New Solutions Bring Flexibility and Effectiveness to Security Operations, DevOps and Data Protection to Enable Secure Digital
Transformation
NATIONAL HARBOR, MD--(Marketwired - Sep 14, 2016) - Today at HPE
Protect, the company's annual
enterprise security conference, Hewlett Packard Enterprise (NYSE: HPE) unveiled new solutions designed to streamline and
strengthen the approach to intelligent security operations, DevOps and data protection. These innovations in
security analytics,
application security, and
data security combine power and flexibility with ease-of-use, helping organizations fearlessly innovate and more intuitively
build security in to protect, detect, and respond to the evolving threat landscape.
In a hyper-connected world, technology advances such as hybrid cloud, employee managed devices and Internet of Things (IoT)
accelerate business agility; however, they can also introduce vulnerabilities that increase risk. Securing digital transformation
means building security into the IT infrastructure and providing visibility and actionable insight to enable intelligence-driven
security operations.
"Digital transformations are increasing productivity, but also introducing new vulnerabilities and threats that require more
streamlined and powerful security measures to protect what matters most," said Sue Barsamian (@suebarsamian),
senior vice president and general manager, HPE Security Products, Hewlett Packard Enterprise. "With new innovations, we are
helping customers build a comprehensive and intuitive approach to security leveraging the power of big data, machine learning,
and automation to proactively address risk to the enterprise."
Powering the Next-Generation Intelligent Security Operations
According to the
HPE State of Security Operations Report 2016, 85 percent of security operations centers (SOCs) are failing to meet business
goals, showcasing the need for a more strategic approach to security.1 HPE introduced the
HPE ArcSight Data Platform (ADP 2.0) to lay the foundation for combating the growing security challenges that security
operations face in detecting and responding to cyber threats.
HPE ADP 2.0 delivers up to 50 percent faster search and provides a centralized Event Broker that ingests 1 million events per
second, substantially improving the speed, scalability, and security visibility of big data management across IT, operational
technology (OT), IoT and physical inputs.2 The solution provides actionable insights based on both real-time
correlation and machine learning, and is the industry's first open architecture that seamlessly connects to any third party
application, empowering organizations with the flexibility to choose how they store, search and analyze data.
Strengthening Prevention through Integration
HPE's integrated approach to security is also evident in new HPE application security and data security
innovations.
The HPE Fortify Ecosystem and Fortify on Demand (FoD) continuous application monitoring service help organizations create
secure applications that seamlessly integrate security testing processes and resources into the fast-paced software development
lifecycle (SDLC).
Traditionally, organizations test applications after development or while in production, which has become increasingly
challenging with the rapid pace of today's development and deployment cycles. The HPE Fortify Ecosystem features integrated
systems spanning 10 distinct DevOps functional categories including Cloud, Containers, and Open Source, as well as more than 20
partners including
Microsoft, Docker, and
Chef,
allowing organizations to intuitively test and secure applications during development. With the HPE Fortify Ecosystem and FoD
continuous application monitoring, organizations can now secure their applications before, during, and after they are brought to
market.
The
integration between HPE SecureData and HPE Atalla HSM provides customers with a cohesive end-to-end data security approach to
protect their most sensitive data. These solutions deliver a comprehensive data security approach that pairs
Hyper Format-Preserving Encryption (FPE) and
Hyper Secure Stateless Tokenization (SST) technologies with
cryptography and key management.
Availability
For more information on HPE Security Products, please visit
http://www8.hp.com/us/en/software-solutions/enterprise-security.html.
HPE's annual enterprise security user conference, HPE
Protect, is taking place this week from Sept. 13-16 in National Harbor, Maryland. Follow HPE Security on Twitter, @HPE_Security,
and keep up with event happenings by following the event hashtag, #HPEProtect.
About HPE Security
HPE Security helps organizations protect their business-critical digital assets by building security into the
fabric of the enterprise, detecting and responding to advanced threats, and safeguarding continuity and compliance to effectively
mitigate risk. With an integrated suite of market-leading
products, services,
threat intelligence and
security research, HPE Security empowers organizations to balance protection with innovation to keep pace with today's idea
economy. Find out more about HPE Security at
https://www.hpe.com/us/en/solutions/protect-digital.html.
Join HPE Software on
LinkedIn and follow @HPE_Software
on Twitter. To learn more about HPE Enterprise Security products and services on Twitter, please follow @HPE_Security
and join HPE Enterprise Security on
LinkedIn.
About Hewlett Packard Enterprise
Hewlett Packard Enterprise is an industry-leading technology company that enables customers to go further, faster.
With the industry's most comprehensive portfolio, spanning the cloud to the data center to workplace applications, our technology
and services help customers around the world make IT more efficient, more productive and more secure.
Forward-Looking Statement
This document contains forward-looking statements within the meaning of the safe harbor provisions of the Private Securities
Litigation Reform Act of 1995. Such statements involve risks, uncertainties and assumptions. If such risks or uncertainties
materialize or such assumptions prove incorrect, the results of Hewlett Packard Enterprise could differ materially from those
expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact
are statements that could be deemed forward-looking statements, including any statements of the plans, strategies and objectives
of Hewlett Packard Enterprise for future operations; other statements of expectation or belief; and any statements of assumptions
underlying any of the foregoing. Risks, uncertainties and assumptions include the possibility that expected benefits may not
materialize as expected and other risks that are described in Hewlett Packard Enterprise's filings with the Securities and
Exchange Commission, including but not limited to the risks described in Hewlett Packard Enterprise's Registration Statement on
Form 10 dated July 1, 2015, as amended August 10, 2015, September 4, 2015, September 15, 2015, September 28, 2015 and October 7,
2015. Hewlett Packard Enterprise assumes no obligation and does not intend to update these forward-looking statements.
1 "State of Security Operations Report 2016" HPE Security Intelligence and Operations Consulting (SIOC), January
2016.
2 Based on internal testing compared to HPE ADP 1.0