Risk
9/18/2013
02:49 PM
Connect Directly
RSS
E-Mail
50%
50%

HP Offers Continuous Monitoring Service For Government IT

HP Continuous Monitoring service integrates multiple software packages and risk management principles for federal agencies who must meet continuous monitoring mandates.

Iris Scans: Security Technology In Action
Iris Scans: Security Technology In Action
(click image for larger view)
HP on Tuesday introduced a new group of security products designed to help the government identify and report IT security vulnerabilities and improve situational awareness. The product line is also intended to provide enhanced protection of sensitive information.

The new offering is a set of services that integrates multiple software packages and is based on principles of security risks. Agencies can install HP Continuous Monitoring on their own, or HP can provide it as a service off-premise.

"Continuous Monitoring starts with a discussion with [an agency] on what they are willing to accept in terms of risk and how they can mitigate it. We implement the automated policies and we provide that to the IT person responsible for the network," Betsy Hight, VP of HP's cybersecurity solutions group for the U.S. public sector, said in a phone interview.

[ What can your business learn from the DOE's security goofs? Read Department Of Energy Cyberattack: 5 Takeaways. ]

Instead of simply providing a snapshot of potential threats, the software-based risk management architecture shows threats instantaneously across the agency by actively identifying and reporting potential vulnerabilities, such as new hardware or software on the network. If an employee plugs in a brand new computer, for instance, the network administrator would instantly see the unprotected device and could quarantine it. The architecture works on three levels: the IT side; middle management, addressing how risk affects processes; and the executive team, for the strategic and long-term effects of risk. "They all need to understand what's happening," said Hight.

HP Continuous Monitoring also complies with updated security mandates, including the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 and SP 800-137.

In 2010, the Office of Management and Budget (OMB) introduced a mandate for continuous monitoring of IT assets. The changes were defined in new Federal Information Security Management Act (FISMA) regulations, requiring agencies to implement software that supports continuous monitoring, and to start using Cyberscope, an online tool that reports how agencies are meeting the FISMA requirements. OMB last year asked agencies to reauthorize the security of all their systems at least annually, instead of reviewing the systems every three years as they have done in the past.

The proposed federal IT budget for fiscal year 2014 devotes more than $13 billion to cybersecurity programs, which includes $300 million in new funding for continuous monitoring.

Understanding security threats in real time will become an even bigger priority for agencies, said Hight. "The cyber domain is the next avenue for malicious activity impacting every organization both public and private," she said. "If we don't recognize the risks, we're setting ourselves up for failure."

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
WKash
50%
50%
WKash,
User Rank: Apprentice
9/23/2013 | 10:02:31 PM
re: HP Offers Continuous Monitoring Service For Government IT
No question, continuous monitoring systems/services are the way to go. But it seems that insider threat, a la Edward Snowden, where users are authorized to be on the network, will continue to elude tools that are focused on hardware and software activities and traffic patterns.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.