By Newsha Sharifzadeh, Global Product Marketing Manager
In a previous blog written by my colleague, Gladys mentioned how IMC User Access Manager (UAM) helped reduce vulnerabilities and security breaches through its policy management and integration with HP TippingPoint Next Generation Intrusion Prevention Solution (NGIPS). Now I’d like to talk more about this integration when you have BYOD in place.
By Vishwas Manral, Distinguished Technologist, HP Networking, Advanced Technology Group
On Twitter: @vmanral
As part of my blog series, I have been doing more research around the topics of security and cloud computing—which led me to some insights on the subject of multi-tenancy. Here’s what I’ve found and what I’ve concluded. Remember, multi-tenancy involves virtualization—in the server, in storage, in the network and possibly the complete infrastructure. That’s why you need to consider virtualization architecture, hypervisor, co-resident attacker and side-channel issues.
By Kevin Secino, Mobility Product Marketing, HP Networking
Expect BYOD to be a hot topic at HP Discover in Las Vegas June 4-7. Based on a recent SANS BYOD/mobility security survey of 500 IT professionals, the top three priorities organizations are looking for in a BYOD security solution are: centralized functionality, logging and monitoring; ease of deployment. Join the discussion on how to deliver on those priorities sooner than later—with help from the right high-performance wireless solutions and network management.
By Rebecca Humphress, Global Product Marketing, Fixed-Port Campus & Branch
With the combination of the HP 1910 switch series, the HP M200 wireless access point, potentially the HP MSR900 Series Multi-Service router, HP TippingPoint and HP PCM+ software, your small or midsized business network—both wired and wireless—can be secured from any intruders.
How true this old adage is: Protection is only as effective as the weakest link. Out of sight, out of mind is not necessarily an appropriate motto when it comes to remote sites. Your branch offices are an integral part of your corporate network. They need to be as secure as the rest of the organization. Here’s how.