HP Security Solutions for business PCs. Comprehensive protection measures so you can work smarter and with greater confidence.

Similar documents
HP Fortify Software Security Center

Make security part of your client systems refresh

Security Enhancements

THE HP Storageworks X510 Data Vault

Endpoint Protection with DigitalPersona Pro

HP Device as a Service (DaaS)

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Securing Today s Mobile Workforce

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

HP StorageWorks LTO-5 Ultrium tape portfolio

Symantec Small Business Solutions

CISCO SHIELDED OPTICAL NETWORKING

Toshiba EasyGuard in action:

Phishing is Yesterday s News Get Ready for Pharming

The Business Case for Virtualization

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

HP JetAdvantage Solutions

HP recommends Windows 10 Pro. HP Elite Slice. Customizable for your workplace and style

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

HP BladeSystem Matrix

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Mobile Data Security Essentials for Your Changing, Growing Workforce

QuickSpecs. HP Data Protector for Notebooks & Desktops software part numbers HP Data Protector for Notebooks & Desktops100 Pack

Challenges and. Opportunities. MSPs are Facing in Security

Teradata and Protegrity High-Value Protection for High-Value Data

Information Security in Corporation

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

CA Security Management

IT SECURITY FOR NONPROFITS

BREAK THE CONVERGED MOLD

Securing Information Systems

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Models PDC/O5000 9i W2K Cluster Kit B24

HPE ProLiant DL580 Gen10 Server

Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HP ProLiant ML370 G4 Storage Server

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

A comprehensive framework for securing virtualized data centers. Business white paper

HPE Intelligent Management Center

QuickSpecs HP Insight with Microsoft System Center Essentials 2010

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

Find the right platform for your server needs

HPE ProLiant ML350 Gen P 16GB-R E208i-a 8SFF 1x800W RPS Solution Server (P04674-S01)

HPE ProLiant DL360 Gen P 16GB-R P408i-a 8SFF 500W PS Performance Server (P06453-B21)

Management and Printing User Guide

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Spotlight Report. Information Security. Presented by. Group Partner

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

CipherCloud CASB+ Connector for ServiceNow

Information Security and Service Management. Security and Risk Management ISSM and ITIL/ITSM Interrelationship

Choosing the Right Solution for Strategic Deployment of Encryption

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

The Honest Advantage

HP ProCurve Manager Plus 3.0

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Managing EUC Threats. 3 Simple Ways To Improve Endpoint SECURITY

HP PROLIANT ML110 G7 SERVER

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Build Your Zero Trust Security Strategy With Microsegmentation

QuickSpecs. Solenoid Lock and Hood Sensor. HP Security Accessories Overview. Models. HP 2009 (SFF) Solenoid Lock and Hood Sensor

SECURING DEVICES IN THE INTERNET OF THINGS

HPE ProLiant ML110 Gen10 Server

10 easy steps to secure your retail network

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

Provide Your Customers with a New Compute Experience

WIDS Technology White Paper

HPE ProLiant ML350 Gen10 Server

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

ModernBiz Day. Safeguard Your Business. Sonia Blouin APAC Cloud Lead Microsoft Asia Pacific

A revolutionary visual security and analytics solution

Bill Wear. VirtualVault Product Manager. Internet Banking Case Study

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

AKAMAI CLOUD SECURITY SOLUTIONS

AT&T Endpoint Security

QuickSpecs. Aruba ClearPass Guest Software. Overview. Aruba ClearPass Guest Software A ClearPass Policy Manager Application.

Google Identity Services for work

Apex Information Security Policy

HP S1500 SSL Appliance. Product overview. Key features. Data sheet

Symantec Security Monitoring Services

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

McAfee Public Cloud Server Security Suite

Choosing the Right Security Assessment

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

QuickSpecs. What's New New 146GB Pluggable Ultra320 SCSI 15,000 rpm Universal Hard Drive. HP SCSI Ultra320 Hard Drive Option Kits (Servers) Overview

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Skybox Security Vulnerability Management Survey 2012

SafeNet Authentication Client

5 KEYS TO A WINNING TECHNOLOGY PARTNERSHIP

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

10 Hidden IT Risks That Might Threaten Your Business

SECURITY SERVICES SECURITY

Comprehensive Database Security

Transcription:

HP Security Solutions for business PCs Comprehensive protection measures so you can work smarter and with greater confidence.

Companies lose millions of dollars every year due to inadequate security. Informally-run IT departments, naive users and unwary employees can unintentionally expose customer data and trade secrets. HP can help reduce that risk.

Protect your IT infrastructure and your business In today s complex environment, safe-guarding your business requires comprehensive protection measures. The 2006 CSI/FBI Computer Crime and Security Survey revealed that 52 percent of survey respondents experienced unauthorized use of their computer systems in the last year. The average cost of security breaches was $167,713 per respondent. Since these losses are significant, the survey also indicated that companies are taking security risks more seriously and are developing ways to address the security coverage inside of their own organizations. Without appropriate security, your business faces substantial risk. According to the 2006 McAfee Virtual Criminology Report, the number of detected online threats reached 200,000 worldwide and that number is expected to double in the next 22 months. But threats don t just come in the form of viruses and worms security issues range from identity and data breaches, to access control concerns, policy and regulatory compliance requirements, and even malicious insider threats. You can proactively protect your identity, your assets, your network and your business. The broad range of comprehensive and scalable security solutions from HP fit the needs of any computing environment including small and mid-sized businesses, large enterprises and the public sector. HP solutions are simple to understand and easy to implement. We have renowned experience meeting the changing needs of evolving organizations, and our flexible and adaptable solutions will meet your needs today and into the future. HP security solutions are powerful and extensive, to help keep you protected. Are you as secure as you can be? To gauge the importance of security in your environment, ask yourself the following questions: What assets must your company protect? Why is it important to protect them? What will happen if they are compromised? What is the cost? How do you currently protect those assets? What are the internal and external security threats? Do you think your security measures are adequate? Will they be adequate in six months? A year? How will you improve security and reduce the risk of loss and intrusion? The importance of a security management policy The importance of a comprehensive security management policy can not be under estimated. PCs are on every desk. Laptops are toted from office to home to airport. The challenges of maintaining security when employees are sharing sensitive data with one another across continents or across lunch are enormous. Today, companies need to build security into every part of their IT system to reduce threats, protect privacy and maintain business continuity. Security threats have become more sophisticated and mature so should your security defenses. Help protect your identity, your assets and your network with the broad and comprehensive spectrum of security measures from HP. 3

Simple to use, simple to deploy Security measures are only effective if they are implemented properly. That is why ease-of-use is an integral part of HP client security solution design. Our client security solution is standards-based, designed to integrate into existing standards-based infrastructures and offers the essential building blocks to create a solid security foundation for any size organization. Flexible and adaptable Your security requirements are as ever-changing as your business. Integrated and modular security options and specialized services let you customize your solution to meet your unique requirements. Simply select the solutions that fit your particular needs now, and implement additional security elements as your business grows or new threats evolve. Our expandable, flexible architecture lets you determine the exact level of security for your unique environment now and in the future so you avoid the hassles of redeployment and can reduce training costs and time. Identity protection solutions HP ProtectTools security software suite offers an extremely powerful set of multi-factor authentication and access controls for more effective identity protection. The identity protection modules of the HP ProtectTools security software suite include: Embedded Security for HP ProtectTools Java Card Security for HP ProtectTools BIOS Configuration for HP ProtectTools Device Access Manager for HP ProtectTools Credential Manager for HP ProtectTools Password vaulting Multi-factor authentication Single sign-on Powerful and extensive Security from HP translates directly into comprehensive protection for your business-critical data. Our notebooks, desktops and workstations are designed with protection of your data in mind, and you can be confident that security is built in, not bolted on. Proprietary solutions only work with specific technologies. HP strives to provide innovative security solutions, but we also make sure our solutions are based on industry standards and will work within your existing standards-based environment. Our solutions help you address governmental and industry-specific regulatory compliance requirements and create additional future protection measures. Protect your identity Protecting access to the data on your notebook, desktop or workstation is the first line of defense in protecting your customers and your business. Three authentication factors help prove your identity: what you know, what you have and who you are. The more combinations of these factors that are required to prove your identity, the more secure your data. Protect your business assets What would happen if your business-critical, financial or customer data were to fall into the wrong hands? HP can help provide protection for both your digital and physical assets. Features such as Drive Encryption for HP ProtectTools, Personal Secure Drive (PSD) and Drive- Lock safeguard your data and give you peace of mind. The HP ProtectTools security software suite provides an extremely powerful set of tools that allows you to choose the level or combination of authentication factors to control access to your data and your PC. Our authentication technologies include biometrics, smart cards and the Trusted Platform Module (TPM) embedded security chip. 4

Data security solutions Help protect one of your most important assets, your data, with fully-tested and integrated security solutions from HP. TPM Enhanced DriveLock (HP Business Notebook PCs) DriveLock (HP Business Desktop and Notebook PCs) Drive Encryption for HP ProtectTools PSD Personal Secure Drive (encryption) Disk sanitizer HP ProtectTools Backup and Restore Secure backup/recovery (both HP and third party) HP Remote Graphics Software (HP Workstations) Workstation mirror disk capability Physical security solutions Proactively mitigate risk and save money by simply protecting the physical assets in your office environment. Because you need to secure your physical devices, HP has an assortment of hardware and software solutions that help protect your equipment with security cable locks, Smart Cover sensor and lock, memory change alert, port controller covers 1 and more. Smart Cover sensor and solenoid lock Memory change alert (HP Client Manager) Security cable locks and screws Asset tags Port control cover Wall-mounting sleeves Integrated work center Chassis clamp lock Computrace solution (Absolute Software) LoJack for laptops (available on HP Business Desktops and Notebooks) Protect your network The stakes are high you can t risk having your network compromised. Safeguard your business by preserving the integrity of your network with standards-based wireless networking protocols and security mechanisms that better protect data in your networked environment. Some of these measures include: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.1x and 802.2x dynamic encryption keys. Credential Manager for HP ProtectTools provides multifactor authentication, single sign-on and password management that will secure access to your PC as well as your network in case a notebook, desktop or workstation is lost or stolen. Network security solutions Safeguard your business by preserving the integrity of your network. Microsoft Windows XP/Vista PKI support Antivirus (60-day, full-version trial) Firewall (HP Business Notebooks) TPM embedded security chip Embedded Security for HP ProtectTools Credential Manager for HP ProtectTools 1 Not available in the United States 5

HP Consolidated Client Infrastructure (CCI) solution The HP Consolidated Client Infrastructure (CCI) solution brings desktop compute and storage resources into highly-secure, easily-managed data centers. End users get the convenience and familiarity of a traditional desktop environment; your business gets stronger control of PC security policies that make it easy to enforce and manage security protocols. Your sensitive corporate data and applications are consolidated into a more secure and manageable IT backroom instead of the end-user s hard drive. An additional end-user benefit is a more automated backup and restore process in the event of equipment malfunction. CCI helps reduce the risks associated with traditional desktop computing, such as viruses, theft, lost data, misconduct and non-compliance of software licensing. CCI does this by enabling the timely installation of security patches for compliance with software licenses and establishing correct and consistent version control for end users. CCI offers true back-up and recovery of end-user data to protect against disaster and help eliminate the risk of sensitive data being electronically stored in user areas. With HP CCI, proper privacy controls can be maintained for both customer and employee data. Key partner relationships Since there are many security choices available, it is HP s strategy to innovate where appropriate and to collaborate with best-in-breed security partners to provide customers with a broad offering of security and security manageability solutions. HP ProtectTools is an innovative single-client application that unifies security capabilities under an easy-to-use common user interface. Each module was designed by HP with its strategic partners and has a corresponding component that will meet enterprise remote configuration and management needs. HP strategic security partners currently include industry leaders such as Absolute Software, Actividentity, Altiris, Bioscrypt, Check Point, digitalpersona, Entrust, RSA Security, SafeBoot, Softex and Symantec. For more information about HP Consolidated Client Infrastructure, visit: www.hp.com/go/cci. 6

Why HP? Our goal is to protect your company's privacy, intellectual property and organization from intentional or accidental harm or exposure through security attacks. As a recognized leader with extensive experience and proven technology, we offer comprehensive protection measures so you can work smarter and with greater confidence. Practical innovation we strive to provide innovative security solutions, making sure that our offerings are based on industry standards and designed to work optimally within your standards-based environment. Scalable, modular security offerings we provide you with a choice of security solutions that best meet your needs. Plug-ins enable you to deploy only what you need when you need it as business grows or as threats evolve. Expandable, flexible architecture lets you determine the exact level of security for your business now and in the future so you avoid the hassles of redeployment and can help keep training costs at a minimum. To learn more To learn more about protecting your company with HP security solutions, visit www.hp.com/security or contact your local HP representative. HP offers you: 20 years of consulting with tens of thousands of satisfied customers World-class security centers located in the Americas, Europe and Asia Pacific researching security breaches and new attack methodologies Largest Microsoft integrator in the world and a Microsoft Gold Certified Partner 7

To learn more, visit: www.hp.com/security Copyright 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Microsoft is a U.S. registered trademark of Microsoft Corporation. HP recommends Windows Vista Business. 5983-2058EN, Rev 4, April 2007