Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Attack cybercrime head-on at RSA 2014

‎02-19-2014 09:22 AM - edited ‎09-16-2015 09:04 AM

HP’s security software products are leaders in each of their respective categories. Together, they deliver what no one else can—multi-dimensional security intelligence to help you fight the bad guys at every step of the attack lifecycle. And when you need a little help, HP Security Services is there to help you achieve your goals.

 

Here you see the attack lifecycle:

 




And here’s how HP can help attack, detect and block the adversaries:

 

 

 

 

Learn how to attack the bad guys in one of these theatre presentations:

 

  • Attack!  Identify and understand your adversary: The bad guys are collaborating. Now the good guys can, too. HP Security Research discloses how to see threats more broadly and understand how to stop them. Use actionable counterintelligence to prevent attacks before they occur.
    Monday 7:20/Wednesday 12:40

  • Attack!  Stop the bad guys from getting in:  Regain the upper hand! Block and detect the enemy with infrastructure security through HP TippingPoint. Learn about architectural considerations that can help you deploy a simple, reliable and effective solution to stop they bad guys from getting in.
    Tuesday 12:40/Wednesday 3:20

  • Attack! Protect your weakest link—your software:  Applications are the most frequent entry-point for attacks. Learn how HP Fortify can help to quickly and easily protect your software for vulnerabilities—including legacy, open source, third party, mobile, server and web. Keep the bad guys from getting past you! Tuesday 2:20/Wednesday 4:40.

  • Attack!  Find the intruders: Turn your data into actionable intelligence! Get a handle on security by detecting, responding to and resolving threats quickly with HP ArcSight. Learn how to bring it all together to help you find the bad guys within. Tuesday 4:40/Thursday 12:20

  • Attack! Protect Your Sensitive Data:  Stop the bad guys from seeing your data!  Data should be encrypted both at rest and during transmission. Create and manage all of those encryption keys with HP Atalla Enterprise Secure Key Manager. Unify key services across your enterprise while ensuring continuous protection and availability for critical business data.  
    Tuesday 3:20/Wednesday 11:20

  • Attack! Prevent loss of intellectual property: Include context of unstructured data in your security program.  Correlate suspicious activity and negative sentiments along with traditional security events and information.

    Tuesday 5:20/Thursday 2:20

 

We look forward to seeing you at these sessions at RSA 2014! And the bad guys? They don’t have a fighting chance.

0 Kudos
About the Author

Cindy_Blake

Events
Each Month in 2016
Online
Software Expert Days - 2016
Join us online to talk directly with our Software experts during online Expert Days. Find information here about past, current, and upcoming Expert Da...
Read more
Sep 30
Seattle, WA
OpenStack Days Seattle
OpenStack Days Seattle, September 30, is the largest gathering of OpenStack users and prospective users in the Pacific Northwest region.
Read more
View all