SlideShare uma empresa Scribd logo
1 de 24
Protect your Digital Enterprise
Steve Lamb
Regional Marketing Manager, Enterprise Security Products
stephlam@hpe.com
+44 7508008864
2
https://www.youtube.com/watch?v=_fuAc0F04
Effective information security is rarely built into IoT devices or applications ;-(
84% of breaches are due to
application vulnerabilities
Only 6% of IT Security budget
goes on application security
204 days before breaches are
discovered!Based on Hewlett Packard Research
3
Software
Turn data into
insights and insights
into action
Cloud
Deliver speed
and agility
Services
Manage and
transform
traditional to new
Infrastructure
Build the best
foundation
Hewlett Packard Enterprise is an industry-leading company
1.Based on HPE Form 10 filing for the last four quarters from Q4 fiscal 2014 to Q3 fiscal 2015
Revenue
$52.7
B Financial Services
Support partners and customers with the right financial model
Provide IT solutions for the New Style of
Business
Faster time
to value
Improved
agility
Lower
cost
Our Mission
Transform
to a hybrid
infrastructure
Enable
workplace
productivity
Protect
your digital
enterprise
Empower
the data-driven
organization
Our Strategy
Protect your
digital enterprise
Protect your most prized
digital assets whether they
are on premise, in the
cloud or in between
Transform
to a hybrid
infrastructure
Enable
workplace
productivity
Empower
the data-driven
organization
The “New Style of Business” needs a new style of protection
Big Data
Protect your most prized
assets and their
interactions, regardless of
location or device
USERS
DATAAPPSOn
Premises
Bring Your Own Device(BYOD)
IaaS
SaaS
PaaS
Clou
d
Big data
Mobile Cloud
Increasingly
sophisticated
cyber attacks
Hactivists
Nation states
Cyber criminal
Insider threat
Increasing
cost and
complexity
of regulatory
compliance
General Data Protection
Regulation
Payment Card Industry
Sarbanes-Oxley
HIPAA
Rapid
transformation
of Enterprise IT
Mobile Cloud
Big data
Where IS
the
perimeter
these days?
Users Applications Data
Protect your
most prized
assets
Protect your
most prized
assets
And the
interactions
between them
Applications
Users Data
Protect & Prevent
Detect & Respond
Recover
Build it in
Build security into the
fabric of your
organization
Understand your risk
posture & assess your
capabilities
Protect & Prevent
Detect & Respond
Recover
Leader in application security
and network access control
(Gartner)
Visionary in data security
(Gartner)
Why HPE
Protect & Prevent
Detect & Respond
Recover
24*7 monitoring of
security operations
Threat intelligence,
analytics,
& situational awareness
Proactively
detect and
manage
breaches
Protect & Prevent
Detect & Respond
Recover
Leader in SIEM (Gartner)
5,000+ security professionals
Leader managed security services
(Forrester)
10 managed global SOCs
Why HPE
Protect & Prevent
Detect & Respond
Recover
Ensure business
continuity &
resiliency
Build enterprise wide
governance,
risk & compliance
Safeguard
continuity &
compliance
Protect & Prevent
Detect & Respond
Recover
#1 backup hardware (Storage
Magazine)
Leader in dedupe backup
(Gartner)
42 business continuity and recovery centers
Why HPE
Protect & Prevent
Detect & Respond
Recover
Protecting
your digital
enterprise
Protecting your Digital Enterprise at scale
Security Operation Centers
worldwide
500k+
Managed
Security
Devices
47M
HP Secured
User
Accounts
10000+
HP Security
Products
Customers
5000+
Security
professionals
23b
Monthly
Security
Events
42
Business
Continuity
and Recovery
sites
Global SOC
Regional
SOC
1000+
HP MSS
Customers
10
Texas
Toronto
Virginia
Costa Rica
Germany
Bulgaria
India
Malaysia
UK
Australia
Confidence in partnership
9 of 10
Major Banks
All Major
Branches
US Department of Defense
10 of
10
Top Telecoms
Most Recent Wins
9 of 10
Top Software Companies

Mais conteúdo relacionado

Mais procurados

Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 

Mais procurados (20)

Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
State of the Network Infographic 2018
State of the Network Infographic 2018State of the Network Infographic 2018
State of the Network Infographic 2018
 
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in BarcelonaHP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
 
Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013
 
The Rise of Hybrid IT
The Rise of Hybrid ITThe Rise of Hybrid IT
The Rise of Hybrid IT
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Multi Cloud Data Integration- Retail
Multi Cloud Data Integration- RetailMulti Cloud Data Integration- Retail
Multi Cloud Data Integration- Retail
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
Interested in working at Druva?
Interested in working at Druva?Interested in working at Druva?
Interested in working at Druva?
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
 
Intel boubker el mouttahid
Intel boubker el mouttahidIntel boubker el mouttahid
Intel boubker el mouttahid
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
 
Leading in the digital economy
Leading in the digital economyLeading in the digital economy
Leading in the digital economy
 

Semelhante a HPE Security Keynote from Istanbul 20th Jan 2016

Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...
Steve Lamb
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
Vincent Kwon
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
KGanzy
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
baselsss
 

Semelhante a HPE Security Keynote from Istanbul 20th Jan 2016 (20)

Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Big data security
Big data securityBig data security
Big data security
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
IBM Solutions Connect 2013 - Getting started with Big Data
IBM Solutions Connect 2013 - Getting started with Big DataIBM Solutions Connect 2013 - Getting started with Big Data
IBM Solutions Connect 2013 - Getting started with Big Data
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Predictive Enterprise Strategic Overview
Predictive Enterprise Strategic OverviewPredictive Enterprise Strategic Overview
Predictive Enterprise Strategic Overview
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

HPE Security Keynote from Istanbul 20th Jan 2016

Notas do Editor

  1. So let’s begin with who we are… Hewlett Packard Enterprise will launch on November 1 and will be an industry leading company. These are the businesses that make up the new HPE. Transition: We see great benefits in Hewlett Packard separating in two companies. Let’s take a closer look at this now.
  2. Our strategy is very straightforward: to provide IT solutions to our customers for the New Style of Business. This is where Hewlett Packard Enterprise leads like no other company. Transition: A key part of delivering on this strategy is innovation.
  3. 6
  4. 7
  5. Today’s successful digital enterprises act with ever greater - speed and agility matter more than ever organization’s must embrace the opportunities that cloud and mobile bring to increase time to value, enhance customer experiences & improve workforce productivity. Not that long ago organizations deployed security strategies that focussed on blocking and securing the perimeter and ‘locked down’ users, access and data within rigid corporate controls. The new style of business has dissolved the perimeter .Your users are interacting with your data & applications in the cloud, on mobile devices & within your network. To protect your digital enterprise you must secure the interactions between your business critical digital assets, securing the free-flow of information in, around and outside your enterprise across your customers, employees, partners & suppliers.
  6. NAC is via Aruba