Jump to content United States-English
HP.com Home Products and Services Support and Drivers Solutions How to Buy
» Contact HP
HP.com home

Transforming Your Enterprise Magazine

Fall 2008
» 

Large Enterprise Business

»

Current editions

» Transforming Your Enterprise Fall 2008
»

Past editions

Content starts here

Security without walls

Security systems, processes and strategies, unified enterprise-wide from the desktop to the data center: HP’s Secure Advantage portfolio puts it all within reach. 

Security without walls

“When IT managers think of information security, they generally don’t think of it as something that’s ever finished,” says Chris Whitener, Chief Strategist for HP Secure Advantage. “It can take as much as 15 to 25 percent of the budget—and every time there’s a new series of attacks, they’re faced with a whole new round of unfamiliar technologies and defenses that they have to invest in.”

When IT managers implement new firewalls, new anti-virus software and other security measures, not only do they have no sure way of knowing if it’s all doing the job, but compatibility also becomes a problem.

Information security is a top priority for CIOs. The need to maintain business continuity, defend against internal and external threats, enable secure data-sharing and meet tough new security regulations all keep security top of mind with IT managers.

But with threats and responses changing so fast, it’s tough to stay ahead of the game. The implementation of common security approaches such as hard perimeters, network access control, identity management and encryption is often incomplete, poorly integrated and intrusive. As security technologies and processes proliferate, workflow suffers, and frustrated end users either devise insecure workarounds—or just ignore security altogether.

What enterprises need is a unified strategy that secures data and resources while validating regulatory compliance from the desktop to the data center. Vendors must respond with security products and frameworks based on a coherent view that unifies products, systems, policies and strategies.

Getting the complete spectrum of enterprise security products and services to work together simply and efficiently is the fundamental idea behind Secure Advantage, HP’s security portfolio of servers, storage, software and services.

The security standard

“With Secure Advantage,” Whitener says, “we’re trying not only to provide security the same way customers perceive attributes like quality, value, availability, dependability—things you associate with a good product—but also to reduce the issues that arise when you put security products together.”

Secure Advantage leverages the expertise of HP’s Atalla Security Products division (Whitener also serves as Atalla’s General Manager), which has a decades-long track record in encryption, key management and identity management. Atalla developed the personal identification number (PIN) that underpins global ATM transactions, and the Data Encryption Standard (DES) that evolved into the patents behind the encryption keys used in ATM and EFT (electronic funds transfer) transactions. The “Atalla box” secures some 70 percent of transactions in the global financial network—a value of $9 trillion a day.

HP’s breadth means that a good idea goes the extra mile. As an example, the same encryption technology that secures PIN printing, where users must enter a unique PIN before they can print secured documents, also contributes to the key management appliance used for bulk encryption of tape drives, as well as to the built-in security provided for HP desktop and laptop computers.


The main objective is to correctly orient enterprise security strategy, policies and processes

Starting with strategy

The HP Secure Advantage portfolio includes identity management, key management and encryption technologies.  The main objective is to correctly orient enterprise security strategy, policies and processes. Secure Advantage is founded on the new standards-based Information Security Service Management (ISSM) reference model from HP Services, which combines security processes, policies and systems to reduce business risk. The HP ISSM reference model helps organizations manage and reduce operational risk, based on industry best practices and internationally recognized standards such as:

  • ITIL v3
  • CMMI
  • ISO/IEC 20000
  • ISO 27001

Utilizing HP’s portfolio of security lifecycle services—for governance and compliance, identity management, security management and trusted infrastructure—HP ISSM provides a comprehensive and consistent framework for enterprise security.

HP’s newly established Secure Advantage Alliance Program enables best-of-breed security partners to integrate their innovations with the full portfolio. The program also builds and supports industry standards. The acquisition of SPI Dynamics (related article), a leading provider of Web application security assessment software and services, adds further breadth in the area of application quality management.

“We’ve been in the security business for 35 years,” Whitener says. “We know the deep technology inside out. Now we’re taking all of that expertise and applying it to what HP is best at—giving you a trusted brand and a trusted product.”


Related links

»  HP Secure Advantage
»  HP Security and Risk Management Services
»  Application Security
»

Table of contents

Introduction

» Virtual for all the right reasons

Strategies

» The green standard
» Common Ground: Turning distress into ‘de-stress’

Feature

» Rethinking virtualization
» From IT tool to business enabler
» Virtualization beyond IT
» Built for virtualization
» IT leasing makes sense in tough times

Experiences

» The perfect virtual fit
» Selective outsourcing
» HP fuels The Indy Racing Experience
» Stepping up to service delivery
» The power of partnership
» Dressed for success

Solutions

» Pick-and-choose-support
» Getting the most out of outsourcing
» Teaching the data center to think green
» Storage briefs
» Data deduplication eases storage headaches

Technologies

» Mission-critical blades now available
» Taming the wild petabyte
» PDM moves up
» New 8P server addresses capacity, growth needs
» Storage for all sizes
» A SAN for all reasons
» Security without walls
» Putting petabytes to work for your company

Supplement

» The great leap forward
» Puzzled by power?
» The partner portfolio
» Server management simplified
» Two worlds as one
» The better road to open source
» Two blade servers in one
» Feedback
Printable version
Privacy statement Using this site means you accept its terms
© 2011 Hewlett-Packard Development Company, L.P.