HP Limited - Experts & Thought Leaders

Latest HP Limited news & announcements

SailPoint appoints JeongGwon Jee as its first country manager in South Korea

SailPoint Technologies Holdings, Inc., the pioneer in enterprise identity security, announced that JeongGwon Jee has been hired as its first country manager in South Korea as the company continues to focus on addressing the growing demand for identity security and the evolving needs of today’s modern enterprises in the region. “SailPoint’s vision is to secure enterprises while empowering their workforce. In today’s complex IT environment, enterprises need flexibility and ease of deployment which is why SailPoint is committed to providing solutions that are autonomous, intelligent and integrated,” said Chern-Yue Boey, Senior Vice President for Asia-Pacific, SailPoint. “JeongGwon joins SailPoint as we continue to shift our business towards SaaS and bring our next-generation identity security capabilities to protect enterprises against security threats. JeongGwon has deep knowledge of the enterprise technology sector in Korea and has extensive experience in sales, operations and achieving customer success. His market expertise and leadership will be instrumental in helping us grow the business in South Korea.”  Adding years of experience JeongGwon was most recently General Manager at Openmade Consulting where he managed the Oracle Database/SQL software business in South Korea. Prior to Openmade Consulting, he was a Vice President at Oracle Korea where he led sales and acquisitions and secured new client wins, resulting in tremendous growth for the business. Previously, he was also the country general manager at HP Korea, responsible for all pillars of service – consulting, SI and outsourcing.   Building a foundation SailPoint is well-positioned to enable businesses to build a foundation in identity security “As an industry leader in identity security, SailPoint is well positioned to enable businesses to build a foundation in identity security and management to stay ahead of cyber threats.” “With its cutting-edge technologies in identity security, SailPoint also gives businesses critical visibility and control to secure the entire workforce across all identities and access points,” said JeongGwon Jee, country manager for South Korea, SailPoint. “As enterprises in South Korea continue their digital transformation efforts, I look forward to building a strong team to support our customers and partners in their identity security journey.”  Expansive global partner SailPoint has an expansive global partner network around the world along with a large system integrator network which includes Accenture, Deloitte, E&Y, KPMG and PwC. JeongGwon’s appointment in South Korea stems from the continued innovation and expansion for the company, globally. In Q1 of 2021, SailPoint announced enhancements to its solution, providing an open and extensible platform, which helps its customers customise their identity security experience.

Pulse Secure NAC extends Zero Trust Network Assurance as users and IoT devices return to a hybrid workplace

Pulse Secure announced new features to its Network Access Control (NAC) solution, Pulse Policy Secure (PPS), that enhance endpoint and IoT device visibility, compliance, remediation, and threat response as organisations embrace expanded remote work flexibility with employees and their devices returning to a hybrid workplace. Available separately or as part of Pulse Access Suite Plus, Pulse Policy Secure (PPS) is an enterprise-class NAC solution that is easy to deploy, manage and scale. The update release includes over 30 new features and enhancements such as support for additional endpoint detection and response (EDR) and IoT / OT vendors including McAfee and Nozomi. With businesses slowly opening up more modified and social-distanced work settings and accelerating multi-cloud and hybrid IT resource use, organisations are experiencing increased attack vectors and exploits stemming from endpoint and IoT device exposures. Hybrid work environment What’s required to ensure user productivity and information security in today’s hybrid work environment is greater managed and unmanaged device oversight, expanded endpoint compliance and remediation capability, and means to unify remote and on-premise access control. In the “2020 Endpoint and IoT Zero Trust Security” Report, Cybersecurity Insider’s noted the following survey results: 66% saw an “increase to significant increase” in endpoint and IoT security incidents impact over the last 12 months, with the top 3 being malware, insecure network and remote access, and compromised credentials / weak authentication. 50% anticipate “high to likely” that their organisation will become compromised due to an endpoint or IoT originated attack in the next 12 months. 48% have “moderate to unlikely means” to discover, identify and respond to unknown, unmanaged, or insecure devices accessing network and cloud resources. Threat response capabilities Pulse Secure ranked among the top 3 hybrid NAC vendors by global market share Modern Network Access Control solutions provide the agent and agentless visibility, contextual access policy control and integrated threat response capabilities necessary to prevent endpoint exposures that yield identity theft, malware and network compromise. Regulated industries, such as financial services and healthcare, need to be especially diligent in enforcing endpoint compliance and segregating IoT access. According to a recent market report by IDC, NAC is a mainstream market forecasted to grow 10.7%, reaching $1.9B by 2024. NAC has evolved from an admission control tool to enable real-time, on-premises endpoint, mobile and IoT device discovery, assessment, enforcement and remediation capabilities. In this report, Pulse Secure ranked among the top 3 hybrid NAC vendors by global market share - offering 802.1X, non-802.1X agent-based agentless functions. High performance appliance The report’s “Who Shaped the Year” section highlights Pulse Secure’s capabilities: Pulse Policy Secure (NAC) offers the complete range of capabilities, including 802.1X and non-802.1X, agent and agentless Client, and network profiling with UEBA, which gives enterprises flexibility to deploy across a gamut of hybrid IT environments. This makes Pulse Secure's NAC ideal to support a wide range of use cases, such as: visibility only, full-featured 802.1X, agent-based BYOD (they offer a mobile VPN and MDM), as well as agentless guest, IoT and IT/OT security. Having a built-in RADIUS server, high performance appliance (up to 50,000 concurrent sessions), centralised management (up to 400 appliances), and ecosystem integrations also provides benefits to NAC scalability and interoperability. Secure access technologies Modern NAC solutions are increasingly becoming a critical component of a multifaceted secure access programme" As a Secure Access platform play, competing with Cisco, Fortinet and HP, Pulse Secure provides a portfolio of solutions available separately or as an integrated suite for hybrid IT. Pulse Secure offers all three primary secure access technologies recognised by IDC: VPN, NAC, and SDP. With unified Client, appliance, management and rules engine, this cross functionality allows corporate policy to be set across any combination of solutions. As the pandemic forces adopting organisations to prioritise securing the growing remote workforce, Pulse Secure is able to provide a comprehensive solution-set which does not requiring sacrificing the continuing need for on-premise security. Secure access programme “Beyond the merits of device visibility and access enforcement, modern NAC solutions are increasingly becoming a critical component of a multifaceted secure access programme, both supporting a wide variety of important uses and adding value through key integrations with other security technologies,” said Peter Finalle, Senior Research Analyst for IDC’s security team. “Pulse Secure is distinguished among Secure Access platform players as offering extensive hybrid NAC capabilities, device intelligence, scalability and key integrations while delivering user experience, endpoint security, and access management across NAC, VPN and SDP solutions.” New features enhance endpoint compliance Pulse Secure offers a portfolio of Secure Access solutions that provide exceptional usability and visibility “The latest release of Pulse Secure NAC continues to advance our deployment, usability and threat response capabilities while delivering enterprise-class functionality,” said Ganesh Nakhawa, Director of Portfolio Solutions at Pulse Secure. “With our unique means to offer a unified endpoint compliance and protected connectivity capabilities across mobile, network and cloud environments, organisations can mitigate endpoint and IoT security risks while ensuring productivity no matter where employees work.” Pulse Secure offers a portfolio of Secure Access solutions that provide exceptional usability, visibility and Zero Trust policy orchestration to enable seamless, compliant user and device access to applications and resources across distributed network and cloud environments. Security posture assessment New PPS version 9.1R8 features and enhancements include: Endpoint security compliance enhancements with leading endpoint detection and response (EDR) vendors including new McAfee ePolicy Orchestrator (ePO) integration. This allows organisations to assign role-based access based on device attribute details provided by McAfee ePO, automatically install McAfee ePO client if not detected, and limit or block connectivity based on threat alerts received from ePO, such as non-compliant or compromised devices. Agentless device discovery and security posture assessment advancements, such as expanded passive device fingerprinting using TCP and SMB protocols, to enhance endpoint access control and reduce administrative classification tasks. Greater device visibility and threat response for Industrial Control System (ICS) environments based on increased IoT/IIoT device classifications, and automated access control based on threat severity notifications from IT and OT security vendors such as Nozomi. Management UI improvements that simplify and streamline administrative tasks such as new search and custom reporting options to expedite audits, investigations and operational insight. Government contractor applications Pulse Policy Secure has FIPS 140-2 Level 1 certification and is Common Criteria certified extensive deployment in government, military and government contractor applications. Used to satisfy NIST 800-53 controls and Comply-to-Connect requisites, the solution is certified on the U.S. DoD Unified Capabilities (UC) Approved Products List (APL) and for J Joint Warfighting IT Interoperability (JTIC). NAC Upgrade Program - Organisations can take advantage of Pulse Secure’s Trade-in Program to replace current NAC solutions from companies such as Forescout, Cisco, Aruba, and Fortinet.

Ping's Intelligent Identity Platform powers the HP Identity management ecosystem

Ping Identity, the pioneer in Identity Defined Security, announced that its Ping Intelligent Identity Platform powers the engine behind HP Identity (HP ID), an enterprise-wide unified identity management ecosystem. The HP ID initiative is designed to up level customer and partner experiences by providing them with a single identity across all of their HP applications, whether in the cloud or on-premises.  With a focus on driving customer experiences, HP selected the Ping Identity platform deployed in Amazon Web Services (AWS). This achieved its goal of instituting a single and highly secure identity and access management (IAM) platform across its entire global customer and partner-facing platform. Single sign-on for 150 million customers Ping’s customer IAM platform provides performance and scalability that can keep pace with HP’s continued innovation and growth"The HP ID platform is used by more than 100 business applications and enables single sign-on for over 150 million customer and partner identities across the world, plus thousands more being added each day. Before HP ID, the company was managing more than a dozen separate legacy IAM and authentication systems. User identities were previously housed across disparate data silos, creating a disjointed customer experience. Reinventing customer experiences HP Product Manager Jared Meier sums up the success of HP ID, “Ping’s customer IAM platform provides performance and scalability that can keep pace with HP’s continued innovation and growth. Now, customers have a seamless experience when they authenticate across our digital properties.” “Ping and HP share a common vision of innovation, great customer experiences and technology that makes life better for everyone, everywhere,” added Andre Durand, CEO, Ping Identity. “We’re proud to support HP in reinventing customer experiences through identity.”

Insights & Opinions from thought leaders at HP Limited

Video surveillance advancements lead to data storage challenges

The LTO Program discusses how organisations are struggling to balance thebenefit of video surveillance with high costs and increasing legal parameters We live in a world where there is an increasing need for video surveillance for crime prevention and public security and safety. Video surveillance is being used in greater quantity and with higher quality expectations in airports, cities and workplaces around the globe. In fact, the average person is reportedly caught on a surveillance recording more than 75 times per day. From security camera footage to body cameras, this system of surveillance is also producing gigantic amounts of data daily. A day of video surveillance, for example, is estimated to be collecting more than 500 petabytes (PB) of data. And this number is increasing. According to a recent IHS Technologies report, future estimates show that by 2019 data will grow to over 2,500 petabytes daily. Organisations and governments are struggling to balance the benefit of video surveillance with the high costs, resources and increasing legal parameters being developed. How is video surveillance used today? Body cameras and surveillance footage have been in the news nearly every day over the past few years, and have played a huge role in many high profile cases. For example, the role of video in law enforcement was invaluable in bringing the 2013 Boston Marathon bombers to justice. Following the 2014 shooting of Michael Brown in Ferguson, Missouri, law enforcement agencies across the country integrated body cameras into their organisations, adding to the existing use of patrol car cameras. And with tighter security in airports, many airports are installing close to 20,000 cameras throughout their terminals. However, footage of fatal shootings, for example, is often cut or edited, and occasionally lost due to poor storage handling or lack of security. New regulations are being implemented to combat these issues, calling for surveillance videos to be retained for longer periods of time and in some cases indefinitely. Where is all of this video going? Who is responsible for maintaining that critical footage over long periods of time, and ensuring the data is safe and easy to access when needed?  But where is all of this video going? Who is responsible for maintaining that critical footage over long periods of time, and ensuring the data is safe and easy to access when needed? What is the true cost of this system? And what does it mean for the future of the video surveillance industry as more and more video is captured? The main challenges facing organisations grappling with the increase of video surveillance are the amount of video being captured, how to store it for infinite amounts of time and the cost to maintain this storage. How much video is there? As with most industries, data collection is used to retain data for legal purposes and future analytics. When thinking about the industry verticals that use video surveillance, the amount of data is endless. Let’s look at one example – airports. Thinking about the 20,000 cameras at a typical international airport, and assuming the airport is using 15 frame NTSC video capture, that’s 5.3 PB of data per day! Even if the data frame rate is reduced to 3 frames per second, that’s still 1 PB of data daily and 30 PB of data each month. There’s no questioning the enormous amount of data being captured. Now let’s think about how long this video needs to be stored. Airport guidelines require any “event” to be stored for seven or more years! An “event” includes theft, reported injuries and any conflicts. These “events” happen anywhere between 20 to 40 times per day. For the purposes of estimating the amount of data these “events” produce, let’s assume the following - if each “event” is ten minutes long and captured on at least ten cameras, that’s about 18 GB of data that needs to be kept for seven plus years. With 20 to 40 of these occurrences happening daily, that’s 360-720 GB per day! Current data collection practices tend to be locally stored on-site or sent to cloud storage. In many video surveillance environments, it is common to use local DVR or NAS storage systems. This large amount of daily data is an insurance of sorts for the airport and sometimes individuals involved in the incident and some feel that the benefits of having this video surveillance justifies the cost of managing the data. What is the true cost of storage? In every industry, video surveillance helps protect an organisation from liability. But what is the cost for this insurance? Where should industry leaders turn to get the most out of this investment? Should they choose disk, cloud or tape? Let’s take a look at the costs of storing all this video data. Assuming that only ten percent of the video will ever be looked at, the total cost of ownership has been calculated below (Figure 1). Figure 1: Total Cost of Ownership Long Term (cloud data was pulled based on the public pricing provided by both Google and Amazon) In this comparison, the Object Storage JBOD is given the benefit of the lowest cost open compute type storage. This comparison also takes into account having management of tape and object storage technology on-site, which increased the cost, but gives a more realistic representation of pricing. It is clear that tape technology is the lowest cost storage solution for digital data. With the introduction of the Linear Tape File System (LTFS) the system is easier to use than ever It is clear that tape technology is the lowest cost storage solution for digital data. With the introduction of the Linear Tape File System (LTFS) the system is easier to use than ever. In relation to the surveillance industry, LTFS allows data to be viewed in the same way that it is seen on a disk system. Working with LTO tape technology, LTFS allows tape to be self-describing and improves archive management. Utilising data from an LTO tape solution is now as simple as dragging and dropping the files. In order to create savings for consumers and lower company bottom lines, surveillance and security industry professionals need to embrace low cost solutions for increasing storage needs. With legal requirements mounting, it is imperative that a lower cost solution be implemented to keep data secure, easily accessible and stored for long periods of time. How can the industry adapt to this new wave of data? The video surveillance and security industry are looking at increasing data needs and with it comes new challenges and regulations. Industry leaders are going to need to address this data wave head first with sustainable, long-term solutions. Video surveillance is the security solution of the future and will continue to be used to protect and serve communities globally.   By The LTO Program is a consortium of representatives setting standards and specifications for Linear Tape-Open storage technology, overseen by Hewlett Packard Enterprise, IBM and Quantum.  

Affordable cloud-based cybersecurity subscription adds value with email alerts and 24/7 service for resellers and SMB customers

SIPcurity is a new breed of security product that is a key element of anyAdvanced Threat Protection (ATP) framework As cyber threats continue, there’s no business or market immune from malicious takeover and data compromise. Now, systems integrators have a new, cloud-based weapon in their arsenal designed specifically as an affordable monthly subscription service to prevent telecommunications attacks and takeovers directed at small to medium businesses (SMBs).  According to the annual Ponemon Institute 2015 Cost of Cyber Crime Study, sponsored by Hewlett-Packard and released in late fall 2015, the average annualised cost of cyber-crime in the U.S. is now $15 million, up 19 percent over the 2014 report. SIPcurity programme – simple and cost-effective Datacom Warranty Corp. (DWC), Alpharetta, Georgia, recently announced a partnership with SIPcurity, Norcross, Georgia, to provide a cost-effective, cloud-based cybersecurity protection platform that’s a real-time solution integrated into the businesses’ existing firewall and PBX system. According to Rusty Bryan, founder of DWC, the company’s integrator-partners will now be able to provide affordable cybersecurity to the SMB market, without installing additional equipment at the customer site. “With this service cybersecurity protection resides on the customer’s firewall and IP PBX and it blocks access to the network’s IP addresses, preventing attacks. It’s inexpensive for the reseller-partner and can be leveraged as a monthly subscription service, and simply another line item in managed services programmes. In addition, the SIPcurity programme provides regular email reports on attempted attacks, another value-add to the systems integrator and the customer, who becomes even stickier with these services,” he says. DWC hardware warranty service DWC’s core business provides integrators with an equipment warranty service that allows service providers to build additional recurring monthly revenue (RMR) through their service agreements and robust managed services. DWC began its hardware warranty programme, backed by sales training, marketing support, and total hardware system protection, in 1990. DWC’s Bronze Warranty™ programme helps integrators and their customers move from reactive, break-fix, time and material (T&M) services to a proactive model that takes the worries of hardware failure away from users. Now, cybersecurity can also be part of the programme.   SIPcurity protects businesses’ critical infrastructure and Internet access, detectingmalicious activity, and sending out alerts when an attack is detected and blocked Affordable pricing, email alerts and 24/7 service According to James Wang, Managing Partner, SIPcurity, pricing is especially affordable to SMBs who may not have internal IT staff to mitigate threats or the budget for other cybersecurity programmes on the market. “It’s affordable and there’s no additional equipment needed,” Wang says. “The monthly subscription includes updates and upgrades and is a seamless, hosted platform that has also been found to lower some insurance premiums as well,” he says. SIPcurity is a new breed of security product that is a key element of any Advanced Threat Protection (ATP) framework, Wang continues.  “The 24/7 service protects businesses by identifying, repelling and blocking cybersecurity breaches in VoIP. SIPcurity actively protects businesses’ critical infrastructure and Internet access, detecting and mitigating malicious activity, and sending out security alerts when an attack is detected and blocked.” Protecting the communications infrastructure  SIPcurity has documented a variety of threats to the phone communications and VoIP lines at customer locations. For the systems integrator, this service could be easily applied to current customers; their own businesses; and even central station companies. The DWC and SIPcurity subscription plan targets the following end-user challenges:  Toll fraud,  Distributed Denial of Service (DDoS),  Eavesdropping,  Registration hijacking and, Ineffective security tools like SIPVicious and firewalls.   SIPcurity has been tracking such attacks, says Thomas ‘Hank’ Appleton, Director of Sales. “In one instance alone, Bob Foreman, a principal architect with Foreman Seeley Fountain Architecture, Norcross, Ga., got a $166,000 phone bill in a single weekend after hackers broke into the company’s phone network. Hackers had routed $166,000 worth of calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives,” Appleton says.  Beyond traditional physical security, systems integrators can add value with managed services that target new challenges to the end-user market, including cybersecurity threats to communications.

Quick poll
What is the most significant challenge facing smart building security today?