SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Cyber Security Threat Trends and
End Point Defenses
Jeff Brown
WW Head of Personal Systems Professional Services
HP
HP Confidential. For use under Confidential Disclosure Agreement only. © Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without notice.
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The Changing Threat Landscape
2018 Trends
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/Application testing, Deficit of
Security Professionals, Lack of employee security education …
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
3. Blockchain Revolution
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
FY18 Trends
GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of
Security Professionals, Lack of employee security education …
1. IOT Vulnerability Continues
2. AI Expansion – The Good and The Bad
3. Blockchain Revolution
4. The rise of Ransomware and Organized Crime
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Breaches and Perpetrators
120.248
4.753
Source: Verizon DBIR 2017
Incidents
Breaches
Top Five Threat Agents (by
effectiveness)
• Private Criminal Organizations
• Advanced Persistent Threat (APT)
• Information Partners and Vendors
• Disgruntled, Reckless, or Untrained
Employees
• Civil Activists
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Who are the Hackers?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Who are the Hackers?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
What does an Attach look like?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
What does an attach look like?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Is it Static?
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Hackers Advice
-The 2018 Black Report
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The Changing Threat Landscape
End Point Defenses
HP: Experiences for the Modern Workforce
DESIGN
for the way you work
and live
SECURITY
to work anywhere
COLLABORATION
for connecting & creating
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
EVERY PC & PRINTER DECISION
IS A SECURITY DECISION
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Detect
Increase protection at all
levels of compute platform
Continuous business
productivity, lower TCO
and seamless recovery
Even when protections
fail (and they will),
proactive detection is
essential
Ultimate Goal – No Downtime!
Protect
Recover
SECURITY THAT’S “BUILT-IN, NOT BOLTED ON”
DESIGNED FOR CYBER-RESILIENCE
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
MANY USERS THINK SECURITY IS DIFFICULT –
When a user finds security difficult, they work around it…
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
The next generation of the
WORLD’S MOST SECURE & MANAGEABLE PCs1
S E C U R I T Y
B U I LT - I N n o t B O LT E D O N
20
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP’s 2018 SECURITY STACK
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
NEW Additions and Updates
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
21
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP’s 2018 SECURITY STACK
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
NEW Additions and Updates
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
22
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability Infrastructure,
Visual Hackers
OPEN DOORS
Security tools are useless unless policies are
enforced. Manageability is required to make
security effective
!
COMMON TARGET
Unpatched software vulnerabilities are easy to exploit.
Malicious websites, infected downloads
!
IDEAL TARGET
Complex target, but successful attacks mean persistence,
stealth, and access to almost anything they want
!!!BELOW THE OS
Firmware (BIOS, etc.)
HARDWARE
Most Secure. Extremely difficult for hackers and
malware to penetrate.
THREATS TARGET EVERY LEVEL OF THE SYSTEM
23
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
24
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
A SECURE SYSTEM REQUIRES A HARDENED
ROOT OF TRUST
25
To protect against the malware
of the future PCs must have
security rooted in HARDWARE
• Out of reach of malware attacks
• Independent of the BIOS and OS
• Can’t be tampered with
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP Endpoint Security Controller
Since 2014, HP has integrated the
HP Endpoint Security Controller
into our HP Elite PCs.
This unique hardware enables solutions that are in turn trustworthy,
such as HP Sure Start2, the World’s First and Only Self-Healing BIOS.
26
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
GROUNDING SECURITY IN HARDWARE
27
to create a cyber resilient system in the face of unexpected attacks.
The HP Endpoint Security Controller
enables solutions that are:
Hardware Enforced Self-Healing Manageable
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
PROTECTING ALL LEVELS OF THE PC
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability
BELOW THE OS
Firmware (BIOS, etc.)
Hardware
ENFORCE COMPLIANCE
HP Management Integration Toolkit6
HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
STRENGTHEN THE OS
HP Sure Run3, HP Sure Click8, HP Sure Recover4
HP MIK ensures the systems continues working as it should
28
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
29
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS
Protect your BIOS with HP Sure Start Gen4 2
HP Sure Start is the industry’s first
and still the only self-healing BIOS.
The BIOS is the first million lines of code that run.
It is the key to your PC’s foundation.
Why should customers care?
Once the BIOS is corrupted, the hackers “own”
your PC: all other protection is useless.
Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS!
30
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
31
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
MINIMIZE DOWNTIME
Recover quickly with HP Sure Recover4
32
HP Sure Recover offers secure,
automated, network-based
software image recovery.
Using the HP Endpoint Security Controller, it can
quickly and securely reimage machines to HP’s
or the company’s latest software image - using
only an internet connection
! 
Because HP Sure Recover4 is based in hardware, you can
reimage a PC, even from a bare hard drive.
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
REIMAGE ON DEMAND OR ON SCHEDULE
RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE.
User initiated IT scheduled!
FRESH START: IT can schedule routine
reimaging, so malware doesn’t have a
chance to stick around.
• Ideal for Hospitality, Retail,
Healthcare, Education, etc.
ENABLING USERS to quickly reimage
their own machines without IT support
AUTOMATED RECOVERY:
If no OS is found, the PC will
automatically present the user the
option to reimage
FLEXIBLE: Defaults to latest HP image,
or may be configured in firmware to
recover custom enterprise image
33
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
HP ENDPOINT SECURITY STACK 2018
34
ABOVE
THE OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager Gen4
• HP Multi-Factor Authenticate Gen25
MFA with hardened policies, 3-factor, face log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and Updates
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
WORK FREELY IN PUBLIC SPACES
HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12
Now in it’s SECOND GENERATION, HP Sure View Gen2
enables a better visual experience in light OR dark
environments – from the plane to the café
What’s New
• Performs great in BRIGHT and DARK environments
• IPS panel technology
• Improved 120Hz REFRESH RATE, for smooth motion
• Reduced display thickness - ULTRA-THIN DESIGNS
HP Sure View Gen27 protects against
visual hacking with the press of a button.
35
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
Detect
Increase protection at all
levels of compute platform
Continuous business
productivity, lower TCO
and seamless recovery
Even when protections
fail (and they will),
proactive detection is
essential
Ultimate Goal – No Downtime!
Protect
Recover
SECURITY THAT’S “BUILT-IN, NOT BOLTED ON”
DESIGNED FOR CYBER-RESILIENCE
For use with customers under current Confidential Disclosure Agreement only.
© Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice.
EVERY PC & PRINTER DECISION
IS A SECURITY DECISION
THANK YOU
HP Confidential. For use with HP customers under HP CDA only

Weitere ähnliche Inhalte

Ähnlich wie Presentación Jeff Brown, HP en VI Summit País Digital 2018

Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
pietvz
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
dianadvo
 

Ähnlich wie Presentación Jeff Brown, HP en VI Summit País Digital 2018 (20)

HP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for youHP Enterprise Software: Making your applications and information work for you
HP Enterprise Software: Making your applications and information work for you
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
Take the Big Data Challenge - Take Advantage of ALL of Your Data 16 Sept 2014
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web DayHow often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
How often do Your Machines and People talk? Humanizing the IoT - AWS IoT Web Day
 
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEnWCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
 
HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
UX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBMUX STRAT USA 2018 Presentation: Joe Meersman, IBM
UX STRAT USA 2018 Presentation: Joe Meersman, IBM
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 

Mehr von PAÍS DIGITAL

Mehr von PAÍS DIGITAL (20)

Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País DigitalPresentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
Presentación Marco Nicolini, DUOC-UC en Jornada Pyme País Digital
 
Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital Recomendaciones para Videoconferencias - País Digital
Recomendaciones para Videoconferencias - País Digital
 
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
Presentación Ciro Cattuto, ISI Foundation en VI Summit País Digital 2018
 
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
Presentación Alberto Rodríguez , World Bank en VI Summit País Diigtal 2018
 
Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018Presentación Jose Melchert , Google en VI Summit País Digital 2018
Presentación Jose Melchert , Google en VI Summit País Digital 2018
 
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
Presentación Pamela Gidi, Subsecertaria Telecomunicaciones en VI Summit País ...
 
Presentación de Priscila Oliva, American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva,  American Tower Chile en VI Summit País DigitalPresentación de Priscila Oliva,  American Tower Chile en VI Summit País Digital
Presentación de Priscila Oliva, American Tower Chile en VI Summit País Digital
 
Presentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País DigitalPresentación de Esteban Rodríguez, Accenture en VI Summit País Digital
Presentación de Esteban Rodríguez, Accenture en VI Summit País Digital
 
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
Presentación Claudio Perek, IBM en Vi Summit País Digital 2018
 
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
Presentación de Gloria Hutt, Ministra Transportes y Telecomunicaciones en Sum...
 
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
Presentación Gonzalo Blumel, Ministro Segpres, Summit País Diigtal 2018
 
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
Presentación Ines Locatelli, Chatbot for Good - Oracle Chile en Vi Summit Paí...
 
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
Presentación Virginia Dias, Sima Robot en el VI Summit País Digital 2018
 
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
Presentación Alejandro Herrera, Transbank en VI Summit País Digital 2018
 
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
Presentación César Cernuda, Microsoft en el marco del VI Summit País Digital ...
 
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
Presentación de Arun Ramachandra, Tata Consultancy Services en VI Summit País...
 
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
Presentación Alejandro Gorodetzky y Mariano Duran, Wilobank-Indra Summit País...
 
Presentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País DigitalPresentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
Presentación Joseph Lichtenberg, InterSystems en VI Summit País Digital
 
Presentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País DigitalPresentación Elena Gil, Telefónica en VI Summit País Digital
Presentación Elena Gil, Telefónica en VI Summit País Digital
 
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
Presentación Subsecretario de Economía, Ignacio Guerreo en Simposio Tendencia...
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Presentación Jeff Brown, HP en VI Summit País Digital 2018

  • 1. Cyber Security Threat Trends and End Point Defenses Jeff Brown WW Head of Personal Systems Professional Services HP HP Confidential. For use under Confidential Disclosure Agreement only. © Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without notice.
  • 2. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The Changing Threat Landscape 2018 Trends
  • 3. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/Application testing, Deficit of Security Professionals, Lack of employee security education …
  • 4. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues
  • 5. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad
  • 6. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad 3. Blockchain Revolution
  • 7. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad 3. Blockchain Revolution 4. The rise of Ransomware and Organized Crime
  • 8. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Breaches and Perpetrators 120.248 4.753 Source: Verizon DBIR 2017 Incidents Breaches Top Five Threat Agents (by effectiveness) • Private Criminal Organizations • Advanced Persistent Threat (APT) • Information Partners and Vendors • Disgruntled, Reckless, or Untrained Employees • Civil Activists
  • 9. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Who are the Hackers? -The 2018 Black Report
  • 10. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Who are the Hackers? -The 2018 Black Report
  • 11. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. What does an Attach look like? -The 2018 Black Report
  • 12. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. What does an attach look like? -The 2018 Black Report
  • 13. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Is it Static? -The 2018 Black Report
  • 14. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Hackers Advice -The 2018 Black Report
  • 15. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The Changing Threat Landscape End Point Defenses
  • 16. HP: Experiences for the Modern Workforce DESIGN for the way you work and live SECURITY to work anywhere COLLABORATION for connecting & creating
  • 17. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. EVERY PC & PRINTER DECISION IS A SECURITY DECISION
  • 18. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Detect Increase protection at all levels of compute platform Continuous business productivity, lower TCO and seamless recovery Even when protections fail (and they will), proactive detection is essential Ultimate Goal – No Downtime! Protect Recover SECURITY THAT’S “BUILT-IN, NOT BOLTED ON” DESIGNED FOR CYBER-RESILIENCE
  • 19. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. MANY USERS THINK SECURITY IS DIFFICULT – When a user finds security difficult, they work around it…
  • 20. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The next generation of the WORLD’S MOST SECURE & MANAGEABLE PCs1 S E C U R I T Y B U I LT - I N n o t B O LT E D O N 20
  • 21. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP’s 2018 SECURITY STACK ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller NEW Additions and Updates HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices 21
  • 22. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP’s 2018 SECURITY STACK ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller NEW Additions and Updates HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices 22
  • 23. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability Infrastructure, Visual Hackers OPEN DOORS Security tools are useless unless policies are enforced. Manageability is required to make security effective ! COMMON TARGET Unpatched software vulnerabilities are easy to exploit. Malicious websites, infected downloads ! IDEAL TARGET Complex target, but successful attacks mean persistence, stealth, and access to almost anything they want !!!BELOW THE OS Firmware (BIOS, etc.) HARDWARE Most Secure. Extremely difficult for hackers and malware to penetrate. THREATS TARGET EVERY LEVEL OF THE SYSTEM 23
  • 24. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 24 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 25. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. A SECURE SYSTEM REQUIRES A HARDENED ROOT OF TRUST 25 To protect against the malware of the future PCs must have security rooted in HARDWARE • Out of reach of malware attacks • Independent of the BIOS and OS • Can’t be tampered with
  • 26. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP Endpoint Security Controller Since 2014, HP has integrated the HP Endpoint Security Controller into our HP Elite PCs. This unique hardware enables solutions that are in turn trustworthy, such as HP Sure Start2, the World’s First and Only Self-Healing BIOS. 26
  • 27. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. GROUNDING SECURITY IN HARDWARE 27 to create a cyber resilient system in the face of unexpected attacks. The HP Endpoint Security Controller enables solutions that are: Hardware Enforced Self-Healing Manageable
  • 28. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. PROTECTING ALL LEVELS OF THE PC IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability BELOW THE OS Firmware (BIOS, etc.) Hardware ENFORCE COMPLIANCE HP Management Integration Toolkit6 HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 STRENGTHEN THE OS HP Sure Run3, HP Sure Click8, HP Sure Recover4 HP MIK ensures the systems continues working as it should 28
  • 29. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 29 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 30. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS Protect your BIOS with HP Sure Start Gen4 2 HP Sure Start is the industry’s first and still the only self-healing BIOS. The BIOS is the first million lines of code that run. It is the key to your PC’s foundation. Why should customers care? Once the BIOS is corrupted, the hackers “own” your PC: all other protection is useless. Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS! 30
  • 31. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates 31
  • 32. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. MINIMIZE DOWNTIME Recover quickly with HP Sure Recover4 32 HP Sure Recover offers secure, automated, network-based software image recovery. Using the HP Endpoint Security Controller, it can quickly and securely reimage machines to HP’s or the company’s latest software image - using only an internet connection !  Because HP Sure Recover4 is based in hardware, you can reimage a PC, even from a bare hard drive.
  • 33. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. REIMAGE ON DEMAND OR ON SCHEDULE RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE. User initiated IT scheduled! FRESH START: IT can schedule routine reimaging, so malware doesn’t have a chance to stick around. • Ideal for Hospitality, Retail, Healthcare, Education, etc. ENABLING USERS to quickly reimage their own machines without IT support AUTOMATED RECOVERY: If no OS is found, the PC will automatically present the user the option to reimage FLEXIBLE: Defaults to latest HP image, or may be configured in firmware to recover custom enterprise image 33
  • 34. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 34 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 35. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. WORK FREELY IN PUBLIC SPACES HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12 Now in it’s SECOND GENERATION, HP Sure View Gen2 enables a better visual experience in light OR dark environments – from the plane to the café What’s New • Performs great in BRIGHT and DARK environments • IPS panel technology • Improved 120Hz REFRESH RATE, for smooth motion • Reduced display thickness - ULTRA-THIN DESIGNS HP Sure View Gen27 protects against visual hacking with the press of a button. 35
  • 36. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Detect Increase protection at all levels of compute platform Continuous business productivity, lower TCO and seamless recovery Even when protections fail (and they will), proactive detection is essential Ultimate Goal – No Downtime! Protect Recover SECURITY THAT’S “BUILT-IN, NOT BOLTED ON” DESIGNED FOR CYBER-RESILIENCE
  • 37. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. EVERY PC & PRINTER DECISION IS A SECURITY DECISION
  • 38. THANK YOU HP Confidential. For use with HP customers under HP CDA only