financial, healthcare, and employee data. A host of technologies are available to solve pieces of the problem, including encryption, endpoint security, and information leak prevention (ILP). Strong authentication and identity and access management can augment these technologies in providing life-cycle protection. But integrating and operating all of these solutions and auditing to ensure you haven’t left any gaps can be a nightmare. CISOs will need help in defining a comprehensive strategy and strong processes for identifying, classifying, handling, tracking, storing, and disposing of information. Chris – run through bottom diagram €$£¥ Manage Risk HP – Symantec Partnership

5 Understanding The Threat
Guy – mention that Symantec are experts in understanding the threat and the regular threat reports HP – Symantec Partnership

6 HP-Symantec Enterprise Security Solutions Partnership
IT Management Products Design, Implement, Deploy Monitor, Support, Manage Consulting & Integration Chris – why we are working together Guy – what Symantec are bringing to the partnership Chris – what HP are bringing to the partnership Design & Implementation Security Infrastructure & Management Products Managed Security Services IT Security Products HP – Symantec Partnership

7 HP – Symantec Partnership
Security is a Journey From a ‘chaotic’ to an ‘adaptive’ strategy Increasing alignment between IT security and the business Each stage has increasing benefits Companies are at different stages on the journey Chris – explanation of the journey Where are you? HP – Symantec Partnership

8 HP – Symantec Partnership
Making the Jump Proactive Business based Process focussed Integrated solutions Holistic approach Risk management Reactive Guy – explain the transition between reactive and proactive IT based Asset focussed Point implementation Product centric Technology management HP – Symantec Partnership

9 Proactive Security Approach
Chris – explain the proactive approach HP – Symantec Partnership

10 Enterprise Security Solutions: HP & Symantec Solutions Partnership
Assessing, planning, design, implementation and rollout of a proactive security solution around HP & Symantec Security Products Guy – just summarise the individual building blocks where we are jointly working We have value propositions and proactive solutions involving product, process and people. Compliance Management Security Information Management Endpoint Security Security & Retention Demonstrate due care to internal and external auditors with dashboard views that display percentage of compliance across the enterprise. Real-time global security intelligence to proactively detect, remediate and measure ongoing threats Centrally managed policy definition enforced by an agent on endpoint to ensure protection and compliance before network access is granted Increases the security of information by stopping unwanted and effectively archiving and retrieving messages HP – Symantec Partnership

11 ITSM SIM IDAM NAC & IF The Next Step Governance Risk Compliance
IT Service Management Security Information Management ITSM SIM I N F O R M Governance Risk Compliance Chris – Introduce idea of key enterprise processes as part of proactive approach Chris – cover ITSM and IDM components Guy – cover SIM and NAC/IF components Both – GRC component GRC – Governance Risk & Compliance D A S H B O A R D IDAM NAC & IF Identity & Access Management Network Access Control & Information Foundation HP – Symantec Partnership

12 Integrating Symantec SIM and HP Management Software
SNOC - Event Management and Operation Framework HP Dashboard HP Service Desk HP Service View (HP Operation (ITIL) HPOVO Symantec SIM HPOV Spi’s HP Network Node Manager HPOV Spi’s Applications AV VA IDS F/W Applications Routers Switches Servers CPE Guy – Symantec SIM – what is it… Chris – Discuss the Integration into OpenView SOC – Secure Operations Centre NOC – Network Operations Centre HP – Symantec Partnership

13 Integrating Identity Management & End Point Security
Safeguarding Corporate Assets Identity based network access enforcement Identity lifecycle information control Consolidated auditing & reporting Enhanced levels of information leakage protection “Right person, wrong place” Allows control over information so as to stop misuse or data theft “Wrong person, right place” Ability to prove the compliance of end point and application control “Who has done what, where?” Symantec Network Access Control Symantec Sygate Enterprise Protection Symantec Network Access Control Guy – say what Symantec NAC and Endpoint Security offerings are Chris – Describe the integration with HP IDAM Symantec Sygate Enterprise Protection HP Select Access HP Select Identity HP Select Audit HP Services HP – Symantec Partnership

14 HP – Symantec Partnership
Why HP & Symantec ? Leveraging the best in the industry Symantec World’s leading security vendor Comprehensive Security Technologies HP World’s largest information technology company Leader in IT Management solutions Proven integration of complex multi-vendor environments One stop shop for holistic security solutions Comprehensive Solutions for the next stage of your security journey Enable alignment between IT security and the business Reduced risk through two major global players Guy – cover first bullet and sub bullets Chris cover bottom 4 bullets HP – Symantec Partnership

15 HP – Symantec Partnership
INFORM and IAD IAD Information Assurance Dashboard INFORM Information Assurance Risk Model HP – Symantec Partnership

16 HP – Symantec Partnership
Security Is A Journey: In partnership with Symantec & HP you can Effectively address threats and vulnerabilities Proactively respond to prevent incidences Improve ROI on Security investments Control spending for clearly visible returns Create a trusted IT infrastructure Able to adapt to changing demands Satisfy regulatory requirements & establish best practices Ensure compliance & protect the enterprise by addressing information security risks Lower operational risks and costs Move to a proactive security posture and address security threats before disruptions occur Each bullet: Guy – 1st Chris – 2nd Guy – 3rd Chris -4th Guy – 5th HP – Symantec Partnership

17 Thank You! Steve Godfrey : HP Security Practice Principal
Guy – Hope we have helped you see the benefit of the HP-Symantec relationship Chris – So, if you want help on your security journey – please come and talk to us. Thanks for your time It’s goodnight from me and goodnight from him…… Steve Godfrey : HP Security Practice Principal Copyright © 2007 Symantec Corporation. All rights reserved.  Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries.  Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising.  All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law.  The information in this document is subject to change without notice.


Download ppt "HP & Symantec Security Solution Partnership"

Similar presentations


Ads by Google