Think it’s hard to prevent an exponential number of advanced threats and zero-day attacks from infiltrating your network? Hewlett Packard Co. isn’t even trying.
The Palo Alto, Calif.-based PC manufacturer is adopting a new approach: Its customers are inevitably going to get hacked, and its new service will clean up the mess.
This approach could arm partners with new approach tactics to seize opportunitiescreated when customers bulk up security infrastructure but get pummeled with breaches and malware anyway.
Essentially, the HP Breach Management Solutions help organizations in the wake of a cyberattack — it’s a comprehensive offering that includes response, remediation and mitigation for organizations. The services tout a combination of HP’s security acumen with intelligence software that can deal with the aftermath of a major data breach or cyber-incident. Instead of combating threats before an attack, HP’s security intelligence can identify a breach once it’s occurred. The service equips customers with adequate reaction tools, which includes minimizing impact and reducing window of vulnerability.
“It’s nearly impossible for organizations to prevent a breach, but they can take control of how they respond,” said Andrzej Kawalec, HP chief technology officer of enterprise security services. “Combining HP’s portfolio of services and software, the HP Breach Management Solution arms clients with the tools and resources to monitor, manage and respond to breaches head on, minimizing their impact while readying for the next attack.”
HP Forensic Readiness Service gives customers a leg up before an attack occurs by establishing policies and procedures around forensic investigation. The service enables organizations to assess policies for breach investigations, establish a forensic readiness policy and better understand how investigations gather digital evidence.
Also under the umbrella of HPs new services launch:
- HP Breach Response Service provides 24/7 expert monitoring for intrusion detection and response.
- HP Digital Forensic Services develops a clear set of processes and policies for collection and analysis of evidence following a security incident.
- HP eDisclosure and eDiscovery Services helps organizations develop tight policies and processes for capturing logging data.
- HP Security Information and Event Management (SIEM) Service collects, logs, sorts and filters relevant security events.
- HP Discovery Services mitigates consequences of data loss or deletion through designing and implementation processes for backup and recovery.
The comprehensive security services — or more accurately, remediation and response services — are a gamble for HP, which thus far has been reserved with its security launches (sourced to ArcSight, Fortify and TippingPoint, all acquired over the last three years). But it’s one that could fit well into channel portfolios. One of the biggest reasons: it’s a slightly unorthodox approach to security that could allow solution providers to edge their way into rapidly filling threat service markets.
It’s no secret many of HP ‘s biggest competitors have secured a place in the burgeoning threat analytics space — Dell Inc. and EMC Corp. have each pursued an aggressive agenda in with multiple service launches. Those services tout a slew of advanced threat capabilities that offer early detection and blocking to prevent malware from entering a network. Dell has attempted to make its mark with a series of advanced threat offerings that coat the security spectrum – vulnerability management and Web scanning, to security surveillance and threat analytics.
With a late start out the gate, HP knows it faces formidable challengers in advanced threat detection and analysis arenas. And, in a sense, HP isn’t trying to compete with better-entrenched players. Rather, the company hopes to pick up where others leave off. Where it hopes to differentiate is by underscoring the fact that breaches are going to happen anyway, so customers might as well be prepared.
HP is hoping to squeeze into a window of opportunity with its services launch, created when organizations ramp up on security infrastructure, services and expertise, only to become a victim of a breach anyway.
Leave a Reply