SlideShare a Scribd company logo
1 of 26
BE THE FUTURE.
HP Endpoint Security Solutions
Grant Thomas
Growth Partner Sales Manager (UK&I)
Agenda
Introduction: HP Security – A track record in Endpoint Security
1) Device
a. HP SureStart (Self Healing BIOS)
b. HP SureRun
c. HP SureRecover
2) Identity
a. HP MIK
b. HP Image Assistant
c. HP Multi Factor Authentication
3) Data
a. HP SureView
b. HP SureClick
EMEA PrintOn! 2017
First
HP security: A track record in
endpoint security
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
2017
HP Sure Start
self-healing BIOS
(PC & Print)
Firmware intrusion
detection (PC & Print)
Leadership with BIOS
security standard since
2011
(NIST 800-147, ISO 19678)
Cryptographically
secure BIOS
updates First Print security
services
Chair TCG Technical
Committee
Standard
Designed and established TPM
device
security standards (ISO 11889)
First to ship
Certified TPM
Standard
First
First
Standard
First
2018
4
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
HP HARDENS THE SYSTEM WITH
HP ENDPOINT SECURITY CONTROLLER
BELOW THE OS
Firmware (BIOS, etc.)
Hardware HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
Creating a Root of Trust: using the
HP ESC, HP’s BIOS is trusted to be
secure.
TAKING PROTECTION TO A NEW LEVEL: OS
HARDENING
IN THE OS
Operating System,
Software, Downloads
BELOW THE OS
Firmware (BIOS, etc.)
Hardware HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
STRENGTHEN THE OS
HP Sure Run3, HP Sure Click8, HP Sure Recover4
In 2018, the HP Endpoint Security Controller will extend
HARDWARE-ENFORCED protection into the OS – building a
chain of trust.
ENFORCING COMPLIANCE WITH
MANAGEABILITY
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability
BELOW THE OS
Firmware (BIOS, etc.)
Hardware
ENFORCE COMPLIANCE
HP Management Integration Toolkit6
HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
STRENGTHEN THE OS
HP Sure Run3, HP Sure Click8, HP Sure Recover4
HP MIK ensures the systems continues working as it
should
2018
8
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
DEFEND AGAINST DEVASTATING FIRMWARE
ATTACKS
Protect your BIOS with HP Sure Start Gen4 2
HP Sure Start is the industry’s first
and still the only self-healing BIOS.
The BIOS is the first million lines of code that
run. It is the key to your PC’s foundation.
Why should customers care?
Once the BIOS is corrupted, the hackers
“own” your PC: all other protection is useless.
Antivirus, anti-malware, and OS firewalls will not detect an
infected BIOS!
2018
10
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
MALWARE TRIES TO ATTACK OS DEFENSES
Software security processes help keep your PC
safe:
• Antivirus in Windows Security Center stays on
the lookout to protect against known malware
• Firewall helps protect against attacks coming
through the network
• Cryptographic services keep your secrets
secured
Malware often tries to take out these
defenses
Designed to be the Most
Secure Windows Ever
Windows
10
HP
Products
OS
Processes
3rd Party
Processes
What makes sure these protections stay up and running?
MAKE SURE ATTACKERS CAN’T TURN OFF
YOUR ANTIVIRUS Protect critical security processes with HP Sure
Run3
HP Sure Run extends the HP Endpoint
Security Controller’s self-healing protection into
the OS.
It monitors key processes, alerts users and IT of
any changes, and restarts them automatically if
they’re stopped.
Designed to be the Most
Secure Windows Ever
Windows
10
HP
Products &
Processes
OS
Processe
s
3rd Party
Processe
s
OS
Processes
3rd Party
Processes
HP Sure Start
HP Sure Run
Secure the Processes that Secure your PC
HP Endpoint Security Controller enables
hardware-enforced application persistence
2018
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
MINIMIZE DOWNTIME
Recover quickly with HP Sure Recover4
14
HP Sure Recover offers
secure, automated, network-
based software image
recovery.
Using the HP Endpoint Security Controller,
it can quickly and securely reimage
machines to HP’s or the company’s latest
software image - using only an internet
connection
! 
Because HP Sure Recover4 is based in hardware, you
can reimage a PC, even from a bare hard drive.
REIMAGE ON DEMAND OR ON SCHEDULE
RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE.
User initiated IT
scheduled
!
FRESH START: IT can schedule
routine reimaging, so malware
doesn’t have a chance to stick
around.
• Ideal for Hospitality, Retail,
Healthcare, Education, etc.
ENABLING USERS to quickly
reimage their own machines
without IT support
AUTOMATED RECOVERY:
If no OS is found, the PC will
automatically present the user the
option to reimage
FLEXIBLE: Defaults to latest HP
image, or may be configured in
firmware to recover custom
enterprise image
2018
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
ENSURE EVERY PC STAYS PROTECTED.
Enforce your company’s security policies with HP Manageability Integration Kit
Gen26
Set policies for HP Sure
View7 and additional HP
Software
Manage new! HP Security
features
• HP Sure Run3
• HP Sure Recover4
Manage policies for 3 factors
or VPN credentials in HP
Multi-Factor Authenticate5
New UI makes it even easier
for ITDMs to create and
manage policies
N O W Y O U C A N M A N A G E M O R E H P S E C U R I T Y, M O R E H P
F E AT U R E S
HP Manageability Integration Kit is
the first and only Microsoft certified plug in for
SCCM
now in its second generation.
IMPROVE YOUR IMAGE
Build better software images in minutes with HP Image Assistant
New for 2018!
• Image Assistant now supports HP
Thunderbolt dock firmware
• Now with quick access to Product
Change Notifications and Customer
Advisories
R E F E R E N
C E
I M A G E T A R G E T
I M A G E
Image Assistant will report:
• Security issues
• Driver issues
• BIOS settings
Can install missing or outdated
components
Essential for Win 10 transition
An essential, free IT Admin tool to
develop, maintain, and support
software images for optimal Windows
performance.
- Compare HP factory image to corporate image to uncover
latest drivers, BIOS updates, updated components, and
more
2018
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Endpoint Security Controller
Key Additions and
Updates
HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
© Copyright Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
M U L T I - F A C T O R
A U T H E N T I C A T I O N
H A R D E N E D @ S I L I C O N
L E V E L
H a r d e n e d
M U L T I - F A C T O R A u t h e n t i c a t e 23
H P M U L T I
A U T H E N T I C A T E
Something
you know
Something
you have
Something
you are
Single-
factor
Two-factor
Multi-factor
NumberofFactors M u l t i - F a c t o r Au t h e n t i c a t i o n
m a k e s y o u r l o g i n
a m i l l i o n t i m e s
m o r e s e c u r e
P@$$W()
RD
PIN, biometrics, keys,
tokens and associated
certificates are
Captured, Encrypted,
Matched, and Stored in
the Hardware, out of
sight and reach from
typical attack methods.
SmartCar
d
P@$$W()
RD
SmartCar
d
Security Strength Posture
2018
21
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
WORK FREELY IN PUBLIC SPACES
HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12
Now in it’s SECOND GENERATION, HP Sure View
Gen2 enables a better visual experience in light OR
dark environments – from the plane to the café
What’s New
• Performs great in BRIGHT and DARK environments
• IPS panel technology
• Improved 120Hz REFRESH RATE, for smooth motion
• Reduced display thickness - ULTRA-THIN DESIGNS
HP Sure View Gen27 protects
against visual hacking with the press
of a button.
2018
23
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
HP Sure Click8
Browsing security solution
HP Sure View Gen27
Built-in privacy screen
© Copyright Hewlett-Packard Development Company
HP Sure Click – how it works
HP Sure
ClickEach web browser tab is
opened automatically in a
CPU-isolated Micro Virtual
Machine
Malware impacting one tab
has NO impact on any
other tab, app or the OS
Just close the tab & the
malware’s gone
tab2
tab3
Microvis
or
CPU VT
We
b
Pag
e
tab1
tab4
say web-borne
malware can be
undetectable3
81
%
OS
Apps
BIOS
Drivers
OS
Kernel
© Copyright Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
THE WORLD’S MOST SECURE AND MANAGEABLE PC
HP’s Security and Manageability Features Lenovo Dell Acer Apple HP
Below the OS Self-healing BIOS with Runtime Intrusion Detection (HP Sure Start Gen3) x x x x ✓
Common Criteria Certified TPM ✓ ✓ ✓ x ✓
Port and Device access control (HP Device Access Manager) x x x x ✓
Self-Encrypting Drives option ✓ ✓ x ✓ ✓
Secure Erase for both HDD and SDD (HP Secure Erase) ✓$ ✓$ x x ✓
In the OS One Step Logon from BIOS to Microsoft® Windows desktop x x x x ✓
Self-service password recovery for OS (HP SpareKey) x x x x ✓
Authentication with Hardened Biometrics (fingerprint) (HP Client Security Suite Gen3) ✓ ✓ ✓ ✓ ✓
Combination of factors for Authentication and Hardened Policies (HP Multi-Factor Authenticate) x x x x ✓
Secure Login to PC with smartphone based on proximity to PC (WorkWise) x x x x ✓
PC Tampering alerts sent to smartphone (WorkWise) x x x x ✓
Microsoft®
BitLockerDrive Encryption ✓ ✓ ✓ x ✓
Above the OS Integrated Privacy Screen (HP Sure View) x x x x ✓
Fleet management, including (HW, SW, BIOS), via Microsoft®
SCCM (HP Manageability Integration Kit) x x x x ✓
PC Image development and deployment through Microsoft®
SCCM plug-in (HP Manageability Integration Kit) ✓$ ✓$ x x ✓
PC Image comparison and recommendations (Image Assistant) x x x x ✓
THANK YOU!
HP ConfidentialHP Confidential

More Related Content

What's hot

z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code ScannerLuigi Perrone
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentIftikhar Ali Iqbal
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoNCCOMMS
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overviewNine23Ltd
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCanSecWest
 
Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoCWesley Li
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...Priyanka Aash
 
CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCanSecWest
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYRisman Hatibi
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013The Linux Foundation
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewMarketingArrowECS_CZ
 
Syncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security IntegrationSyncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security IntegrationPrecisely
 
Windows 10 deployment training for system builders
Windows 10 deployment training for system buildersWindows 10 deployment training for system builders
Windows 10 deployment training for system buildersnorthernlightz
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet TemplateTDSmaker
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Iftikhar Ali Iqbal
 

What's hot (16)

z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
 
Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoC
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application security
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider Overview
 
Syncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security IntegrationSyncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security Integration
 
Windows 10 deployment training for system builders
Windows 10 deployment training for system buildersWindows 10 deployment training for system builders
Windows 10 deployment training for system builders
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 

Similar to Grant Thomas - Understanding Hardware Security Threats

Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7aesthetics00
 
A comparison of security features in Dell, HP, and Lenovo PC systems
A comparison of security features in Dell, HP, and Lenovo PC systemsA comparison of security features in Dell, HP, and Lenovo PC systems
A comparison of security features in Dell, HP, and Lenovo PC systemsPrincipled Technologies
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT ProfessionalsRishu Mehra
 
Sogeti Experience Windows 7
Sogeti Experience Windows 7Sogeti Experience Windows 7
Sogeti Experience Windows 7mphacker
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgradeDana Popescu
 
View 4 Customer Presentation
View 4 Customer PresentationView 4 Customer Presentation
View 4 Customer Presentationepenedos
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized DesktopIT Masterclasses
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guideAndrey Karpov
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized DesktopKeith Combs
 
HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideAndrey Karpov
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical PresentationJohnTileyITQ
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXNGINX, Inc.
 
Understanding PCoIP and Zero Clients
Understanding PCoIP and Zero ClientsUnderstanding PCoIP and Zero Clients
Understanding PCoIP and Zero ClientsJennifer Phillips
 

Similar to Grant Thomas - Understanding Hardware Security Threats (20)

Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7
 
A comparison of security features in Dell, HP, and Lenovo PC systems
A comparison of security features in Dell, HP, and Lenovo PC systemsA comparison of security features in Dell, HP, and Lenovo PC systems
A comparison of security features in Dell, HP, and Lenovo PC systems
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 
Sogeti Experience Windows 7
Sogeti Experience Windows 7Sogeti Experience Windows 7
Sogeti Experience Windows 7
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgrade
 
Windows 7
Windows 7Windows 7
Windows 7
 
View 4 Customer Presentation
View 4 Customer PresentationView 4 Customer Presentation
View 4 Customer Presentation
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guide
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's Guide
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
Canada Windows 7 Tour
Canada Windows 7 TourCanada Windows 7 Tour
Canada Windows 7 Tour
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
 
Understanding PCoIP and Zero Clients
Understanding PCoIP and Zero ClientsUnderstanding PCoIP and Zero Clients
Understanding PCoIP and Zero Clients
 

More from Pro Mrkt

NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...Pro Mrkt
 
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingDavid Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingPro Mrkt
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefencePro Mrkt
 
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksNicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksPro Mrkt
 
Dave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyDave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyPro Mrkt
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingPro Mrkt
 
Matthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsPro Mrkt
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwarePro Mrkt
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18Pro Mrkt
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldPro Mrkt
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldPro Mrkt
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Pro Mrkt
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Pro Mrkt
 

More from Pro Mrkt (14)

NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
 
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingDavid Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
 
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksNicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
 
Dave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyDave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR Journey
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
 
Matthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its Impacts
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Grant Thomas - Understanding Hardware Security Threats

  • 1. BE THE FUTURE. HP Endpoint Security Solutions Grant Thomas Growth Partner Sales Manager (UK&I)
  • 2. Agenda Introduction: HP Security – A track record in Endpoint Security 1) Device a. HP SureStart (Self Healing BIOS) b. HP SureRun c. HP SureRecover 2) Identity a. HP MIK b. HP Image Assistant c. HP Multi Factor Authentication 3) Data a. HP SureView b. HP SureClick
  • 3. EMEA PrintOn! 2017 First HP security: A track record in endpoint security 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 HP Sure Start self-healing BIOS (PC & Print) Firmware intrusion detection (PC & Print) Leadership with BIOS security standard since 2011 (NIST 800-147, ISO 19678) Cryptographically secure BIOS updates First Print security services Chair TCG Technical Committee Standard Designed and established TPM device security standards (ISO 11889) First to ship Certified TPM Standard First First Standard First
  • 4. 2018 4 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 5. HP HARDENS THE SYSTEM WITH HP ENDPOINT SECURITY CONTROLLER BELOW THE OS Firmware (BIOS, etc.) Hardware HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 Creating a Root of Trust: using the HP ESC, HP’s BIOS is trusted to be secure.
  • 6. TAKING PROTECTION TO A NEW LEVEL: OS HARDENING IN THE OS Operating System, Software, Downloads BELOW THE OS Firmware (BIOS, etc.) Hardware HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 STRENGTHEN THE OS HP Sure Run3, HP Sure Click8, HP Sure Recover4 In 2018, the HP Endpoint Security Controller will extend HARDWARE-ENFORCED protection into the OS – building a chain of trust.
  • 7. ENFORCING COMPLIANCE WITH MANAGEABILITY IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability BELOW THE OS Firmware (BIOS, etc.) Hardware ENFORCE COMPLIANCE HP Management Integration Toolkit6 HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 STRENGTHEN THE OS HP Sure Run3, HP Sure Click8, HP Sure Recover4 HP MIK ensures the systems continues working as it should
  • 8. 2018 8 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 9. DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS Protect your BIOS with HP Sure Start Gen4 2 HP Sure Start is the industry’s first and still the only self-healing BIOS. The BIOS is the first million lines of code that run. It is the key to your PC’s foundation. Why should customers care? Once the BIOS is corrupted, the hackers “own” your PC: all other protection is useless. Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS!
  • 10. 2018 10 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 11. MALWARE TRIES TO ATTACK OS DEFENSES Software security processes help keep your PC safe: • Antivirus in Windows Security Center stays on the lookout to protect against known malware • Firewall helps protect against attacks coming through the network • Cryptographic services keep your secrets secured Malware often tries to take out these defenses Designed to be the Most Secure Windows Ever Windows 10 HP Products OS Processes 3rd Party Processes What makes sure these protections stay up and running?
  • 12. MAKE SURE ATTACKERS CAN’T TURN OFF YOUR ANTIVIRUS Protect critical security processes with HP Sure Run3 HP Sure Run extends the HP Endpoint Security Controller’s self-healing protection into the OS. It monitors key processes, alerts users and IT of any changes, and restarts them automatically if they’re stopped. Designed to be the Most Secure Windows Ever Windows 10 HP Products & Processes OS Processe s 3rd Party Processe s OS Processes 3rd Party Processes HP Sure Start HP Sure Run Secure the Processes that Secure your PC HP Endpoint Security Controller enables hardware-enforced application persistence
  • 13. 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 14. MINIMIZE DOWNTIME Recover quickly with HP Sure Recover4 14 HP Sure Recover offers secure, automated, network- based software image recovery. Using the HP Endpoint Security Controller, it can quickly and securely reimage machines to HP’s or the company’s latest software image - using only an internet connection !  Because HP Sure Recover4 is based in hardware, you can reimage a PC, even from a bare hard drive.
  • 15. REIMAGE ON DEMAND OR ON SCHEDULE RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE. User initiated IT scheduled ! FRESH START: IT can schedule routine reimaging, so malware doesn’t have a chance to stick around. • Ideal for Hospitality, Retail, Healthcare, Education, etc. ENABLING USERS to quickly reimage their own machines without IT support AUTOMATED RECOVERY: If no OS is found, the PC will automatically present the user the option to reimage FLEXIBLE: Defaults to latest HP image, or may be configured in firmware to recover custom enterprise image
  • 16. 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 17. ENSURE EVERY PC STAYS PROTECTED. Enforce your company’s security policies with HP Manageability Integration Kit Gen26 Set policies for HP Sure View7 and additional HP Software Manage new! HP Security features • HP Sure Run3 • HP Sure Recover4 Manage policies for 3 factors or VPN credentials in HP Multi-Factor Authenticate5 New UI makes it even easier for ITDMs to create and manage policies N O W Y O U C A N M A N A G E M O R E H P S E C U R I T Y, M O R E H P F E AT U R E S HP Manageability Integration Kit is the first and only Microsoft certified plug in for SCCM now in its second generation.
  • 18. IMPROVE YOUR IMAGE Build better software images in minutes with HP Image Assistant New for 2018! • Image Assistant now supports HP Thunderbolt dock firmware • Now with quick access to Product Change Notifications and Customer Advisories R E F E R E N C E I M A G E T A R G E T I M A G E Image Assistant will report: • Security issues • Driver issues • BIOS settings Can install missing or outdated components Essential for Win 10 transition An essential, free IT Admin tool to develop, maintain, and support software images for optimal Windows performance. - Compare HP factory image to corporate image to uncover latest drivers, BIOS updates, updated components, and more
  • 19. 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Endpoint Security Controller Key Additions and Updates HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management
  • 20. © Copyright Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. M U L T I - F A C T O R A U T H E N T I C A T I O N H A R D E N E D @ S I L I C O N L E V E L H a r d e n e d M U L T I - F A C T O R A u t h e n t i c a t e 23 H P M U L T I A U T H E N T I C A T E Something you know Something you have Something you are Single- factor Two-factor Multi-factor NumberofFactors M u l t i - F a c t o r Au t h e n t i c a t i o n m a k e s y o u r l o g i n a m i l l i o n t i m e s m o r e s e c u r e P@$$W() RD PIN, biometrics, keys, tokens and associated certificates are Captured, Encrypted, Matched, and Stored in the Hardware, out of sight and reach from typical attack methods. SmartCar d P@$$W() RD SmartCar d Security Strength Posture
  • 21. 2018 21 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 22. WORK FREELY IN PUBLIC SPACES HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12 Now in it’s SECOND GENERATION, HP Sure View Gen2 enables a better visual experience in light OR dark environments – from the plane to the café What’s New • Performs great in BRIGHT and DARK environments • IPS panel technology • Improved 120Hz REFRESH RATE, for smooth motion • Reduced display thickness - ULTRA-THIN DESIGNS HP Sure View Gen27 protects against visual hacking with the press of a button.
  • 23. 2018 23 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates HP Sure Click8 Browsing security solution HP Sure View Gen27 Built-in privacy screen
  • 24. © Copyright Hewlett-Packard Development Company HP Sure Click – how it works HP Sure ClickEach web browser tab is opened automatically in a CPU-isolated Micro Virtual Machine Malware impacting one tab has NO impact on any other tab, app or the OS Just close the tab & the malware’s gone tab2 tab3 Microvis or CPU VT We b Pag e tab1 tab4 say web-borne malware can be undetectable3 81 % OS Apps BIOS Drivers OS Kernel
  • 25. © Copyright Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. THE WORLD’S MOST SECURE AND MANAGEABLE PC HP’s Security and Manageability Features Lenovo Dell Acer Apple HP Below the OS Self-healing BIOS with Runtime Intrusion Detection (HP Sure Start Gen3) x x x x ✓ Common Criteria Certified TPM ✓ ✓ ✓ x ✓ Port and Device access control (HP Device Access Manager) x x x x ✓ Self-Encrypting Drives option ✓ ✓ x ✓ ✓ Secure Erase for both HDD and SDD (HP Secure Erase) ✓$ ✓$ x x ✓ In the OS One Step Logon from BIOS to Microsoft® Windows desktop x x x x ✓ Self-service password recovery for OS (HP SpareKey) x x x x ✓ Authentication with Hardened Biometrics (fingerprint) (HP Client Security Suite Gen3) ✓ ✓ ✓ ✓ ✓ Combination of factors for Authentication and Hardened Policies (HP Multi-Factor Authenticate) x x x x ✓ Secure Login to PC with smartphone based on proximity to PC (WorkWise) x x x x ✓ PC Tampering alerts sent to smartphone (WorkWise) x x x x ✓ Microsoft® BitLockerDrive Encryption ✓ ✓ ✓ x ✓ Above the OS Integrated Privacy Screen (HP Sure View) x x x x ✓ Fleet management, including (HW, SW, BIOS), via Microsoft® SCCM (HP Manageability Integration Kit) x x x x ✓ PC Image development and deployment through Microsoft® SCCM plug-in (HP Manageability Integration Kit) ✓$ ✓$ x x ✓ PC Image comparison and recommendations (Image Assistant) x x x x ✓

Editor's Notes

  1. But let me clarify one thing: HP is not new to this topic. When we look to the future, we draw from a deep history. In fact, we have been leading, inventing, reinventing endpoint security for the last 20 years. We have a history of actively working with the industry to develop security standards that create a safer and more trusted internet, and introducing industry firsts, raising the bar in PC and print security over the years, and continuing to do so today in our most recent product portfolio. For example, HP invented modern computer security architecture as you know it, working with leading industry partners like Microsoft or Intel. Almost a decade ago, we founded the Trusted Computing Group (which standardizes hw-based security for modern PCs: TPM, self-encrypting drives, …) where HP has always to this day held key leadership positions like the technical committee or the certification program chair. HP invests millions of dollars in research and development at HP Labs, devoting substantial resources to innovate on security and stay ahead of ever-more-sophisticated security threats for the new Blended Reality future. Some of our more recent firsts include: First Print Security Services in 2016 HP Sure Start Self-healing BIOS in PC & Print (2013 and 2015) Firmware Intrusion Detection built-in to our business printers and PCs
  2. This particular slide As you can see, this year the stack as expanded, highlighted by the