Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE

Identities, apps and data – do we need another point solution to solve all our security problems?

Micro Focus Frequent Contributor
Micro Focus Frequent Contributor
0 0 1,558

For many annual attendees at the RSA Security Conference, there’s a familiar routine each time with the all-important question being asked early, “what’s this year’s theme—what’s new, what’s hot?”

Identities.pngJust like Chinese New Year highlights a different zodiac animal every year, this yearly showcase typically highlights the latest new security technology or advance that promises to solve the most critical existential threat currently bringing your security team to its knees. Will it be a solution to finally solve ransomware? Or perhaps we discovered our identities needed federation all along? Or maybe this is the year firewalls finally became the sentient beings we always knew they were capable of achieving! Bravo, firewalls.

Alas, there is no magic silver bullet, because security threats as always come in all shapes and sizes, and often where we least suspect. Sadly, it’s not the destination, so might as well enjoy the journey. Get your house in order, reduce attack surfaces, take care of the critical stuff, right. Perhaps it just may be the year of the sentient firewall, but the reality is likely more mundane. You need to protect against increasingly widespread vulnerabilities to your enterprise, coming at you faster, harder and from all sides—and that means having a coordinated strategy across what matters most. Identities, apps and data. But in the sea of RSA vendors offering the latest and the greatest shiny new object, where to start?

While we may not be able to solve all of your problems, Micro Focus will be presenting its vast security, risk, and governance portfolio this year less as a patchwork of market-leading brands (of which there are many—ArcSight, Voltage, Fortify and NetIQ, anyone?), but instead as a set of solutions tailored to address your end-to-end journey for protecting against data breaches, achieving compliance with privacy mandates, hardening your applications, governing data and identities, and so forth with a completeness of vision that arguably few other security vendors can offer. So while best of breed point solutions are a critical piece of the puzzle, the maturity of your organization demands an approach that grows and scales with your thriving business. 

So your problem is privacy compliance and your weakness is at the endpoint? Ah yes, let’s show you how you how our market-leading solution from ZENworks can cover your new IoT application, but as data is ingested from the endpoint into your data lake, we can also help address data mobility with Voltage format-preserving encryption. But wait—your concern is breach defense but you don’t have the visibility you need to get started? Ah yes, let’s demonstrate how ArcSight delivers the insights you need at the massive scale required, underpinned by another Micro Focus solution—Vertica—which is driving innovation for predictive analytics! But from that position of having greater insights, our data discovery and classification governance solutions can help you narrow down where the risk is greatest, perhaps helping fix an identity governance or application hardening problem. Your organization is not one size fits all and neither is our approach.

So while there are no silver bullets, you might be surprised how far you can get when products and technologies that address identities, applications and data are combined to solve modern threats when coordinated around the real-world problems that face your organization today. Come join us at RSA booth 4508, North Hall to have a conversation, we look forward to meeting you!

Don’t forget to follow Micro Focus Security on Twitter for more updates and keep tabs on the Conference with the Hashtag “#RSAC”.

About the Author
Data Security (Voltage) and SOC (ArcSight) Solutions. Encryption and key management, data privacy, security operations and general security topics.
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.