HP Helps Bolster Defenses in New Era of Security Risk


Intelligence sharing and collaboration are key

Security organizations must mirror the adversary’s approach, and share intelligence to formulate the most current and complete picture of      emerging threats.

HP’s new offerings bring together solutions and services to help the industry share intelligence and build a united defense against adversaries.

HP Threat Central, developed with HP Labs, provides a collaborative security intelligence platform that enables community members to share threat data and analysis, providing real-time intelligence on adversaries, attack vectors, methods and motivations behind current threats.

The platform is now strengthened with the introduction of the HP Threat Central Partner Network, a collaboration of security vendors sharing threat intelligence across the industry to combat adversaries. HP is initially working with partners including Arbor Networks, Blue Coat Systems, InQuest, ThreatGRID, TrendMicro and Wapack Labs, to deliver strategic threat intelligence and actionable indicators to the HP Threat Central community.

In addition to intelligence shared by community members and partners, HP Security Research and HP Enterprise Security Services will contribute intelligence feeds to the HP Threat Central platform. The platform also will power the HP ArcSight and HP TippingPoint portfolios, providing seamless integration for automated threat download and upload from HP ArcSight Enterprise Security Management (ESM) and automated action (blocking) of malicious IP addresses in the HP TippingPoint Next Generation Intrusion Prevention System (NGIPS) and HP TippingPoint Next Generation Firewall (NGFW) devices.

HP Targeted Threat Intelligence, enhanced by HP Threat Central, collects, collates and analyzes structured and unstructured data from social media, hacker forums and other traditional log data sources to provide organizations a more holistic view of the threat landscape.

“Chief information security officers (CISOs) and other senior-level security professionals must be able to plan not only for threats that exist now, but also for those that may emerge in as much as three years' time or beyond,” wrote Rob McMillian, research director, and Kelly Kavanagh, principal research analyst, Gartner.  They go on to write, “Assessing current and potential future threats requires advanced threat intelligence that most organizations are not capable of developing cost-effectively in-house.”
Read Also: Lenovo-IBM Server Business Deal Gets CCI Green Signal and Brand Finance Puts Tata Consultancy Services As Fastest Growing IT Services Brand