What's the first IT concern you think of when someone brings up cloud, big data, and mobility? If it's security, you're in good company.
As these technologies become ubiquitous, there's no doubt the risks—and costs—of cyber threats will increase. According to The Ponemon Institute's Second Annual Cost of Cyber Crime Study, released in August 2011, the yearly sum that the organizations surveyed had to shell out as a result of cyber crime ranged from $1.5 million to nearly $36.5 million.
Securing the enterprise was a hot topic at HP Discover 2012 in Las Vegas. If you missed the conference in June, you can watch a huge number of session replays on security and other crucial IT topics on demand by checking out Discover Online.
In his track keynote, "HP Enterprise Security: Change is good," Hugh Njemanze, VP and CTO, HP Enterprise Security Products, explains how cyber threats are increasing in number and complexity all the time. These threats have escalated beyond a rogue few trying to gain attention to organized crime rings, corrupt political organizations and others hell-bent on wreaking havoc and achieving ill-gotten financial gain. In order to ensure the continued trust of our IT systems, you must secure them. Three trends are creating an opportunity to transform your approach to enterprise security:
- Evolving enterprise IT: These trends include mobility, the cloud and big data
- The nature and motivation of attacks: Attackers have gone from just looking for fame to also looking—and finding—fortune
- Regulatory pressure: Most enterprise IT decision makers are aware of SOX, PCI, HIPAA and other similar regulations
HP aims to make the emerging connected world safer for businesses and consumers. Njemanze puts it bluntly:" It does us no good if people do not fundamentally trust computing."
"It does us no good if people do not fundamentally trust computing."—Hugh Njemanze, VP and CTO, HP Enterprise Security Products
Njemanze also outlines how HP takes a holistic, end-to-end approach to enterprise security, including:
- Hybrid infrastructure—traditional data center environment plus cloud
- The network
- The data and applications that need to be secured while also easily accessible to those with authorization
- Internal users and external partners who need access
- A range of devices being used to access data and applications on the network
- A wide range of service offerings to better enable HP customers to get the most out of HP security solutions
On top of all that, Njemanze, adds, "there's the notion of security intelligence and risk management that ranges from monitoring the activities in your organization so you know what incidents to respond to, to analyzing your IT infrastructure so you know where you're going to get the best bang for your dollar in terms of how to defend your network."
Throughout his talk, Njemanze details how HP can help enterprises address the security implications of the cloud, big data and mobility, offering hope for organizations that have watched their security spending rise unchecked along with the increase in cyber threats.
Listen to Njemanze's session on demand (30 minutes).
If cloud, big data and issues such as BYOD (bring your own devices) are among your enterprise security-related concerns, be sure also to check out these replays:
- Securing the modern enterprise in the age of big data, cloud and consumerization (49 minutes). Learn how HP is can help you protect your whole enterprise with our integrated Security Intelligence and Risk Management platform and solutions.
- Cyber security framework (49 minutes). Hear about how HP protects its own network from cyber threats by leveraging ArcSight, TippingPoint, Fortify and other security technologies to effectively "see everything" and manage risk.
Join the conversation: