This document discusses how Hewlett Packard Enterprise helps organizations protect their digital enterprises. It notes that 84% of breaches are due to application vulnerabilities but only 6% of security budgets are spent on application security. HPE provides solutions to protect data, users, and applications whether on-premises, in the cloud, or between. It has industry-leading security capabilities including application security, network access control, data security, security information and event management, managed security services, business continuity, and recovery centers. HPE aims to help organizations build security into their infrastructure and operations to protect, prevent, detect, and respond to security threats and ensure business continuity.
3. 84% of breaches are due to
application vulnerabilities
Only 6% of IT Security budget
goes on application security
204 days before breaches are
discovered!Based on Hewlett Packard Research
3
4. Software
Turn data into
insights and insights
into action
Cloud
Deliver speed
and agility
Services
Manage and
transform
traditional to new
Infrastructure
Build the best
foundation
Hewlett Packard Enterprise is an industry-leading company
1.Based on HPE Form 10 filing for the last four quarters from Q4 fiscal 2014 to Q3 fiscal 2015
Revenue
$52.7
B Financial Services
Support partners and customers with the right financial model
5. Provide IT solutions for the New Style of
Business
Faster time
to value
Improved
agility
Lower
cost
Our Mission
7. Protect your
digital enterprise
Protect your most prized
digital assets whether they
are on premise, in the
cloud or in between
Transform
to a hybrid
infrastructure
Enable
workplace
productivity
Empower
the data-driven
organization
8. The “New Style of Business” needs a new style of protection
Big Data
Protect your most prized
assets and their
interactions, regardless of
location or device
USERS
DATAAPPSOn
Premises
Bring Your Own Device(BYOD)
IaaS
SaaS
PaaS
Clou
d
16. Build it in
Build security into the
fabric of your
organization
Understand your risk
posture & assess your
capabilities
Protect & Prevent
Detect & Respond
Recover
17. Leader in application security
and network access control
(Gartner)
Visionary in data security
(Gartner)
Why HPE
Protect & Prevent
Detect & Respond
Recover
23. Protecting your Digital Enterprise at scale
Security Operation Centers
worldwide
500k+
Managed
Security
Devices
47M
HP Secured
User
Accounts
10000+
HP Security
Products
Customers
5000+
Security
professionals
23b
Monthly
Security
Events
42
Business
Continuity
and Recovery
sites
Global SOC
Regional
SOC
1000+
HP MSS
Customers
10
Texas
Toronto
Virginia
Costa Rica
Germany
Bulgaria
India
Malaysia
UK
Australia
24. Confidence in partnership
9 of 10
Major Banks
All Major
Branches
US Department of Defense
10 of
10
Top Telecoms
Most Recent Wins
9 of 10
Top Software Companies
Notas do Editor
So let’s begin with who we are… Hewlett Packard Enterprise will launch on November 1 and will be an industry leading company. These are the businesses that make up the new HPE.
Transition: We see great benefits in Hewlett Packard separating in two companies. Let’s take a closer look at this now.
Our strategy is very straightforward: to provide IT solutions to our customers for the New Style of Business. This is where Hewlett Packard Enterprise leads like no other company.
Transition: A key part of delivering on this strategy is innovation.
6
7
Today’s successful digital enterprises act with ever greater - speed and agility matter more than ever organization’s must embrace the opportunities that cloud and mobile bring to increase time to value, enhance customer experiences & improve workforce productivity.
Not that long ago organizations deployed security strategies that focussed on blocking and securing the perimeter and ‘locked down’ users, access and data within rigid corporate controls.
The new style of business has dissolved the perimeter .Your users are interacting with your data & applications in the cloud, on mobile devices & within your network.
To protect your digital enterprise you must secure the interactions between your business critical digital assets, securing the free-flow of information in, around and outside your enterprise across your customers, employees, partners & suppliers.