ARUBA JZ240AAE User Guide

CYBER SECURITY BEST PRACTICES TO PROTECT YOUR MUNICIPALITY
Defend against ever-evolving ransomware and other emerging threats
Six steps to a comprehensive security strategy:
1. Assess
3. Protect
4. Detect
5. Recover
6. Retire
Solution brief
>60%
of all ransomware attacks in 2019 were targeted at state and local government agencies.
1
statescoop.com/report-70-percent-of­ransomware-attacks-in-2019-hit-state-and­local-governments/.
1
Protecting government agencies and the people they serve requires more than just a patchwork of security solutions.
Today, safeguarding confidential personal and financial information requires agencies to have comprehensive and proactive security. Here’s why:
• Agencies are increasingly interconnected, with computer technology woven throughout all facets of government—with just about everyone and every thing sharing data.
• Public servants and citizens need reliable and prompt access to government networks on­premises and through online portals.
• Criminals targeting government agencies are increasing the sophistication of their attacks while phishing, ransomware, distributed denial-of-service (DDoS) attacks, and more are becoming commonplace.
What agencies need is an end-to-end cyber security solution, one that encompasses everything from planning through deployment to end of life with single-pane-of-glass management.
SECURITY BEST PRACTICES
HPE follows a holistic security strategy to protect your organization’s infrastructure from “cradle to grave.” From the hardware supply chain to your device’s end of life, HPE provides comprehensive security to detect and prevent unauthorized access as well as rapid recovery from disasters. To do all of this, we focus on six key steps throughout the life cycle of your infrastructure:
1. Assess: Before building any cyber security solution, you will need a plan. HPE can help you determine exactly what solution your agency needs to meet your specific security challenges. Our HPE Pointnext Services experts can provide insights and tangible action plans to mitigate risks to your assets and applications.
We follow ISO/IEC 270022013 guidelines to choose the right solutions for your particular needs and threat environment.
2. Build: Today’s threats are constantly evolving to infiltrate your network. With HPE, you can protect your infrastructure through a secure root of trust, available in all HPE Gen10
Solution brief
Assess
1
AN ENDTOEND SECURITY APPROACH
• Insights and tangible action plans to mitigate risks to your assets and applications
Security controls assessment based on ISO/IEC 27002:2013
Build DetectProtect Recover Retire
2 3 4 5
Secure Silicon to
Supply Chain
Access Control and
Attack Detection
Identify Potential
User and Behavioral
Risks (UEBA)
Silicon root of trust in
all Gen10 servers
Secure encryption
DFARS-compliant
supply chain
Looking for an as-a-service oering?
Consider HPE GreenLake consumption solutions for all phases of the security life cycle. Experience the agility and economics of public cloud with the security and performance of on-premises IT.
2
“HPE Get 6-Nines Guarantee, HPE Nimble Storage,” September 2017.
Make the right purchase decision .
Contact our presales specialists.
Chat
Email
Call
Get updates
Policy-based network access control
Military-grade encryption for data storage
Detection of compromise
Full recovery capability
servers. While we carefully choose our partners and suppliers, our encrypted root of trust adds an additional layer of protection by cryptographically validating the integrity of HPE’s DFARS-compliant supply chain from silicon to your data center.
3. Protect: Access control and threat detection protect your HPE infrastructure with policy-based network-access control, military-grade encryption for data storage, intrusion detection, and full recovery capabilities. With Aruba ClearPass, you can easily take charge of your network, prevent unauthorized access to sensitive information, and further harden your network against cyberattacks.
4. Detect: HPE takes a proactive approach to monitoring. With user and entity behavior analytics (UEBA), our infrastructure uses AI and machine learning to detect threats and flag any suspicious activity.
HPE Integrated Lights-Out (iLO) can help you configure, monitor, and update your HPE servers seamlessly, and HPE iLO Advanced gives even more cyber security control with runtime firmware validation. With HPE InfoSight, you have full visibility in a single pane of glass.
5. Recover: Get your services back online quickly. HPE leverages on-premises and cloud-based solutions to provide backup and rapid recovery from cyberattacks. HPE Nimble Storage, for example, leverages flash storage and predictive analytics to eliminate the gap and guarantee 999999% availability, delivering the best all-
AI and machine learning
to detect threats
Dashboards and
proactive monitoring and alerts
6
Backup and Restore End of Life
On-premises and cloud-
based solutions
Rapid recovery from
cyberattacks to resume operations
flash capacity per terabyte in the industry—and future-proofing design for value today and in the future.2
6. Retire: When the time comes to retire your hardware, HPE can help you safely decommission or redeploy your IT assets. HPE iLO Advanced can securely erase user data, ensuring that your servers are wiped clean before end of life.
Crypto-erase data to
safely allow your organization to decommission or redeploy IT assets
WHY HPE
Our holistic approach to cyber security protects your organization throughout your infrastructure’s life cycle. But don’t take our word for it. Marsh, a global leader in cyber insurance, has worked with other leading insurance companies to create the Cyber CatalystSM program to establish a baseline for cyber security solutions and recognize those that are compliant. Both HPE’s exclusive root of trust and Aruba ClearPass are certified under the Cyber Catalyst program for their ability to reduce risk.
GET STARTED
Cyber security is a critical issue for municipalities today, but HPE can help you navigate the risks. Let us protect your agency—and more importantly your citizens—with the holistic security needed to address threats both today and tomorrow.
LEARN MORE AT
hpe.com/security
© Copyright 2020 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
a00097864enw, April 2020
Loading...