Weitere ähnliche Inhalte Ähnlich wie Presentación Jeff Brown, HP en VI Summit País Digital 2018 (20) Mehr von PAÍS DIGITAL (20) Kürzlich hochgeladen (20) Presentación Jeff Brown, HP en VI Summit País Digital 20181. Cyber Security Threat Trends and
End Point Defenses
Jeff Brown
WW Head of Personal Systems Professional Services
HP
HP Confidential. For use under Confidential Disclosure Agreement only. © Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without notice.
2. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The Changing Threat Landscape
2018 Trends
3. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/Application testing, Deficit of
Security Professionals, Lack of employee security education …
4. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
5. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
6. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
3. Blockchain Revolution
7. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
3. Blockchain Revolution
4. The rise of Ransomware and Organized Crime
8. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Breaches and Perpetrators
120.248
4.753
Source: Verizon DBIR 2017
Incidents
Breaches
Top Five Threat Agents (by
effectiveness)
• Private Criminal Organizations
• Advanced Persistent Threat (APT)
• Information Partners and Vendors
• Disgruntled, Reckless, or Untrained
Employees
• Civil Activists
9. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Who are the Hackers?
-The 2018 Black Report
10. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Who are the Hackers?
-The 2018 Black Report
11. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
What does an Attach look like?
-The 2018 Black Report
12. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
What does an attach look like?
-The 2018 Black Report
13. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Is it Static?
-The 2018 Black Report
14. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Hackers Advice
-The 2018 Black Report
15. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The Changing Threat Landscape
End Point Defenses
16. HP: Experiences for the Modern Workforce
DESIGN
for the way you work
and live
SECURITY
to work anywhere
COLLABORATION
for connecting & creating
17. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
EVERY PC & PRINTER DECISION
IS A SECURITY DECISION
18. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Detect
Increase protection at all
levels of compute platform
Continuous business
productivity, lower TCO
and seamless recovery
Even when protections
fail (and they will),
proactive detection is
essential
Ultimate Goal – No Downtime!
Protect
Recover
SECURITY THAT’S “BUILT-IN, NOT BOLTED ON”
DESIGNED FOR CYBER-RESILIENCE
19. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
MANY USERS THINK SECURITY IS DIFFICULT –
When a user finds security difficult, they work around it…
20. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The next generation of the
WORLD’S MOST SECURE & MANAGEABLE PCs1
S E C U R I T Y
B U I LT - I N n o t B O LT E D O N
20
21. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP’s 2018 SECURITY STACK
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
NEW Additions and Updates
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
21
22. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP’s 2018 SECURITY STACK
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
NEW Additions and Updates
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
22
23. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability Infrastructure,
Visual Hackers
OPEN DOORS
Security tools are useless unless policies are
enforced. Manageability is required to make
security effective
!
COMMON TARGET
Unpatched software vulnerabilities are easy to exploit.
Malicious websites, infected downloads
!
IDEAL TARGET
Complex target, but successful attacks mean persistence,
stealth, and access to almost anything they want
!!!BELOW THE OS
Firmware (BIOS, etc.)
HARDWARE
Most Secure. Extremely difficult for hackers and
malware to penetrate.
THREATS TARGET EVERY LEVEL OF THE SYSTEM
23
24. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
24
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
25. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
A SECURE SYSTEM REQUIRES A HARDENED
ROOT OF TRUST
25
To protect against the malware
of the future PCs must have
security rooted in HARDWARE
• Out of reach of malware attacks
• Independent of the BIOS and OS
• Can’t be tampered with
26. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP Endpoint Security Controller
Since 2014, HP has integrated the
HP Endpoint Security Controller
into our HP Elite PCs.
This unique hardware enables solutions that are in turn trustworthy,
such as HP Sure Start2, the World’s First and Only Self-Healing BIOS.
26
27. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
GROUNDING SECURITY IN HARDWARE
27
to create a cyber resilient system in the face of unexpected attacks.
The HP Endpoint Security Controller
enables solutions that are:
Hardware Enforced Self-Healing Manageable
28. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
PROTECTING ALL LEVELS OF THE PC
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability
BELOW THE OS
Firmware (BIOS, etc.)
Hardware
ENFORCE COMPLIANCE
HP Management Integration Toolkit6
HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
STRENGTHEN THE OS
HP Sure Run3, HP Sure Click8, HP Sure Recover4
HP MIK ensures the systems continues working as it should
28
29. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
29
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
30. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS
Protect your BIOS with HP Sure Start Gen4 2
HP Sure Start is the industry’s first
and still the only self-healing BIOS.
The BIOS is the first million lines of code that run.
It is the key to your PC’s foundation.
Why should customers care?
Once the BIOS is corrupted, the hackers “own”
your PC: all other protection is useless.
Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS!
30
31. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
31
32. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
MINIMIZE DOWNTIME
Recover quickly with HP Sure Recover4
32
HP Sure Recover offers secure,
automated, network-based
software image recovery.
Using the HP Endpoint Security Controller, it can
quickly and securely reimage machines to HP’s
or the company’s latest software image - using
only an internet connection
!
Because HP Sure Recover4 is based in hardware, you can
reimage a PC, even from a bare hard drive.
33. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
REIMAGE ON DEMAND OR ON SCHEDULE
RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE.
User initiated IT scheduled!
FRESH START: IT can schedule routine
reimaging, so malware doesn’t have a
chance to stick around.
• Ideal for Hospitality, Retail,
Healthcare, Education, etc.
ENABLING USERS to quickly reimage
their own machines without IT support
AUTOMATED RECOVERY:
If no OS is found, the PC will
automatically present the user the
option to reimage
FLEXIBLE: Defaults to latest HP image,
or may be configured in firmware to
recover custom enterprise image
33
34. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
34
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
35. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
WORK FREELY IN PUBLIC SPACES
HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12
Now in it’s SECOND GENERATION, HP Sure View Gen2
enables a better visual experience in light OR dark
environments – from the plane to the café
What’s New
• Performs great in BRIGHT and DARK environments
• IPS panel technology
• Improved 120Hz REFRESH RATE, for smooth motion
• Reduced display thickness - ULTRA-THIN DESIGNS
HP Sure View Gen27 protects against
visual hacking with the press of a button.
35
36. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Detect
Increase protection at all
levels of compute platform
Continuous business
productivity, lower TCO
and seamless recovery
Even when protections
fail (and they will),
proactive detection is
essential
Ultimate Goal – No Downtime!
Protect
Recover
SECURITY THAT’S “BUILT-IN, NOT BOLTED ON”
DESIGNED FOR CYBER-RESILIENCE
37. For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
EVERY PC & PRINTER DECISION
IS A SECURITY DECISION