HP Services Target Breach Aftermath

Hewlett Packard is taking the stance that customers are likely to get hacked and is giving them the right tools to clean up the mess.

  • Tweet  
  • LinkedIn  
  • Facebook  
  • Google plus  
  • Send to Kindle
  • Send to  

Think it’s hard to prevent an exponential number of advanced threats and zero-day attacks from infiltrating your network? Hewlett Packard Co. isn’t even trying.

The Palo Alto, Calif.-based PC manufacturer is adopting a new approach: Its customers are inevitably going to get hacked, and its new service will clean up the mess.

Related articles

This approach could arm partners with new approach tactics to seize opportunitiescreated when customers bulk up security infrastructure but get pummeled with breaches and malware anyway.

Essentially, the HP Breach Management Solutions help organizations in the wake of a cyberattack -- it's a comprehensive offering that includes response, remediation and mitigation for organizations. The services tout a combination of HP's security acumen with intelligence software that can deal with the aftermath of a major data breach or cyber-incident. Instead of combating threats before an attack, HP’s security intelligence can identify a breach once it's occurred. The service equips customers with adequate reaction tools, which includes minimizing impact and reducing window of vulnerability.

“It’s nearly impossible for organizations to prevent a breach, but they can take control of how they respond,” said Andrzej Kawalec, HP chief technology officer of enterprise security services. “Combining HP’s portfolio of services and software, the HP Breach Management Solution arms clients with the tools and resources to monitor, manage and respond to breaches head on, minimizing their impact while readying for the next attack.”

HP Forensic Readiness Service gives customers a leg up before an attack occurs by establishing policies and procedures around forensic investigation. The service enables organizations to assess policies for breach investigations, establish a forensic readiness policy and better understand how investigations gather digital evidence.

Also under the umbrella of HPs new services launch:

  • HP Breach Response Service provides 24/7 expert monitoring for intrusion detection and response.
  • HP Digital Forensic Services develops a clear set of processes and policies for collection and analysis of evidence following a security incident.
  • HP eDisclosure and eDiscovery Services helps organizations develop tight policies and processes for capturing logging data.
  • HP Security Information and Event Management (SIEM) Service collects, logs, sorts and filters relevant security events.
  • HP Discovery Services mitigates consequences of data loss or deletion through designing and implementation processes for backup and recovery.

The comprehensive security services -- or more accurately, remediation and response services --  are a gamble for HP, which thus far has been reserved with its security launches (sourced to ArcSight, Fortify and TippingPoint, all acquired over the last three years). But it’s one that could fit well into channel portfolios. One of the biggest reasons: it's a slightly unorthodox approach to security that could allow solution providers to edge their way into rapidly filling threat service markets.

It’s no secret many of HP ‘s biggest competitors have secured a place in the burgeoning threat analytics space -- Dell Inc. and EMC Corp. have each pursued an aggressive agenda in with multiple service launches. Those services tout a slew of advanced threat capabilities that offer early detection and blocking to prevent malware from entering a network. Dell has attempted to make its mark with a series of advanced threat offerings that coat the security spectrum -- vulnerability management and Web scanning, to security surveillance and threat analytics.

RSA, the security division of EMC Corp., has targeted the space with services that include threat monitoring and rogue mobile app detection.

With a late start out the gate, HP knows it faces formidable challengers in advanced threat detection and analysis arenas. And, in a sense, HP isn’t trying to compete with better-entrenched players. Rather, the company hopes to pick up where others leave off. Where it hopes to differentiate is by underscoring the fact that breaches are going to happen anyway, so customers might as well be prepared.

HP is hoping to squeeze into a window of opportunity with its services launch, created when organizations ramp up on security infrastructure, services and expertise, only to become a victim of a breach anyway.

  • Tweet  
  • LinkedIn  
  • Facebook  
  • Google plus  
  • Send to Kindle
  • Send to  

Want more articles like this?

More on Backup/Business Continuity/Disaster Recovery

Why the channel is missing today’s DR opportunity

Disaster recovery can bring in the profits if you get it right, says Zetta.net's Eddie Tsiao

A man staring into a stack of racks in frustration

Disaster recovery MSPs should focus on outage cost to customer

Actual figures will facilitate customer understanding


Microsoft's Hansen to lead Dropbox sales and channels

File sync-and-share vendor continues B2B push


Exploit hyper-convergence, Asigra summit hears

Partners should exploit customers' desire for simplicity

Visitor comments
Add comments
blog comments powered by Disqus

Why the channel is missing today’s DR opportunity

Disaster recovery can bring in the profits if you get it right, says Zetta.net's Eddie Tsiao

Thank you note

Five ‘thankworthy’ trends for the channel

Solution providers should count rising sales, great expectations for the new year and end users among their blessings this Thanksgiving

Big data

Big data means big profits

Big data analytics could soon be solution providers' top play - will you be prepared?

Artist impression of the Cable Network exploring the impact of the electric telegraph in the 19th century. C. 2013 Science Museum Universal Design Studio

Using what’s ‘new’ to shed light on the ‘old’

Digital signage, virtual reality and beacons are all the rage at some of the world’s most enterprising museums