Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Protecting what matters most: the new security balance

IT security isn’t what it used to be. We know that. In a world where you have to share, collaborate, and openly exchange data, you can’t have a reactive network perimeter. But threats are increasing. And the increased mobility of workers and hybrid delivery models are creating new service boundaries that add complexity to securing information and technology assets.

 

All this means a need for advanced security tools that cover exchanges both inside and outside of the enterprise. When the technology is evolving fast, this sophisticated and evolving protection can be a major IT undertaking.

 

iStock_000017036394XSmall.jpg“It’s a big challenge,” says Randy Redmon, HP Portfolio and Engineering Director. “You’ve got to equip your enterprise with solutions that allow clients and employees to have secure access to whatever they need, whenever they need it, and on whichever device they choose. But you have to simultaneously keep malicious attackers out. That takes sophisticated technology–enabled processes that are markedly different than the security measures of the past.”

 

At the same time, you have fewer resources to meet these challenges, says Mary Ann Mezzapelle, Americas CTO for HP Security Services: “Our Enterprise 20:20 report shows that 66% of respondents say they have a ‘lack of skilled resources to effectively manage security.’ Finding and retaining highly skilled and motivated security professionals is more difficult every day.”

 

In two sessions at this year’s Discover 2013 conference, these HP experts will discuss the critical security issues facing enterprises today.

 

In the first breakout, Mezzapelle will examine the best ways to position security as a business—not IT—issue for maximum impact at the boardroom table. She’ll also cover some of the most overlooked but critical areas that need security investment and attention in today’s enterprise, including vulnerabilities within the extended supply chain and infrastructure that supports cyber activities.

 

The bottom line, says Mezzapelle, is that IT and security leaders need to communicate risk in business terms; establish a proactive, risk-based approach; and advance the maturity of the security programs in a defined manner.

 

Later that day, you’ll hear from Redmon and Jeffrey Lewis, Global Marketing Lead for HP Security Services, on how to make a seamless transition from a reactive to a proactive security posture. They’ll cover the foundational elements your enterprise needs to address risk, adapt to manage it, enable interactions, and address compliance.

 

The focus of the session will be on implementing a managed security delivery model. This approach is designed to strengthen an organization’s security posture, lower total cost of ownership, and deliver a measurable reduction in business risk. The speakers will also preview some of the innovative new security products and services that HP has released over the last 12 months.

 

“The bottom line is that it’s hard to do this well, whether you’re a large enterprise or a small one,” says Lewis. “One of the really effective and cost-efficient ways is to look to a partner like HP. We have such a large scope in terms of an end-to-end portfolio. We have experts with deep security expertise. We have the ability to expand and contract resources based on the threat at the time. There’s absolutely no reason to try to go it alone. We’re here for you.”

 

 Strategic discussion areas:

  • Why you need a flexible and customizable service delivery to meet your specific needs, rather than a “one size fits all” approach
  • How to implement a delivery model in compliance with industry recognized standards and in line with defined SLAs
  • Ways to measure and audit security investments back to defined business needs
  • The importance of a single supplier and single point of contact for your security services to simplify ordering, deployment and management
  • How outsourcing of security activities to allow your internal resources to focus on core business objectives and reduce overall costs of ownership

 

hyperlinks.pngSession ID–BB3405: Safeguarding Your Information Assets

Date – 13 June 2013 | Time – 12:30-1:30 p.m. | Location – San Polo 3406

Speaker:

Mary Ann Mezzapelle—Americas Chief Technology Officer, HP Security Services and technology advisor to major clients, with a focus on security and privacy

 

 

 

hyperlinks.pngSession ID–BB3406: Managing Security Risk in a Complex Environment 

Date – 13 June 2013 | Time – 3:30-4:30 PM | Location – San Polo 3503

Speakers:

Randy Redmon—Portfolio and Engineering Director, HP

Jeffrey Lewis—Global Marketing Lead-Security Services, HP Enterprise Security Services

 

Discover 2013

With hundreds of sessions to choose from, HP Discover 2013 is the premier technology event of the year. Discover how HP innovations will help you deliver a new style of IT to improve how you work, find new opportunities, make new connections, and empower a whole new generation of employees. This event brings together thousands of IT executives, managers, architects, engineers, and solution experts from around the world to solve the toughest enterprise IT challenges.

  • Practical demonstrations and multi-media discussions
  • One-on-one time with specialists in breakout sessions, coffee talks and Google Hangouts
  • Access to thought leaders at the Tech Services Guru Bar and throughout the show floor.

 hyperlinks.png

 

 

 

 

 

 

Join us!

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation