Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE

Protecting Identities, Apps and Data with some Familiar Faces at RSA

Micro Focus Expert
Micro Focus Expert
0 0 3,046

Hard to believe 2019 is here. Data Privacy Day just happened, and now it is almost time for the RSA Security Conference in San Francisco. Being the world’s largest information security conference, I always blocked out every February for it. However last year it got moved to the month of April. This year it takes place in March, March 4-8, so maybe the conference is trying to make its way back home to February?

Regardless of the month the conference happens, it feels like every day there is a new headline for a data breach. In fact, 2019’s first data breach took less than 24 Hours. And most of these breaches are huge, not only in terms of the sensitive data stolen, but also in terms of financial loss, and loss of reputation. One needs to look no further than The 21 scariest data breaches of 2018.

This year’s RSA theme is ‘Better,’ as in working hard to find better solutions. The official website implores us to “make security a top priority,” something echoed by the Micro Focus Security Team.

Privacy and compliance requirements are through the roof, from the long-existing alphabet soup of laws such as PCI-DSS, HIPAA and GLBA to the recently implemented GDPR and the soon to be implemented CCPA (California Consumer Privacy Act). All 50 states now have data breach notification laws. To meet these company-wide security and compliance challenges, we want to show you at RSA how to take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data.

Take a holistic approach to security

Manage identities:
Identities have evolved beyond heartbeats to include devices, things, and services. Take an adaptive approach to managing them all. Learn who has access to what. Govern privileges, enforce access controls, and unify identity stores. Generate a single view of your identities. Do it all from a central location. 

Secure applications:
DevOps accelerates application delivery, but without a focus on security, DevOps also accelerates vulnerability delivery. Embed security best practices into DevOps processes. Build strong encryption and authentication into your apps, without delaying development. Leverage speed, integration, and automation to deliver secure, high-quality apps that close the vulnerability gap. 

Protect data:
Data is the lifeblood of your business. Protect it accordingly. Discover, classify, and govern sensitive data throughout its lifecycle. Set access and security controls to guard it—wherever it resides. And meet privacy, regulatory, and jurisdictional requirements. You’ll mitigate costly risks, fines, sanctions, litigation, and brand devaluation when you do.

Names that you can trust

RSA blog4.pngThis holistic approach to security is encompassed by our Security, Risk, & Governance portfolio. Lest you dismiss this as corporate marketing speak, let’s make sure you understand the names behind the Micro Focus technology. When you come to RSA Booth 4508 at the North Expo Hall, you will be able to see our full security portfolio on hand, made up of these familiar parts:

  • ArcSight can help you detect known and unknown threats through correlation, data ingestion and analytics for Intelligent Security Operations.
  • Fortify provides application security testing, secure development and continuous monitoring and protection of your entire software development lifecycle (SDLC).
  • NetIQ consistently enforces access rights across your business environment and takes an integrated approach to Identity and Access Management.
  • Voltage provides data-centric encryption, tokenization and key management for data de-identification and privacy.
  • ZENworks ensures all devices follow standards and compliance to secure the network and helps track, manage and protect endpoint devices.
  • Vertica provides big data analytics to securely store, explore, and analyze all data types at unlimited scale

Make a point to see us at RSA this year

Engage with the security team. See how we can help keep you and your company stay out of the headlines. Talk with our InfoSec experts at RSA Booth 4508. Show us that faded ArcSight t-shirt you wear under your dress shirt, or that old Fortify keychain from RSA ten years ago. Let’s chat about how you have seen security change over the years. Looking forward to a ‘Better’ RSA!

 

Don’t forget to follow Micro Focus Security on Twitter for more updates and keep tabs on the Conference with the Hashtag “#RSAC”.

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.