30 day-network-security-plan

27
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The 30-day network security improvement plan See and stop cyber attacks before damage is done— improve your network security in 30 days with HP TippingPoint.

Upload: hp-software-solutions

Post on 20-Aug-2015

930 views

Category:

Software


0 download

TRANSCRIPT

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

The 30-day network security improvement plan See and stop cyber attacks before damage is done— improve your network security in 30 days with HP TippingPoint.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 1 Install HP TippingPoint NGIPS 2 hours

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3

TippingPoint NGIPS is an in-line appliance that monitors network traffic to spot and block threats. Installation usually takes less than two hours. And once TippingPoint is deployed in-line, the existing 8,200+ vulnerability filters (Digital Vaccines) are protecting you right away.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 7 Check out the new TippingPoint NGIPS 15 minutes

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 5

It’s been a week. Log in to the TippingPoint appliance to see what’s going on. You’ll find we have automatically downloaded filters for newly discovered vulnerabilities.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 8 Read up on reputation data 1 hour

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 7

Get familiar with some of the other information HP TippingPoint uses to keep you safe. The reputation database is a black list of more than 2 million addresses and DNS names, used to block network traffic from/to known malicious or suspect Internet sites.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 10 View results and tune your policies 1 hour

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 9

After 10 days of protection, study the automated reports TippingPoint generates. You can see the top attacks that were blocked, and you can sort attack details by IP address and geography to see what part of your business is most threatened and tune TippingPoint to be most effective for you.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 11 Report status and results to your management 30 minutes

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 11

Send your management team a link to any report you created using the fully customizable dashboard, to show what you’ve been able to accomplish in just 11 days.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 14 Share your NGIPS security policies with the HP TippingPoint NGFW 30 minutes

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 13

The HP TippingPoint Next-Generation Firewall (NGFW) works together with the NGIPS to provide improved security at the edge of the network. It’s a simple matter to share the policies you have already developed.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 16 Configure your NGFW user policies 1 hour

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 15

Your HP TippingPoint Next-Generation Firewall (NGFW) doesn’t just keep you safer.

You can use it to optimize your network bandwidth utilization.

You can use policies to recover bandwidth.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 20 Learn more about threats—read the HP Security Research blog 30 minutes

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 17

HPSR publishes a weekly blog update with security news from around the world. It’s a great way to stay abreast of the latest threats and development and share info with others in your organization.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 21 Check on the TippingPoint NGIPS again 30 minutes

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 19

Log in to the TippingPoint

NGIPS to see what new filters

we have automatically

downloaded. You’ll probably

find about 10 new ones

protecting you from threats

you haven’t even heard about

yet. Send an email to your

management team letting

them know about the

additional protection “you”

have added.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 22 Create a custom security filter for a proprietary application 1 hour

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 21

HP TippingPoint Digital Vaccine Toolkit (DVToolKit) lets you create vulnerability filters of your own. You can step in and protect your business quickly while the development teams studies the problem and works on a patch.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 28 Check for any filters firing on false positives 1 hour

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 23

You probably won’t find any, because the way we develop filters keeps them to a minimum. When you do receive an alert, you can be confident you’re investigating a real attack.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Day 30 Send your management a monthly report 30 minutes

!

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 25

Send your first monthly security report showing • The number of attacks blocked • The number of vulnerabilities patched • How much network bandwidth you have been able to return to valid business purposes

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 26

Use the next 30 days to make your company safer. Learn more about HP TippingPoint NGIPS and NGFW.

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Thank you