HP Networking
Discover how the new HP Networking combines the technologies and alliances of 3Com, ProCurve and TippingPoint into the next networking leader.

How to be an open government agency and still be secure

 

By Monique Lucey, HP Networking FlexBranch Marketing

 

ladyonsmartphone.jpg

 

"There are only two types of companies: those that have been hacked and those that will be." Those are the strong words spoken by FBI director Robert S. Mueller, III at the 2012 RSA Cyber Security Conference in San Francisco earlier this year.

 

A look at headlines from the past 12 months proves Mueller’s point. Security breaches in the public sector have disrupted healthcare providers, higher education institutions, and both local and federal government offices. Here are a few examples:

 

You have to walk the fine line between protecting your organization’s network, while making it easier for your constituents to access services and provide information online, as outlined in the Obama administration’s Digital Government proposals.

 

Emerging technologies also play a role in disrupting the security horizon. Data is highly mobile, as employees, contractors, and partners working at home, on an airplane, in another city, or country become the norm. Your employees who are fuelling the bring-your-own-device (BYOD) movement expect to be able to use their own devices whenever and wherever they are.

 

BYOD gives users freedom but at what security price?

However, as I discuss in my post, How to manage BYOD in your school without compromising network security,” BYOD is an especially thorny issue for educational institutions, as staff and students flood campuses with mobile devices in hand. All public sector services can mitigate the difficulty of managing user-owned devices using HP Identity Driven Manager (IDM), a network access control solution that plugs into the HP PCM+  network management platform.

 

It’s clear that threats—both internal and external—are growing exponentially and are becoming increasingly complex. Siloed and fragmented, yesterday’s outmoded security model is insufficient for today’s threat landscape. Only a proactive information risk management strategy that allows you to see and respond to threats faster can safeguard today’s networks, while spurring growth, innovation, and efficiencies.

 

Your security strategy begins with a comprehensive view Guyinwhiteshirt.jpg

Your enterprise network security solutions must be comprehensive, yet customizable and able to meet changing requirements. HP TippingPoint brings together policy-based network access features and traffic prioritization for effective management of your network. HP TippingPoint Next Generation Intrusion Prevention System  (NGIPS) combines application-level security functionality with user awareness and inbound/outbound content inspection capabilities to protect your applications, network, and data from new and advanced threats.

 

HP TippingPoint is backed by intelligence research from HP TippingPoint DVLabs, which defines, develops, and delivers NGIPS security services. You get instant visibility into the global threat environment while integrated event data helps you develop effective security policies.

 

Security experts here to help

HP Networking is a crucial part of the HP end-to-end enterprise security and risk management portfolio. We’re here to help you navigate the security landscape at your organization. And we also have some great resources to help you get started. I highly recommend reading the following two papers written by our experts:

What security challenges is your agency facing? How are you addressing them? We want to hear from you.

 

>> Learn more about HP Converged Infrastructure and HP Networking products and solutions.

>> Follow HP Networking on Twitter and Google+ | Join HPN LinkedIn Community | Like us HPN Facebook

 

Security image.jpg

 

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.