Vulnerabilities / Threats
2/16/2011
06:55 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

RSA: HP Proposes Holistic Security

Following three recent security acquisitions, HP sees a chance to focus the enterprise security discussion on risk management.

At the RSA Conference on Wednesday in San Francisco, Calif., Bill Veghte, EVP of HP's software division, declared that the traditional security model must change.

"The security model that we've built, that we've gown up with over the past 15 to 20 years, has to evolve," said Veghte in his keynote presentation.

It shouldn't come as a surprise that HP might have some ideas about how to improve enterprise security. In 2010, HP completed the acquisitions of three security companies -- ArcSight, Fortify Software, and TippingPoint (via 3Com) -- and has been wrestling with the task of unifying its security portfolio under a cohesive vision.

Veghte elaborated on that vision in a meeting prior to his keynote address. "It's all about risk," said Veghte. "Security is a characterization of risk."

Citing the increasing importance of mobility, virtualization, and cloud computing in large companies, trends accompanied by a broad effort to refresh enterprise applications, Veghte asserted that the ability to characterize risk remains a challenge because the necessary information is scattered among different systems.

"We've approached security layer by layer," he said. "I have one tool for Web access, another tool for network access, another tool for e-mail. And yet I can't answer the basic question: Am I secure?"

Unfortunately, the security dashboard for too many security executives is the newspaper: These CISOs have a dozen different tools that generate reports and they still have to check the newspaper to see if their systems have been breached, he said.

"There's a huge opportunity to provide a higher level of visualization, comprehension, and response," Veghte said.

The opportunity arises out of the massive volume of log data generated by security applications.

"The challenge is one of lots and lots of data," said Veghte during his keynote presentation. "We're drowning in data...We have more threats and less visibility."

Much of that potentially actionable security information will pass under the radar because companies just don't have the tools to integrate it into their business processes and policies.

During his keynote, Veghte elaborated on these themes and argued that security must evolve to encompass better analytics and IT metrics. Security, he suggested, needs to be expressed in terms of a risk level agreement. HP, he believes, can do that by providing companies with a more holistic view of their IT systems. That means moving beyond perimeter security and so-called "point solutions" to toward a broad security strategy that works with mobile, virtualization, and the cloud.

"We have to address the reality that the user is more empowered than ever before," he said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.