SlideShare a Scribd company logo
BE THE FUTURE.
HP Endpoint Security Solutions
Grant Thomas
Growth Partner Sales Manager (UK&I)
Agenda
Introduction: HP Security – A track record in Endpoint Security
1) Device
a. HP SureStart (Self Healing BIOS)
b. HP SureRun
c. HP SureRecover
2) Identity
a. HP MIK
b. HP Image Assistant
c. HP Multi Factor Authentication
3) Data
a. HP SureView
b. HP SureClick
EMEA PrintOn! 2017
First
HP security: A track record in
endpoint security
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
2017
HP Sure Start
self-healing BIOS
(PC & Print)
Firmware intrusion
detection (PC & Print)
Leadership with BIOS
security standard since
2011
(NIST 800-147, ISO 19678)
Cryptographically
secure BIOS
updates First Print security
services
Chair TCG Technical
Committee
Standard
Designed and established TPM
device
security standards (ISO 11889)
First to ship
Certified TPM
Standard
First
First
Standard
First
2018
4
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
HP HARDENS THE SYSTEM WITH
HP ENDPOINT SECURITY CONTROLLER
BELOW THE OS
Firmware (BIOS, etc.)
Hardware HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
Creating a Root of Trust: using the
HP ESC, HP’s BIOS is trusted to be
secure.
TAKING PROTECTION TO A NEW LEVEL: OS
HARDENING
IN THE OS
Operating System,
Software, Downloads
BELOW THE OS
Firmware (BIOS, etc.)
Hardware HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
STRENGTHEN THE OS
HP Sure Run3, HP Sure Click8, HP Sure Recover4
In 2018, the HP Endpoint Security Controller will extend
HARDWARE-ENFORCED protection into the OS – building a
chain of trust.
ENFORCING COMPLIANCE WITH
MANAGEABILITY
IN THE OS
Operating System,
Software, Downloads
ABOVE THE OS
Manageability
BELOW THE OS
Firmware (BIOS, etc.)
Hardware
ENFORCE COMPLIANCE
HP Management Integration Toolkit6
HP Endpoint Security Controller
TRUSTED BIOS
HP Sure Start Gen42
STRENGTHEN THE OS
HP Sure Run3, HP Sure Click8, HP Sure Recover4
HP MIK ensures the systems continues working as it
should
2018
8
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
DEFEND AGAINST DEVASTATING FIRMWARE
ATTACKS
Protect your BIOS with HP Sure Start Gen4 2
HP Sure Start is the industry’s first
and still the only self-healing BIOS.
The BIOS is the first million lines of code that
run. It is the key to your PC’s foundation.
Why should customers care?
Once the BIOS is corrupted, the hackers
“own” your PC: all other protection is useless.
Antivirus, anti-malware, and OS firewalls will not detect an
infected BIOS!
2018
10
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
MALWARE TRIES TO ATTACK OS DEFENSES
Software security processes help keep your PC
safe:
• Antivirus in Windows Security Center stays on
the lookout to protect against known malware
• Firewall helps protect against attacks coming
through the network
• Cryptographic services keep your secrets
secured
Malware often tries to take out these
defenses
Designed to be the Most
Secure Windows Ever
Windows
10
HP
Products
OS
Processes
3rd Party
Processes
What makes sure these protections stay up and running?
MAKE SURE ATTACKERS CAN’T TURN OFF
YOUR ANTIVIRUS Protect critical security processes with HP Sure
Run3
HP Sure Run extends the HP Endpoint
Security Controller’s self-healing protection into
the OS.
It monitors key processes, alerts users and IT of
any changes, and restarts them automatically if
they’re stopped.
Designed to be the Most
Secure Windows Ever
Windows
10
HP
Products &
Processes
OS
Processe
s
3rd Party
Processe
s
OS
Processes
3rd Party
Processes
HP Sure Start
HP Sure Run
Secure the Processes that Secure your PC
HP Endpoint Security Controller enables
hardware-enforced application persistence
2018
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
MINIMIZE DOWNTIME
Recover quickly with HP Sure Recover4
14
HP Sure Recover offers
secure, automated, network-
based software image
recovery.
Using the HP Endpoint Security Controller,
it can quickly and securely reimage
machines to HP’s or the company’s latest
software image - using only an internet
connection
! 
Because HP Sure Recover4 is based in hardware, you
can reimage a PC, even from a bare hard drive.
REIMAGE ON DEMAND OR ON SCHEDULE
RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE.
User initiated IT
scheduled
!
FRESH START: IT can schedule
routine reimaging, so malware
doesn’t have a chance to stick
around.
• Ideal for Hospitality, Retail,
Healthcare, Education, etc.
ENABLING USERS to quickly
reimage their own machines
without IT support
AUTOMATED RECOVERY:
If no OS is found, the PC will
automatically present the user the
option to reimage
FLEXIBLE: Defaults to latest HP
image, or may be configured in
firmware to recover custom
enterprise image
2018
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
ENSURE EVERY PC STAYS PROTECTED.
Enforce your company’s security policies with HP Manageability Integration Kit
Gen26
Set policies for HP Sure
View7 and additional HP
Software
Manage new! HP Security
features
• HP Sure Run3
• HP Sure Recover4
Manage policies for 3 factors
or VPN credentials in HP
Multi-Factor Authenticate5
New UI makes it even easier
for ITDMs to create and
manage policies
N O W Y O U C A N M A N A G E M O R E H P S E C U R I T Y, M O R E H P
F E AT U R E S
HP Manageability Integration Kit is
the first and only Microsoft certified plug in for
SCCM
now in its second generation.
IMPROVE YOUR IMAGE
Build better software images in minutes with HP Image Assistant
New for 2018!
• Image Assistant now supports HP
Thunderbolt dock firmware
• Now with quick access to Product
Change Notifications and Customer
Advisories
R E F E R E N
C E
I M A G E T A R G E T
I M A G E
Image Assistant will report:
• Security issues
• Driver issues
• BIOS settings
Can install missing or outdated
components
Essential for Win 10 transition
An essential, free IT Admin tool to
develop, maintain, and support
software images for optimal Windows
performance.
- Compare HP factory image to corporate image to uncover
latest drivers, BIOS updates, updated components, and
more
2018
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Endpoint Security Controller
Key Additions and
Updates
HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
© Copyright Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
M U L T I - F A C T O R
A U T H E N T I C A T I O N
H A R D E N E D @ S I L I C O N
L E V E L
H a r d e n e d
M U L T I - F A C T O R A u t h e n t i c a t e 23
H P M U L T I
A U T H E N T I C A T E
Something
you know
Something
you have
Something
you are
Single-
factor
Two-factor
Multi-factor
NumberofFactors M u l t i - F a c t o r Au t h e n t i c a t i o n
m a k e s y o u r l o g i n
a m i l l i o n t i m e s
m o r e s e c u r e
P@$$W()
RD
PIN, biometrics, keys,
tokens and associated
certificates are
Captured, Encrypted,
Matched, and Stored in
the Hardware, out of
sight and reach from
typical attack methods.
SmartCar
d
P@$$W()
RD
SmartCar
d
Security Strength Posture
2018
21
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
HP Sure View Gen27
Built-in privacy screen
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Sure Click8
Browsing security solution
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
WORK FREELY IN PUBLIC SPACES
HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12
Now in it’s SECOND GENERATION, HP Sure View
Gen2 enables a better visual experience in light OR
dark environments – from the plane to the café
What’s New
• Performs great in BRIGHT and DARK environments
• IPS panel technology
• Improved 120Hz REFRESH RATE, for smooth motion
• Reduced display thickness - ULTRA-THIN DESIGNS
HP Sure View Gen27 protects
against visual hacking with the press
of a button.
2018
23
ABOVE
THE
OS
IN
THE OS
BELOW
THE OS
HP Sure Start Gen42
Self-healing BIOS with Runtime Intrusion
Detection
HP BIOSphere Gen410
Comprehensive BIOS management
HP Client Security Manager
Gen4
• HP Multi-Factor Authenticate
Gen25
MFA with hardened policies, 3-factor, face
log-in
• HP SpareKey
Self-service password recovery
• HP Device Access Manager
Just-in-Time access for ports and devices
Certified Self-Encrypting Drives
HW data encryption
HP Work Wise11
Proximity-based authentication
HP Secure Erase9
Permanent data removal on HDD/SSD
DATADEVICE IDENTITY
HP Sure Run3
Protection for critical applications
HP Sure Recover4
Automated network-based image recovery
HP Image Assistant Gen3
Image creation and testing
HP MIK Gen26
Centralized security management
HP Endpoint Security Controller
Key Additions and
Updates
HP Sure Click8
Browsing security solution
HP Sure View Gen27
Built-in privacy screen
© Copyright Hewlett-Packard Development Company
HP Sure Click – how it works
HP Sure
ClickEach web browser tab is
opened automatically in a
CPU-isolated Micro Virtual
Machine
Malware impacting one tab
has NO impact on any
other tab, app or the OS
Just close the tab & the
malware’s gone
tab2
tab3
Microvis
or
CPU VT
We
b
Pag
e
tab1
tab4
say web-borne
malware can be
undetectable3
81
%
OS
Apps
BIOS
Drivers
OS
Kernel
© Copyright Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
THE WORLD’S MOST SECURE AND MANAGEABLE PC
HP’s Security and Manageability Features Lenovo Dell Acer Apple HP
Below the OS Self-healing BIOS with Runtime Intrusion Detection (HP Sure Start Gen3) x x x x ✓
Common Criteria Certified TPM ✓ ✓ ✓ x ✓
Port and Device access control (HP Device Access Manager) x x x x ✓
Self-Encrypting Drives option ✓ ✓ x ✓ ✓
Secure Erase for both HDD and SDD (HP Secure Erase) ✓$ ✓$ x x ✓
In the OS One Step Logon from BIOS to Microsoft® Windows desktop x x x x ✓
Self-service password recovery for OS (HP SpareKey) x x x x ✓
Authentication with Hardened Biometrics (fingerprint) (HP Client Security Suite Gen3) ✓ ✓ ✓ ✓ ✓
Combination of factors for Authentication and Hardened Policies (HP Multi-Factor Authenticate) x x x x ✓
Secure Login to PC with smartphone based on proximity to PC (WorkWise) x x x x ✓
PC Tampering alerts sent to smartphone (WorkWise) x x x x ✓
Microsoft®
BitLockerDrive Encryption ✓ ✓ ✓ x ✓
Above the OS Integrated Privacy Screen (HP Sure View) x x x x ✓
Fleet management, including (HW, SW, BIOS), via Microsoft®
SCCM (HP Manageability Integration Kit) x x x x ✓
PC Image development and deployment through Microsoft®
SCCM plug-in (HP Manageability Integration Kit) ✓$ ✓$ x x ✓
PC Image comparison and recommendations (Image Assistant) x x x x ✓
THANK YOU!
HP ConfidentialHP Confidential

More Related Content

What's hot

z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
Luigi Perrone
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
Iftikhar Ali Iqbal
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
NCCOMMS
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
Nine23Ltd
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CanSecWest
 
Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoC
Wesley Li
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
Priyanka Aash
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
Sumit Tambe
 
CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application security
CanSecWest
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
Risman Hatibi
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013The Linux Foundation
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider Overview
MarketingArrowECS_CZ
 
Syncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security IntegrationSyncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security Integration
Precisely
 
Windows 10 deployment training for system builders
Windows 10 deployment training for system buildersWindows 10 deployment training for system builders
Windows 10 deployment training for system builders
northernlightz
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
TDSmaker
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
Iftikhar Ali Iqbal
 

What's hot (16)

z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
Symantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept DocumentSymantec Endpoint Encryption - Proof Of Concept Document
Symantec Endpoint Encryption - Proof Of Concept Document
 
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami LaihoCSF18 - The Night is Dark and Full of Hackers - Sami Laiho
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
 
Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoC
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application security
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
 
Denial of Service - Service Provider Overview
Denial of Service - Service Provider OverviewDenial of Service - Service Provider Overview
Denial of Service - Service Provider Overview
 
Syncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security IntegrationSyncsort’s Latest HA Innovations and Security Integration
Syncsort’s Latest HA Innovations and Security Integration
 
Windows 10 deployment training for system builders
Windows 10 deployment training for system buildersWindows 10 deployment training for system builders
Windows 10 deployment training for system builders
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
 
Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)Technology Overview - Symantec IT Management Suite (ITMS)
Technology Overview - Symantec IT Management Suite (ITMS)
 

Similar to Grant Thomas - Understanding Hardware Security Threats

Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7aesthetics00
 
A comparison of security features in Dell, HP, and Lenovo PC systems
A comparison of security features in Dell, HP, and Lenovo PC systemsA comparison of security features in Dell, HP, and Lenovo PC systems
A comparison of security features in Dell, HP, and Lenovo PC systems
Principled Technologies
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT ProfessionalsRishu Mehra
 
Sogeti Experience Windows 7
Sogeti Experience Windows 7Sogeti Experience Windows 7
Sogeti Experience Windows 7
mphacker
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
Jorge Orchilles
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgrade
Dana Popescu
 
View 4 Customer Presentation
View 4 Customer PresentationView 4 Customer Presentation
View 4 Customer Presentationepenedos
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
IT Masterclasses
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guide
Andrey Karpov
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
Keith Combs
 
HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's Guide
Andrey Karpov
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
JohnTileyITQ
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Qualcomm Developer Network
 
Canada Windows 7 Tour
Canada Windows 7 TourCanada Windows 7 Tour
Canada Windows 7 Tour
Stephen L Rose
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
NGINX, Inc.
 
Understanding PCoIP and Zero Clients
Understanding PCoIP and Zero ClientsUnderstanding PCoIP and Zero Clients
Understanding PCoIP and Zero ClientsJennifer Phillips
 

Similar to Grant Thomas - Understanding Hardware Security Threats (20)

Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7
 
A comparison of security features in Dell, HP, and Lenovo PC systems
A comparison of security features in Dell, HP, and Lenovo PC systemsA comparison of security features in Dell, HP, and Lenovo PC systems
A comparison of security features in Dell, HP, and Lenovo PC systems
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
 
Sogeti Experience Windows 7
Sogeti Experience Windows 7Sogeti Experience Windows 7
Sogeti Experience Windows 7
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
hardware and software upgrade
hardware and software upgradehardware and software upgrade
hardware and software upgrade
 
Windows 7
Windows 7Windows 7
Windows 7
 
View 4 Customer Presentation
View 4 Customer PresentationView 4 Customer Presentation
View 4 Customer Presentation
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guide
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's Guide
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
Canada Windows 7 Tour
Canada Windows 7 TourCanada Windows 7 Tour
Canada Windows 7 Tour
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
 
Understanding PCoIP and Zero Clients
Understanding PCoIP and Zero ClientsUnderstanding PCoIP and Zero Clients
Understanding PCoIP and Zero Clients
 

More from Pro Mrkt

NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
Pro Mrkt
 
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingDavid Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
Pro Mrkt
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Pro Mrkt
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Pro Mrkt
 
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksNicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Pro Mrkt
 
Dave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyDave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR Journey
Pro Mrkt
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Pro Mrkt
 
Matthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its Impacts
Pro Mrkt
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
Pro Mrkt
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
Pro Mrkt
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Pro Mrkt
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Pro Mrkt
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Pro Mrkt
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Pro Mrkt
 

More from Pro Mrkt (14)

NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
NHS Webinar: Our journey to treat patients virtually. Protect the NHS, Save L...
 
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be BreakingDavid Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
David Hall | The Accidental Criminal: Common Security Laws You Could be Breaking
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security DefenceAlex Michael | Empowering End Users: Your Frontline Cyber Security Defence
Alex Michael | Empowering End Users: Your Frontline Cyber Security Defence
 
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-AttacksNicola Whiting | How Diversity Can Help Fight Cyber-Attacks
Nicola Whiting | How Diversity Can Help Fight Cyber-Attacks
 
Dave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR JourneyDave Lovatt | Our GDPR Journey
Dave Lovatt | Our GDPR Journey
 
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust NothingMark Lomas | Zero-Trust Trust No One, Trust Nothing
Mark Lomas | Zero-Trust Trust No One, Trust Nothing
 
Matthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its Impacts
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18David Tweedale - The Evolving Threat Landscape #midscybersecurity18
David Tweedale - The Evolving Threat Landscape #midscybersecurity18
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
 
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile WorldAlex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
Alex Michael - 2017/2018 Cyber Threat Report in an Enterprise Mobile World
 
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
Mark Lomas - Taking a Holistic Approach to Cyber Threat Prevention #midscyber...
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Grant Thomas - Understanding Hardware Security Threats

  • 1. BE THE FUTURE. HP Endpoint Security Solutions Grant Thomas Growth Partner Sales Manager (UK&I)
  • 2. Agenda Introduction: HP Security – A track record in Endpoint Security 1) Device a. HP SureStart (Self Healing BIOS) b. HP SureRun c. HP SureRecover 2) Identity a. HP MIK b. HP Image Assistant c. HP Multi Factor Authentication 3) Data a. HP SureView b. HP SureClick
  • 3. EMEA PrintOn! 2017 First HP security: A track record in endpoint security 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 HP Sure Start self-healing BIOS (PC & Print) Firmware intrusion detection (PC & Print) Leadership with BIOS security standard since 2011 (NIST 800-147, ISO 19678) Cryptographically secure BIOS updates First Print security services Chair TCG Technical Committee Standard Designed and established TPM device security standards (ISO 11889) First to ship Certified TPM Standard First First Standard First
  • 4. 2018 4 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 5. HP HARDENS THE SYSTEM WITH HP ENDPOINT SECURITY CONTROLLER BELOW THE OS Firmware (BIOS, etc.) Hardware HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 Creating a Root of Trust: using the HP ESC, HP’s BIOS is trusted to be secure.
  • 6. TAKING PROTECTION TO A NEW LEVEL: OS HARDENING IN THE OS Operating System, Software, Downloads BELOW THE OS Firmware (BIOS, etc.) Hardware HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 STRENGTHEN THE OS HP Sure Run3, HP Sure Click8, HP Sure Recover4 In 2018, the HP Endpoint Security Controller will extend HARDWARE-ENFORCED protection into the OS – building a chain of trust.
  • 7. ENFORCING COMPLIANCE WITH MANAGEABILITY IN THE OS Operating System, Software, Downloads ABOVE THE OS Manageability BELOW THE OS Firmware (BIOS, etc.) Hardware ENFORCE COMPLIANCE HP Management Integration Toolkit6 HP Endpoint Security Controller TRUSTED BIOS HP Sure Start Gen42 STRENGTHEN THE OS HP Sure Run3, HP Sure Click8, HP Sure Recover4 HP MIK ensures the systems continues working as it should
  • 8. 2018 8 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 9. DEFEND AGAINST DEVASTATING FIRMWARE ATTACKS Protect your BIOS with HP Sure Start Gen4 2 HP Sure Start is the industry’s first and still the only self-healing BIOS. The BIOS is the first million lines of code that run. It is the key to your PC’s foundation. Why should customers care? Once the BIOS is corrupted, the hackers “own” your PC: all other protection is useless. Antivirus, anti-malware, and OS firewalls will not detect an infected BIOS!
  • 10. 2018 10 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 11. MALWARE TRIES TO ATTACK OS DEFENSES Software security processes help keep your PC safe: • Antivirus in Windows Security Center stays on the lookout to protect against known malware • Firewall helps protect against attacks coming through the network • Cryptographic services keep your secrets secured Malware often tries to take out these defenses Designed to be the Most Secure Windows Ever Windows 10 HP Products OS Processes 3rd Party Processes What makes sure these protections stay up and running?
  • 12. MAKE SURE ATTACKERS CAN’T TURN OFF YOUR ANTIVIRUS Protect critical security processes with HP Sure Run3 HP Sure Run extends the HP Endpoint Security Controller’s self-healing protection into the OS. It monitors key processes, alerts users and IT of any changes, and restarts them automatically if they’re stopped. Designed to be the Most Secure Windows Ever Windows 10 HP Products & Processes OS Processe s 3rd Party Processe s OS Processes 3rd Party Processes HP Sure Start HP Sure Run Secure the Processes that Secure your PC HP Endpoint Security Controller enables hardware-enforced application persistence
  • 13. 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 14. MINIMIZE DOWNTIME Recover quickly with HP Sure Recover4 14 HP Sure Recover offers secure, automated, network- based software image recovery. Using the HP Endpoint Security Controller, it can quickly and securely reimage machines to HP’s or the company’s latest software image - using only an internet connection !  Because HP Sure Recover4 is based in hardware, you can reimage a PC, even from a bare hard drive.
  • 15. REIMAGE ON DEMAND OR ON SCHEDULE RESILIENT BY DEFAULT FOR SMB. CUSTOMIZABLE FOR ENTERPRISE. User initiated IT scheduled ! FRESH START: IT can schedule routine reimaging, so malware doesn’t have a chance to stick around. • Ideal for Hospitality, Retail, Healthcare, Education, etc. ENABLING USERS to quickly reimage their own machines without IT support AUTOMATED RECOVERY: If no OS is found, the PC will automatically present the user the option to reimage FLEXIBLE: Defaults to latest HP image, or may be configured in firmware to recover custom enterprise image
  • 16. 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 17. ENSURE EVERY PC STAYS PROTECTED. Enforce your company’s security policies with HP Manageability Integration Kit Gen26 Set policies for HP Sure View7 and additional HP Software Manage new! HP Security features • HP Sure Run3 • HP Sure Recover4 Manage policies for 3 factors or VPN credentials in HP Multi-Factor Authenticate5 New UI makes it even easier for ITDMs to create and manage policies N O W Y O U C A N M A N A G E M O R E H P S E C U R I T Y, M O R E H P F E AT U R E S HP Manageability Integration Kit is the first and only Microsoft certified plug in for SCCM now in its second generation.
  • 18. IMPROVE YOUR IMAGE Build better software images in minutes with HP Image Assistant New for 2018! • Image Assistant now supports HP Thunderbolt dock firmware • Now with quick access to Product Change Notifications and Customer Advisories R E F E R E N C E I M A G E T A R G E T I M A G E Image Assistant will report: • Security issues • Driver issues • BIOS settings Can install missing or outdated components Essential for Win 10 transition An essential, free IT Admin tool to develop, maintain, and support software images for optimal Windows performance. - Compare HP factory image to corporate image to uncover latest drivers, BIOS updates, updated components, and more
  • 19. 2018 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Endpoint Security Controller Key Additions and Updates HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management
  • 20. © Copyright Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. M U L T I - F A C T O R A U T H E N T I C A T I O N H A R D E N E D @ S I L I C O N L E V E L H a r d e n e d M U L T I - F A C T O R A u t h e n t i c a t e 23 H P M U L T I A U T H E N T I C A T E Something you know Something you have Something you are Single- factor Two-factor Multi-factor NumberofFactors M u l t i - F a c t o r Au t h e n t i c a t i o n m a k e s y o u r l o g i n a m i l l i o n t i m e s m o r e s e c u r e P@$$W() RD PIN, biometrics, keys, tokens and associated certificates are Captured, Encrypted, Matched, and Stored in the Hardware, out of sight and reach from typical attack methods. SmartCar d P@$$W() RD SmartCar d Security Strength Posture
  • 21. 2018 21 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD HP Sure View Gen27 Built-in privacy screen DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Sure Click8 Browsing security solution HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates
  • 22. WORK FREELY IN PUBLIC SPACES HP Sure View Gen27: the world’s ONLY integrated PC privacy screen12 Now in it’s SECOND GENERATION, HP Sure View Gen2 enables a better visual experience in light OR dark environments – from the plane to the café What’s New • Performs great in BRIGHT and DARK environments • IPS panel technology • Improved 120Hz REFRESH RATE, for smooth motion • Reduced display thickness - ULTRA-THIN DESIGNS HP Sure View Gen27 protects against visual hacking with the press of a button.
  • 23. 2018 23 ABOVE THE OS IN THE OS BELOW THE OS HP Sure Start Gen42 Self-healing BIOS with Runtime Intrusion Detection HP BIOSphere Gen410 Comprehensive BIOS management HP Client Security Manager Gen4 • HP Multi-Factor Authenticate Gen25 MFA with hardened policies, 3-factor, face log-in • HP SpareKey Self-service password recovery • HP Device Access Manager Just-in-Time access for ports and devices Certified Self-Encrypting Drives HW data encryption HP Work Wise11 Proximity-based authentication HP Secure Erase9 Permanent data removal on HDD/SSD DATADEVICE IDENTITY HP Sure Run3 Protection for critical applications HP Sure Recover4 Automated network-based image recovery HP Image Assistant Gen3 Image creation and testing HP MIK Gen26 Centralized security management HP Endpoint Security Controller Key Additions and Updates HP Sure Click8 Browsing security solution HP Sure View Gen27 Built-in privacy screen
  • 24. © Copyright Hewlett-Packard Development Company HP Sure Click – how it works HP Sure ClickEach web browser tab is opened automatically in a CPU-isolated Micro Virtual Machine Malware impacting one tab has NO impact on any other tab, app or the OS Just close the tab & the malware’s gone tab2 tab3 Microvis or CPU VT We b Pag e tab1 tab4 say web-borne malware can be undetectable3 81 % OS Apps BIOS Drivers OS Kernel
  • 25. © Copyright Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. THE WORLD’S MOST SECURE AND MANAGEABLE PC HP’s Security and Manageability Features Lenovo Dell Acer Apple HP Below the OS Self-healing BIOS with Runtime Intrusion Detection (HP Sure Start Gen3) x x x x ✓ Common Criteria Certified TPM ✓ ✓ ✓ x ✓ Port and Device access control (HP Device Access Manager) x x x x ✓ Self-Encrypting Drives option ✓ ✓ x ✓ ✓ Secure Erase for both HDD and SDD (HP Secure Erase) ✓$ ✓$ x x ✓ In the OS One Step Logon from BIOS to Microsoft® Windows desktop x x x x ✓ Self-service password recovery for OS (HP SpareKey) x x x x ✓ Authentication with Hardened Biometrics (fingerprint) (HP Client Security Suite Gen3) ✓ ✓ ✓ ✓ ✓ Combination of factors for Authentication and Hardened Policies (HP Multi-Factor Authenticate) x x x x ✓ Secure Login to PC with smartphone based on proximity to PC (WorkWise) x x x x ✓ PC Tampering alerts sent to smartphone (WorkWise) x x x x ✓ Microsoft® BitLockerDrive Encryption ✓ ✓ ✓ x ✓ Above the OS Integrated Privacy Screen (HP Sure View) x x x x ✓ Fleet management, including (HW, SW, BIOS), via Microsoft® SCCM (HP Manageability Integration Kit) x x x x ✓ PC Image development and deployment through Microsoft® SCCM plug-in (HP Manageability Integration Kit) ✓$ ✓$ x x ✓ PC Image comparison and recommendations (Image Assistant) x x x x ✓

Editor's Notes

  1. But let me clarify one thing: HP is not new to this topic. When we look to the future, we draw from a deep history. In fact, we have been leading, inventing, reinventing endpoint security for the last 20 years. We have a history of actively working with the industry to develop security standards that create a safer and more trusted internet, and introducing industry firsts, raising the bar in PC and print security over the years, and continuing to do so today in our most recent product portfolio. For example, HP invented modern computer security architecture as you know it, working with leading industry partners like Microsoft or Intel. Almost a decade ago, we founded the Trusted Computing Group (which standardizes hw-based security for modern PCs: TPM, self-encrypting drives, …) where HP has always to this day held key leadership positions like the technical committee or the certification program chair. HP invests millions of dollars in research and development at HP Labs, devoting substantial resources to innovate on security and stay ahead of ever-more-sophisticated security threats for the new Blended Reality future. Some of our more recent firsts include: First Print Security Services in 2016 HP Sure Start Self-healing BIOS in PC & Print (2013 and 2015) Firmware Intrusion Detection built-in to our business printers and PCs
  2. This particular slide As you can see, this year the stack as expanded, highlighted by the