Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Combating Enterprise Security Challenges in the Public Sector

LOCK.jpgI received a call from an investigator doing a background check on a colleague of mine who was applying for a job with the federal government. My colleague explained that the background check is a rigorous process that goes on for several weeks. One cannot be too secure in the public sector. Fraud and security violations spread like wild fire across the enterprise of enterprises that makes up the public sector, affecting significant cross-sections of the populace. Critical security concerns in the public sector must be addressed with effective solutions. Today, HP announced several comprehensive approaches to combat such security challenges within the public sector and I’d like to discuss these solutions in this post.

 

HP's core principles for intelligent security are:

 

  • Build it in. Build security into the fabric of each process/service early in its lifecycle
  • Make it intelligent. Use actionable security intelligence, which leverages multiple disparate event sources to detect threats and take appropriate remedial measures in advance
  • Protect what matters. Allocate security investments to balance the risk equation

Did I lock the front-door before leaving town for the weekend? A combination of such security after-thoughts has resulted in pockets of security across the enterprise exposing gaps that become prime targets for those on the prowl. These concerns are accentuated in the public sector across the myriad siloed applications.

 

Prioritization of the areas that need protection is vital. What are the areas that warrant greater protection than others? Security is a common concern across Cloud Computing, Mobility and Big Data - 3 key aspects of the enabling IT infrastructure today. Based on an interview of 150 business executives and 500 technology executives, a Coleman-Parks study determined:

 

  • Cloud services can be safe when security requirements are clear. Guess who is responsible when it comes to cloud security.  
  • Mobile security continues to be difficult. 51% were concerned with data loss or theft while 73% were concerned with difficulties in central device management.
  • Big Data is a big challenge. 66% believed that the greatest challenge is the organization's ability to protect and consume big data.

HP takes a 3-pronged approach to address these challenges:

 

  • HP Assured Identity has been enhanced, adding identity proofing, privileged user management and federation features to its robust credentialing and identity management platform. This builds out the core DNA that ensures that the right people have access to the information in alignment with the "Build it in" core principle.
  • HP Comprehensive Applications Threat Analysis (CATA) on Demand service proactively addresses the security vulnerabilities in applications when it is especially important: early in the development cycle. Intelligent security. Enterprises can effectively combat the threats by proactively identifying them upstream in the lifecycle.
  • HP Security Operations Center (SOC) Consulting Services is a consulting engagement for the worldwide Public Sector which assesses a client’s situation and designs a best practices solution. HP works with enterprises to define the overall security strategy for enterprises in alignment with their business objectives.

Security needs to be factored in as part of the overall enterprise transformation program, which is best defined and executed with a trusted partner – a Transformation GPS would best enable this transformation journey.

Security matters to me from multiple perspectives. Apart from my own personal security, I care about the security of the enterprises I work for and work with. But above all, I am most concerned about the national enterprise that we all belong to – the country of our physical presence and residence. Security in the public sector trumps everything else and is important to me.

 

It is important to HP too. Check out these additional resources to learn more about how HP is helping its clients secure their enterprises:

 

Connect with Nadhan on: Twitter, Facebook, Linkedin

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation