SlideShare a Scribd company logo
1 of 26
Are your cloud services
secure and compliant?
Delivering security through cloud service automation
Sridhar Karnam,
Sr. Manager, Product Marketing
HP Software
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
How much do hackers pay?

2

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

$499
$499
$499
$399
$33
$55
$99
$88
$99
Threat landscape
Cloud enables large surface area for attackers

Cloud

Providers

Attacks

24 Million

Hactivists
3

Anonymo
us

Infrastructure

40 Million

95 Million

State funded

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Consumer
s

101 Million

130 Million

LulzSec
Current solutions are not enough

Providers

Infrastructur
e

Consumers

4

Too much data

Too many
solutions
Too perimeter
focused

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

1000+ Security vendors
The result

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
243

days
average time to detect
breach

2012 January February March April May June July August September October November December 2013 January February
March April

6

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Security is a bigger than just an IT problem
Security is a board level discussion
Cyber threat
Data Breach

CISO

56% of organizations have
94% of the data breaches

Financial loss
Reputation damage

been the target of a cyber attack

were reported by third-parties

$8.6M average cost
associated with data breach

30% market cap reduction due
to recent events

Cost of protection
Reactive vs. proactive

7

11% of total IT budget spent
97% of data breaches could

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

on security

have been avoided
97%
8

of the breaches could
be prevented through
simple controls such
as log management

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Compliance landscape
Annual cost of SOX compliance:
$1.8M or equivalent cost of roughly
14.4 employees!

•

•
•
•
•

User management
Access control/authorization
Change management
Security operations
Differences is mainly in interpretation

• Leverage similarities to increase efficiencies
and reduce costs
• Consistent themes across regulations
9

NIST

SAS 70

ISO 27001

NIACAP

FISMA

FTC

SEC

• Any similarities in compliance activities?

SOX

OCC

CobiT

FERC/NERC

ISO 17799
PIPEDA
COSO

NY Privacy
J-SOX

US Patriot Act
DITSCAP

GLBA

FFIEC

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

DATA

HIPAA

ITIL
Basel II

PCI

CA-1386

FDPA
70% similarities between compliance & security
User
Management

Access /
Incident
Authorization Management

SOX
FISMA
HIPAA
PCI
NIST
CobiT

10

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Security
Operations
Management Operations
Why use multiple tools then?

Security

Compliance

Common
Text
challenges

Cloud services

11

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Who is responsible for cloud security?
IaaS

PaaS

SaaS

• Increasing security responsibilities at
the information, application & user
layers

• Reducing visibility into
O/S, network, and physical layers

User

Application

Application

Information

Information

SaaS
O/S

O/S
image

PaaS

• Examples:

• IaaS: Amazon EC2
• PaaS: Heroku, Google Apps

Application

Network

IaaS
Physical

• SaaS: SalesForce.com
Consumer responsible
12

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Provider responsible
Transform your IT with HP Hybrid Cloud
Greater flexibility, simpler operations and more comprehensive end-to-end solutions
Management
Choice: Open, extensible architecture offers greater
flexibility with support for industry standards, open APIs
and integration with 3rd party products and services

Confidence: Complete management across
traditional IT and cloud offers lower cost and simplifies
operations

Consistency: Comprehensive, end-to-end solution
allow you to meet business SLAs with secure, compliant
cloud services
13

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Here is how HP ArcSight
helps you secure your
cloud…

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Comprehensive & continuous monitoring of
cloud
Competitive advantage in the digital universe
Massive amounts of useful data are getting lost

% of data that would
be potentially useful
IF tagged and
analyzed

23%

3%
0.5%

¹Source: IDC The Digital Universe in 2020, December 2012

15

% of the Digital Universe that
actually is being tagged and
analyzed

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

% actually being
tagged for Big Data
Value (will grow to
33% by 2020)
What we do?
HP ArcSight Log management and SIEM solution

Collect

16

Store

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Analyze
What is ArcSight?
4 hours to respond to a breach

10 minutes to fix an IT incident

ArcSight enables forensic investigation
and a quick response to a data breach
that otherwise would take 24 days

Full-text searching of any data enables
incident resolution that otherwise would take
8 hours

5 minutes to generate IT GRC
report
ArcSight content generates IT GRC reports
that otherwise would take 4 weeks

2 days to fix a threat vulnerability

3 days to run an IT audit

ArcSight builds threat immune that otherwise
would take 3 weeks

Search results yield audit-quality logs that
otherwise would take 6 weeks

17

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
How do we do it?
Feature

Benefit

Collect

Collect logs from any device, any source, and in any format
at high speed

Enrich

Machine data is unified into a single format through
normalization and categorization

Search

?

Simple text-based search tool for logs and events without
the need of domain experts

Store

Correlate
18

Archive years’ worth of unified machine data through high
compression ratios

Automate the analysis, reporting, and alerting of machine
data for IT security, IT operations, and IT GRC

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP ArcSight & Cloud services deliver

Universal
log
managemen
t

Advanced
persistent
threat
remediation
19

Compliance &
risk
management

Mobile
security

Perimeter, data
center & network
security

Data privacy
& data loss
prevention

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Insider
threat
mitigation

Application
&
transaction
monitoring
Deploy Logger within CSA in
three simple steps

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Modular packaging designed for cloud
Get started quickly with HP Cloud and Automation Ultimate Suite
transformation
HP Cloud and Automation Ultimate Suite
Service lifecycle
management
Automation and
Orchestration

Compliance

IaaS, PaaS, Sa
aS
Resource/Capaci
ty management

Security: Access
Mgmt

HP Products: HP Cloud Service Automation, HP Server Automation, HP Operations
Orchestration, HP Database and Middleware Automation, UCMDB, ArcSight Logger, HP
SiteScope

Application Perf. Mgmt

DevOps

Backup

HP Business Service Mgmt

HP Continuous Delivery
Auto.

Asset Management

Application Security

Help Desk

HP Asset Manager

HP Fortify

Service Performance Mgmt

Business Management
HP Executive Scorecard

Portfolio Management
HP Product and Portfolio
Mgmt

HP Data Protector

Network Security
HP Tipping Point

Add optional features as needed
21

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Note: HP ArcSight
Logger’s 6 months trial
available through HP
Cloud Service Automation
Ultimate Suite .

Alternatively, download a
copy of the HP ArcSight
Logger Trial Software
from:
www.hp.com/go/hplogger
Deployment step 1:
HP ArcSight Logger Service Design
Log into a CSA consumer portal and select HP ArcSight Logger

22

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Deployment step 2:
Supply the required information, to complete the request for the subscription

23

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Deployment step 3:
Once completed, you can look at the subscription, and access HP ArcSight within HP
CSA

24

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
managed
in-house/legacy
custom apps Apps
cloud
Systems Monitoring

25

Virtual

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Applications

Security

SIEM
log management

Cloud
security

Insider threats

Mobile Monitoring Continuous
compliance

SaaS

350+ CEF
partners

Big Data

IT operations
Storage

Security Analytics

Thank you
Additional resources
HP Cloud Management: hp.com/go/cloudmanagement
HP Cloud Service Automation: hp.com/go/csa
HP Software’s premier customer event: hp.com/go/discover
HP Software’s Community of IT Professionals: hp.com/go/swcommunity
HP Software Education Services: hp.com/software/education
HP Software Support Services: hp.com/go/hpswsupport
HP Software Professional Services: hp.com/go/hpswprofessionalservices
For more information: HPSWebEvents@hp.com
26

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More Related Content

What's hot

Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningDigital Transformation EXPO Event Series
 
Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18Cloudera, Inc.
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
 
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...TheInevitableCloud
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunenMeetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunenDigipolis Antwerpen
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataCloudera, Inc.
 
AIOps: Anomalies Detection of Distributed Traces
AIOps: Anomalies Detection of Distributed TracesAIOps: Anomalies Detection of Distributed Traces
AIOps: Anomalies Detection of Distributed TracesJorge Cardoso
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
 
AIOps: Anomalous Span Detection in Distributed Traces Using Deep Learning
AIOps: Anomalous Span Detection in Distributed Traces Using Deep LearningAIOps: Anomalous Span Detection in Distributed Traces Using Deep Learning
AIOps: Anomalous Span Detection in Distributed Traces Using Deep LearningJorge Cardoso
 
IoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceIoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceCloudera, Inc.
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersEnterprise Management Associates
 
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Protect724
 
Data Centers in the age of the Industrial Internet
Data Centers in the age of the Industrial InternetData Centers in the age of the Industrial Internet
Data Centers in the age of the Industrial InternetGE_India
 
Strategies of Top Performing Organizations in Deploying AIOps - key findings
Strategies of Top Performing Organizations in Deploying AIOps - key findingsStrategies of Top Performing Organizations in Deploying AIOps - key findings
Strategies of Top Performing Organizations in Deploying AIOps - key findingsDigital Enterprise Journal
 
Partena 2010.02.10
Partena 2010.02.10Partena 2010.02.10
Partena 2010.02.10lucdelanglez
 
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...Precisely
 
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...Cloudera, Inc.
 
ArcSight Enterprise View Deployment Guide
ArcSight Enterprise View Deployment GuideArcSight Enterprise View Deployment Guide
ArcSight Enterprise View Deployment GuideProtect724gopi
 
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit SplunkSplunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit SplunkSplunk
 

What's hot (20)

Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learning
 
Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunenMeetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
Meetup 27/6/2018: AIOPS om de uitdagingen van een slimme stad te ondersteunen
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
AIOps: Anomalies Detection of Distributed Traces
AIOps: Anomalies Detection of Distributed TracesAIOps: Anomalies Detection of Distributed Traces
AIOps: Anomalies Detection of Distributed Traces
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?
 
AIOps: Anomalous Span Detection in Distributed Traces Using Deep Learning
AIOps: Anomalous Span Detection in Distributed Traces Using Deep LearningAIOps: Anomalous Span Detection in Distributed Traces Using Deep Learning
AIOps: Anomalous Span Detection in Distributed Traces Using Deep Learning
 
IoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceIoT-Enabled Predictive Maintenance
IoT-Enabled Predictive Maintenance
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
 
Data Centers in the age of the Industrial Internet
Data Centers in the age of the Industrial InternetData Centers in the age of the Industrial Internet
Data Centers in the age of the Industrial Internet
 
Strategies of Top Performing Organizations in Deploying AIOps - key findings
Strategies of Top Performing Organizations in Deploying AIOps - key findingsStrategies of Top Performing Organizations in Deploying AIOps - key findings
Strategies of Top Performing Organizations in Deploying AIOps - key findings
 
Partena 2010.02.10
Partena 2010.02.10Partena 2010.02.10
Partena 2010.02.10
 
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
Cloudera + Syncsort: Fuel Business Insights, Analytics, and Next Generation T...
 
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
Increase your ROI with Hadoop in Six Months - Presented by Dell, Cloudera and...
 
ArcSight Enterprise View Deployment Guide
ArcSight Enterprise View Deployment GuideArcSight Enterprise View Deployment Guide
ArcSight Enterprise View Deployment Guide
 
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit SplunkSplunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
Splunk Webinar: Full-Stack End-to-End SAP-Monitoring mit Splunk
 

Viewers also liked

Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1David Spinks
 
Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud projectPetteri Heino
 
Hypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongHypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongRobert Clark
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityEd Wong
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesIntel Corporation
 
Capgemini Digital Reference Architecture with HPE
Capgemini Digital Reference Architecture with HPECapgemini Digital Reference Architecture with HPE
Capgemini Digital Reference Architecture with HPECapgemini
 
HP Cloud System Matrix Overview
HP Cloud System Matrix OverviewHP Cloud System Matrix Overview
HP Cloud System Matrix OverviewRien du Pre
 

Viewers also liked (10)

Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
 
Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav Knapovský
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
 
4 hp converged_cloud
4 hp converged_cloud4 hp converged_cloud
4 hp converged_cloud
 
Hypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongHypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong Kong
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application Security
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud Services
 
Capgemini Digital Reference Architecture with HPE
Capgemini Digital Reference Architecture with HPECapgemini Digital Reference Architecture with HPE
Capgemini Digital Reference Architecture with HPE
 
HP Cloud System Matrix Overview
HP Cloud System Matrix OverviewHP Cloud System Matrix Overview
HP Cloud System Matrix Overview
 

Similar to Are your Cloud Services Secure and Compliant today?

Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSightSridhar Karnam
 
Digital government presentation final
Digital government presentation finalDigital government presentation final
Digital government presentation finalShirlie23
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
 
The Implacable advance of the data
The Implacable advance of the dataThe Implacable advance of the data
The Implacable advance of the dataDataWorks Summit
 
Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Christian Verstraete
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicAmazon Web Services
 
HP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudHP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudBart Blommaerts
 
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEnWCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEnWCIT 2014
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Wilfried Grommen
 
The new dominant companies are running on data
The new dominant companies are running on data The new dominant companies are running on data
The new dominant companies are running on data SnapLogic
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataMatt Stubbs
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataMatt Stubbs
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataScott Clinton
 
Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring
Gain Deep Visibility into APIs and Integrations with Anypoint MonitoringGain Deep Visibility into APIs and Integrations with Anypoint Monitoring
Gain Deep Visibility into APIs and Integrations with Anypoint MonitoringInfluxData
 
IT Management for the Successful Enterprise
IT Management for the Successful EnterpriseIT Management for the Successful Enterprise
IT Management for the Successful EnterpriseHP Enterprise Italia
 
HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)Copaco Nederland
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009Diontealley
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 

Similar to Are your Cloud Services Secure and Compliant today? (20)

Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSight
 
Digital government presentation final
Digital government presentation finalDigital government presentation final
Digital government presentation final
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
The Implacable advance of the data
The Implacable advance of the dataThe Implacable advance of the data
The Implacable advance of the data
 
Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
HP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudHP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloud
 
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEnWCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
WCIT 2014 Rohit Tandon - Big Data to Drive Business Results: HP HAVEn
 
Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1Mobile enterprise sept 24 v1
Mobile enterprise sept 24 v1
 
The new dominant companies are running on data
The new dominant companies are running on data The new dominant companies are running on data
The new dominant companies are running on data
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Hortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your dataHortonworks Hybrid Cloud - Putting you back in control of your data
Hortonworks Hybrid Cloud - Putting you back in control of your data
 
Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring
Gain Deep Visibility into APIs and Integrations with Anypoint MonitoringGain Deep Visibility into APIs and Integrations with Anypoint Monitoring
Gain Deep Visibility into APIs and Integrations with Anypoint Monitoring
 
IT Management for the Successful Enterprise
IT Management for the Successful EnterpriseIT Management for the Successful Enterprise
IT Management for the Successful Enterprise
 
HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 

More from Sridhar Karnam

Learn and enjoy at RSAC 2017
Learn and enjoy at RSAC 2017Learn and enjoy at RSAC 2017
Learn and enjoy at RSAC 2017Sridhar Karnam
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachSridhar Karnam
 

More from Sridhar Karnam (6)

Learn and enjoy at RSAC 2017
Learn and enjoy at RSAC 2017Learn and enjoy at RSAC 2017
Learn and enjoy at RSAC 2017
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
Test
TestTest
Test
 
optical illusions
optical illusionsoptical illusions
optical illusions
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Are your Cloud Services Secure and Compliant today?

  • 1. Are your cloud services secure and compliant? Delivering security through cloud service automation Sridhar Karnam, Sr. Manager, Product Marketing HP Software © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 2. How much do hackers pay? 2 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. $499 $499 $499 $399 $33 $55 $99 $88 $99
  • 3. Threat landscape Cloud enables large surface area for attackers Cloud Providers Attacks 24 Million Hactivists 3 Anonymo us Infrastructure 40 Million 95 Million State funded © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Consumer s 101 Million 130 Million LulzSec
  • 4. Current solutions are not enough Providers Infrastructur e Consumers 4 Too much data Too many solutions Too perimeter focused © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1000+ Security vendors
  • 5. The result © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 6. 243 days average time to detect breach 2012 January February March April May June July August September October November December 2013 January February March April 6 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 7. Security is a bigger than just an IT problem Security is a board level discussion Cyber threat Data Breach CISO 56% of organizations have 94% of the data breaches Financial loss Reputation damage been the target of a cyber attack were reported by third-parties $8.6M average cost associated with data breach 30% market cap reduction due to recent events Cost of protection Reactive vs. proactive 7 11% of total IT budget spent 97% of data breaches could © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. on security have been avoided
  • 8. 97% 8 of the breaches could be prevented through simple controls such as log management © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 9. Compliance landscape Annual cost of SOX compliance: $1.8M or equivalent cost of roughly 14.4 employees! • • • • • User management Access control/authorization Change management Security operations Differences is mainly in interpretation • Leverage similarities to increase efficiencies and reduce costs • Consistent themes across regulations 9 NIST SAS 70 ISO 27001 NIACAP FISMA FTC SEC • Any similarities in compliance activities? SOX OCC CobiT FERC/NERC ISO 17799 PIPEDA COSO NY Privacy J-SOX US Patriot Act DITSCAP GLBA FFIEC © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. DATA HIPAA ITIL Basel II PCI CA-1386 FDPA
  • 10. 70% similarities between compliance & security User Management Access / Incident Authorization Management SOX FISMA HIPAA PCI NIST CobiT 10 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Security Operations Management Operations
  • 11. Why use multiple tools then? Security Compliance Common Text challenges Cloud services 11 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 12. Who is responsible for cloud security? IaaS PaaS SaaS • Increasing security responsibilities at the information, application & user layers • Reducing visibility into O/S, network, and physical layers User Application Application Information Information SaaS O/S O/S image PaaS • Examples: • IaaS: Amazon EC2 • PaaS: Heroku, Google Apps Application Network IaaS Physical • SaaS: SalesForce.com Consumer responsible 12 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Provider responsible
  • 13. Transform your IT with HP Hybrid Cloud Greater flexibility, simpler operations and more comprehensive end-to-end solutions Management Choice: Open, extensible architecture offers greater flexibility with support for industry standards, open APIs and integration with 3rd party products and services Confidence: Complete management across traditional IT and cloud offers lower cost and simplifies operations Consistency: Comprehensive, end-to-end solution allow you to meet business SLAs with secure, compliant cloud services 13 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 14. Here is how HP ArcSight helps you secure your cloud… © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 15. Comprehensive & continuous monitoring of cloud Competitive advantage in the digital universe Massive amounts of useful data are getting lost % of data that would be potentially useful IF tagged and analyzed 23% 3% 0.5% ¹Source: IDC The Digital Universe in 2020, December 2012 15 % of the Digital Universe that actually is being tagged and analyzed © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. % actually being tagged for Big Data Value (will grow to 33% by 2020)
  • 16. What we do? HP ArcSight Log management and SIEM solution Collect 16 Store © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Analyze
  • 17. What is ArcSight? 4 hours to respond to a breach 10 minutes to fix an IT incident ArcSight enables forensic investigation and a quick response to a data breach that otherwise would take 24 days Full-text searching of any data enables incident resolution that otherwise would take 8 hours 5 minutes to generate IT GRC report ArcSight content generates IT GRC reports that otherwise would take 4 weeks 2 days to fix a threat vulnerability 3 days to run an IT audit ArcSight builds threat immune that otherwise would take 3 weeks Search results yield audit-quality logs that otherwise would take 6 weeks 17 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 18. How do we do it? Feature Benefit Collect Collect logs from any device, any source, and in any format at high speed Enrich Machine data is unified into a single format through normalization and categorization Search ? Simple text-based search tool for logs and events without the need of domain experts Store Correlate 18 Archive years’ worth of unified machine data through high compression ratios Automate the analysis, reporting, and alerting of machine data for IT security, IT operations, and IT GRC © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 19. HP ArcSight & Cloud services deliver Universal log managemen t Advanced persistent threat remediation 19 Compliance & risk management Mobile security Perimeter, data center & network security Data privacy & data loss prevention © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Insider threat mitigation Application & transaction monitoring
  • 20. Deploy Logger within CSA in three simple steps © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 21. Modular packaging designed for cloud Get started quickly with HP Cloud and Automation Ultimate Suite transformation HP Cloud and Automation Ultimate Suite Service lifecycle management Automation and Orchestration Compliance IaaS, PaaS, Sa aS Resource/Capaci ty management Security: Access Mgmt HP Products: HP Cloud Service Automation, HP Server Automation, HP Operations Orchestration, HP Database and Middleware Automation, UCMDB, ArcSight Logger, HP SiteScope Application Perf. Mgmt DevOps Backup HP Business Service Mgmt HP Continuous Delivery Auto. Asset Management Application Security Help Desk HP Asset Manager HP Fortify Service Performance Mgmt Business Management HP Executive Scorecard Portfolio Management HP Product and Portfolio Mgmt HP Data Protector Network Security HP Tipping Point Add optional features as needed 21 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Note: HP ArcSight Logger’s 6 months trial available through HP Cloud Service Automation Ultimate Suite . Alternatively, download a copy of the HP ArcSight Logger Trial Software from: www.hp.com/go/hplogger
  • 22. Deployment step 1: HP ArcSight Logger Service Design Log into a CSA consumer portal and select HP ArcSight Logger 22 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 23. Deployment step 2: Supply the required information, to complete the request for the subscription 23 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 24. Deployment step 3: Once completed, you can look at the subscription, and access HP ArcSight within HP CSA 24 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 25. managed in-house/legacy custom apps Apps cloud Systems Monitoring 25 Virtual © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Applications Security SIEM log management Cloud security Insider threats Mobile Monitoring Continuous compliance SaaS 350+ CEF partners Big Data IT operations Storage Security Analytics Thank you
  • 26. Additional resources HP Cloud Management: hp.com/go/cloudmanagement HP Cloud Service Automation: hp.com/go/csa HP Software’s premier customer event: hp.com/go/discover HP Software’s Community of IT Professionals: hp.com/go/swcommunity HP Software Education Services: hp.com/software/education HP Software Support Services: hp.com/go/hpswsupport HP Software Professional Services: hp.com/go/hpswprofessionalservices For more information: HPSWebEvents@hp.com 26 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.