Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

Presentación Jeff Brown, HP en VI Summit País Digital 2018

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Cargando en…3
×

Eche un vistazo a continuación

1 de 38 Anuncio

Más Contenido Relacionado

Similares a Presentación Jeff Brown, HP en VI Summit País Digital 2018 (20)

Más de PAÍS DIGITAL (20)

Anuncio

Más reciente (20)

Presentación Jeff Brown, HP en VI Summit País Digital 2018

  1. 1. Cyber Security Threat Trends and End Point Defenses Jeff Brown WW Head of Personal Systems Professional Services HP HP Confidential. For use under Confidential Disclosure Agreement only. © Copyright 2017 HP Development Company, L.P. The information contained herein is subject to change without notice.
  2. 2. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The Changing Threat Landscape 2018 Trends
  3. 3. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/Application testing, Deficit of Security Professionals, Lack of employee security education …
  4. 4. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues
  5. 5. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad
  6. 6. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad 3. Blockchain Revolution
  7. 7. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. FY18 Trends GDPR, Cyber-Physical Threats, Patching/application testing, Deficit of Security Professionals, Lack of employee security education … 1. IOT Vulnerability Continues 2. AI Expansion – The Good and The Bad 3. Blockchain Revolution 4. The rise of Ransomware and Organized Crime
  8. 8. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Breaches and Perpetrators 120.248 4.753 Source: Verizon DBIR 2017 Incidents Breaches Top Five Threat Agents (by effectiveness) • Private Criminal Organizations • Advanced Persistent Threat (APT) • Information Partners and Vendors • Disgruntled, Reckless, or Untrained Employees • Civil Activists
  9. 9. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Who are the Hackers? -The 2018 Black Report
  10. 10. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Who are the Hackers? -The 2018 Black Report
  11. 11. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. What does an Attach look like? -The 2018 Black Report
  12. 12. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. What does an attach look like? -The 2018 Black Report
  13. 13. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Is it Static? -The 2018 Black Report
  14. 14. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Hackers Advice -The 2018 Black Report
  15. 15. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The Changing Threat Landscape End Point Defenses
  16. 16. HP: Experiences for the Modern Workforce DESIGN for the way you work and live SECURITY to work anywhere COLLABORATION for connecting & creating
  17. 17. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. EVERY PC & PRINTER DECISION IS A SECURITY DECISION
  18. 18. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Detect Increase protection at all levels of compute platform Continuous business productivity, lower TCO and seamless recovery Even when protections fail (and they will), proactive detection is essential Ultimate Goal – No Downtime! Protect Recover SECURITY THAT’S “BUILT-IN, NOT BOLTED ON” DESIGNED FOR CYBER-RESILIENCE
  19. 19. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. MANY USERS THINK SECURITY IS DIFFICULT – When a user finds security difficult, they work around it…
  20. 20. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. The next generation of the WORLD’S MOST SECURE & MANAGEABLE PCs1 S E C U R I T Y B U I LT - I N n o t B O LT E D O N 20
  21. 21. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP’s 2018 SECURITY STACK ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller NEW Additions and Updates HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices 21
  22. 22. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP’s 2018 SECURITY STACK ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller NEW Additions and Updates HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices 22
  23. 23. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability Infrastructure, Visual Hackers OPEN DOORS Security tools are useless unless policies are enforced. Manageability is required to make security effective ! COMMON TARGET Unpatched software vulnerabilities are easy to exploit. Malicious websites, infected downloads ! IDEAL TARGET Complex target, but successful attacks mean persistence, stealth, and access to almost anything they want !!!BELOW THE OS Firmware (BIOS, etc.) HARDWARE Most Secure. Extremely difficult for hackers and malware to penetrate. THREATS TARGET EVERY LEVEL OF THE SYSTEM 23
  24. 24. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 24 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  25. 25. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. A SECURE SYSTEM REQUIRES A HARDENED ROOT OF TRUST 25 To protect against the malware of the future PCs must have security rooted in HARDWARE • Out of reach of malware attacks • Independent of the BIOS and OS • Can’t be tampered with
  26. 26. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP Endpoint Security Controller Since 2014, HP has integrated the HP Endpoint Security Controller into our HP Elite PCs. This unique hardware enables solutions that are in turn trustworthy, such as HP Sure Start2, the World’s First and Only Self-Healing BIOS. 26
  27. 27. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. GROUNDING SECURITY IN HARDWARE 27 to create a cyber resilient system in the face of unexpected attacks. The HP Endpoint Security Controller enables solutions that are: Hardware Enforced Self-Healing Manageable
  28. 28. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. PROTECTING ALL LEVELS OF THE PC IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability BELOW THE OS Firmware (BIOS, etc.) Hardware ENFORCE COMPLIANCE HP Management Integration Toolkit6 HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 STRENGTHEN THE OS HP Sure Run3, HP Sure Click8, HP Sure Recover4 HP MIK ensures the systems continues working as it should 28
  29. 29. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 29 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  30. 30. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS Protect your BIOS with HP Sure Start Gen4 2 HP Sure Start is the industry’s first and still the only self-healing BIOS. The BIOS is the first million lines of code that run. It is the key to your PC’s foundation. Why should customers care? Once the BIOS is corrupted, the hackers “own” your PC: all other protection is useless. Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS! 30
  31. 31. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates 31
  32. 32. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. MINIMIZE DOWNTIME Recover quickly with HP Sure Recover4 32 HP Sure Recover offers secure, automated, network-based software image recovery. Using the HP Endpoint Security Controller, it can quickly and securely reimage machines to HP’s or the company’s latest software image - using only an internet connection !  Because HP Sure Recover4 is based in hardware, you can reimage a PC, even from a bare hard drive.
  33. 33. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. REIMAGE ON DEMAND OR ON SCHEDULE RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE. User initiated IT scheduled! FRESH START: IT can schedule routine reimaging, so malware doesn’t have a chance to stick around. • Ideal for Hospitality, Retail, Healthcare, Education, etc. ENABLING USERS to quickly reimage their own machines without IT support AUTOMATED RECOVERY: If no OS is found, the PC will automatically present the user the option to reimage FLEXIBLE: Defaults to latest HP image, or may be configured in firmware to recover custom enterprise image 33
  34. 34. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. HP ENDPOINT SECURITY STACK 2018 34 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  35. 35. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. WORK FREELY IN PUBLIC SPACES HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12 Now in it’s SECOND GENERATION, HP Sure View Gen2 enables a better visual experience in light OR dark environments – from the plane to the café What’s New • Performs great in BRIGHT and DARK environments • IPS panel technology • Improved 120Hz REFRESH RATE, for smooth motion • Reduced display thickness - ULTRA-THIN DESIGNS HP Sure View Gen27 protects against visual hacking with the press of a button. 35
  36. 36. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. Detect Increase protection at all levels of compute platform Continuous business productivity, lower TCO and seamless recovery Even when protections fail (and they will), proactive detection is essential Ultimate Goal – No Downtime! Protect Recover SECURITY THAT’S “BUILT-IN, NOT BOLTED ON” DESIGNED FOR CYBER-RESILIENCE
  37. 37. For use with customers under current Confidential Disclosure Agreement only. © Copyright 2018 HP Development Company,L.P. The information contained herein is subject to change without notice. EVERY PC & PRINTER DECISION IS A SECURITY DECISION
  38. 38. THANK YOU HP Confidential. For use with HP customers under HP CDA only

×