Through the division Enterprise Security Products, HP offers companies a set of hardware and software solutions suitable to meet the needs of detection of external and internal threats and to prepare response actions that intervene to protect data, applications and networks; all supported by an “intelligence” of global security and updated in real time.
We met Frank Mong , Vice President and General Manager Security Solutions, HP Enterprise Security Products on the occasion of his visit to Italy during the event HP Software Performance Tour to know the direction of evolution of the HP security.
What is a defining aspect of your proposed security?
Frank Mong: Three years ago we set up an organization called HP Security Research which has set some primary objectives.
The first is to be a leader in identifying vulnerabilities. HP promotes eight years the program Zero Day Initiative aimed at encouraging the discovery of vulnerabilities on which we continue to invest in a major way. Today HP Security Research is the first organization of the market in number of threats “zero day” identified, that is at least four times higher than our nearest competitor: for example, today more than half of all vulnerabilities related to Microsoft solutions is identified by HP.
It is a very important aspect because this level of intelligence allows us to construct the security features that integrate within technologies HP. Not only within the security products but also printers, PCs, storage systems and network. We use this information to develop virtual patches to detect attacks and close security holes of all kinds, not just those related to malware.
Another goal is to promote research on security software and best practices to ensure its development. It is a fundamental issue because today most of the software is not created from scratch but made by assembling components created by different people and that leaves open the way for countless vulnerabilities. With Fortify solutions, HP enables you to identify vulnerabilities inherent in each type of code and provides guidelines for developing software more secure and reliable.
What are the safety aspects on which to focus for effective protection?
FM: The basis of our actions is that block is the starting point, but does not exhaust the protection. Instead of focusing on blocking technologies, our approach focuses on security holes, both related to threats to internal and external attacks.
The malware is only a tool for cyber criminals, but the most effective tool is to be able to steal the credentials of someone, because this allows you to overcome all the barriers. The only way to tackle this is to analyze the behavior to identify anomalies.
It is then important to understand and know intimately the applications and potential vulnerabilities and control data, especially by large companies who need to grow up quickly because it often does not allow them to have full awareness and visibility of all the risks.
What is the security impact of phenomena such as cloud and BYOD?
FM: Aspects such as BYOD and cloud introduce new security challenges in terms of visibility and control.
In its network a company has available many tools to monitor and control the activities. But when operating on external infrastructure, for example Amazon, this visibility disappears. No information on resources and virtual machine and not have control over how they are managed performance and scalability. I believe that we will see the emergence of a new market that is the “cloud access security broker” who must first provide visibility on all these aspects.
HP what it can do in this regard?
FM: HP is the ideal partner to provide security in access to the cloud by providing visibility, security and governance through a combined and integrated approach where the policy for access technologies combine with network security, DLP, data encryption, Web Proxy and identity management. In this way we can provide protection for digital resources on-premises, for those moving off-premises, for the use of IaaS services such as Amazon Web Services and SaaS as salesforce.com and Office 365.
To which direction will you evolve your portfolio of security solutions?
We believe that the next challenge resides in the cloud and what we will do more and more is to take advantage of the security features against attacks and persistent threats developed for our IPS systems as well as our technology, “zero day” in order to integrate all ‘ Inside the HP Cloud Security Platform, thus centralizing security technologies and provided it is orchestration.
It is essential for us to protect applications through code analysis and the inclusion within it of “security intelligence”. Suffice it to say that a bug in an operating system for smartphones simultaneously impacts hundreds of millions of devices worldwide.
We care also put the foundation for developing secure software for the future. For example also focusing on open standards Docker representing a new approach to the development of the code, which focuses on independent and separate processes.
How is your offering?
FM: Our approach in the development of technology is not categorized as a function of solutions to protect hardware, software, networking and so on, but rather according to the different modes of attack and approach with which the cyber crime threatens companies. We invest in technology that simply help to defend the good from the bad. But technology alone does not solve problems; They serve the people, who work in controlled processes, with the correct tools. We focus on this. We do not aspire to cover all aspects, but we aim to be the best in some specialized areas: security research, security intelligence and everything that revolves around the data encryption and to their categorization and the protection of applications.
What’s the latest news?
FM: We have acquired six months ago Voltage Security, a company that has developed a unique format and proprietary encryption called HP Format Preserving Encryption. This technology provides encryption functions without altering the original format of the data and preserving referential integrity across distributed data sets. An important issue in a scenario of big data security because you can ensure the protection of data, even within Hadoop, without affecting performance in the research phase of the information. This solution will be included within a new range of products that will be covered by the brand Volta
No comments:
Post a Comment