Compaq ProLiant 7000 Compaq Enterprise Security Framework

Compaq ProLiant 7000 Manual

Compaq ProLiant 7000 manual content summary:

  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 1
    balanced hardware/software solution, and interoperablity with current security at multiple platform levels to clarify security solutions. Through use of The Compaq Enterprise Security Framework, you can develop solutions that do not compromise performance yet are still pragmatic and easy to use. In
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 2
    quality or correctness, nor does it ensure compliance with any federal, state or local requirements. Compaq does not warrant products other than its own strictly as stated in Compaq product warranties. Product names mentioned herein may be trademarks and/or registered trademarks of their respective
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 3
    array of technologies and solutions, including encryption, firewalls, smartcards, and digital certificates, which are offered to solve these problems design a practical roadmap to guide their enterprises through this tangle their business requirements. Compaq's Enterprise Security Framework delivers
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 4
    information, applications, and hardware assets in the hands of numerous people. • The next trend is the importance of networked (client/server) computing, primarily in enterprises and small businesses. As this type of computing has become the dominant architecture, more people have networked
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 5
    IT managers must contend (see Figure 2). - Security Threats - DB Mainframe WebServer Internet Corporate Network Intranet/ Externet Users Application Server Firewall Modem Bank Corporate User Figure 2 Mobile User • Saboteurs and thieves (either internal or external) can access, steal, and
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 6
    attacks which crash strategic company systems such as call centers, web servers, etc.), and secondly if a competitor accesses or copies private under-price their product in the market). By the same token, crashing a rival's critical systems can hurt their reputation for customer service or on
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 7
    n Opportunity to share supply chain data n Opportunity to competitive position when product plans or designs are stolen or pricing strategies are spread to a competitor. • Additionally, there in the areas of operational downtime and repair or recovery. The final area of potential loss is the actual
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 8
    /web site for customers to purchase specific food bundles that could be packaged and parts databases and allowing them to order parts directly, manufacturers and suppliers reduce their customer service on these devices are far more valuable. The problem is widespread. As mentioned earlier, over 75%
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 9
    WHITE PAPER (cont.) ... nature of some attacks, and because digital material can be copied without any evidence of access or theft. In addition, most computer crimes and security incidents go unreported because businesses are unwilling to reveal the weaknesses of their computer systems to outsiders
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 10
    single users on the device, those serving groups of internal network users, or those serving users across the Externet). Using these terms, Compaq's enterprise customers can better understand the market for security products and easily map out the solutions they require. Defining the objectives of
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 11
    Technologies Hardware Software Services n Component locks/monitors n BIOS level firmware Ÿ servers, single-sign-on solutions, and middleware. In addition, many of the recent innovations in cryptography have been focused on the software category. Security services form an essential part
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 12
    these classifications is shown in Figure 8. - Security Market Segments - Security Objectives Desktop/Server/Laptop Hardware Encryption Software Secure OS, Environments VPN Services Systems Consulting, Security Audit and Testing Identification & Authentication Authorization/ Access Control Privacy
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 13
    implications of critical market trends on their purchasing decisions. Compaq has identified four key computing security trends that have important Authorization/ Access Control Privacy Integrity Firewall Base Firewall Web filter Support for VPN, secure remote access APIs for new applications
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 14
    CheckPoint, whose OPSEC architecture supports major existing standards such as IPSEC, LDAP, etc., and offers API support for multiple solutions such as network servers to authorize users to access a variety of information and application resources. There is a much broader and more powerful variety
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 15
    technology is still developing. Certificate server products are still in development and Certificate Authority services are in their infancy. For Individually, neither provides an adequate solution. A number of issues are driving the emphasis on software in security. Each of these factors increases
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 16
    are easier/less costly to update n Software products can servers to a crawl. Specialized hardware will be necessary to alleviate this problem of security offerings from a diverse array of companies. While these solutions aim , they have, for the most part, lacked a practical orientation. Additionally,
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 17
    Intel Concord Eracom Atalla Corporation (Tandem) Authentication Servers Security Dynamics Enigma Logic Leemah Datacom Encryption RSA Services Cross-vendor usage, ease of use, interoperability, and practical applicability remain crucial issues. Firewalls provide some examples of the problems
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 18
    , Compaq has developed the Enterprise Security Framework. Using this framework, Compaq's enterprise solution that extends from the local client/server platform to external network interactions. A protects against (e.g., impersonation, denial of service, theft) and the security objectives served
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 19
    those with some level of computing power/expertise: • Attacker with sophisticated hacking operations. Solution is available 24x7 with limited maintenance time required. Solution performs transparently to user. services. Table 4 details at what platforms and levels specific solutions operate: 19
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 20
    PAPER (cont.) ... TABLE 4: PLATFORM AND LEVEL-SPECIFIC SOLUTIONS Level A Level B Level C Client/Server Device • Local information privacy- • Robust privacy using basic encryption (selective strong encryption (long key, file, drive). dedicated encryption engine) • Strongest identification
  • Compaq ProLiant 7000 | Compaq Enterprise Security Framework - Page 21
    performance and attune technical information to our customers. • Supply our customers with capacity planning information. • Explore the opportunity for Compaq to build hardware and software security solutions that address both specific and generic enterprise security requirements. By using the
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21

W
HITE
P
APER
248A/0897ECG
1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
August 1997
Prepared By
Internet Solutions
Business Unit
Compaq Computer
Corporation
C
ONTENTS
Introduction
................
3
Security
Environment
................
4
Security Environment:
Importance and Trends
.....
4
Security Environment:
Threats and Pressures
......
5
Security Environment:
Enterprise Opportunities/
Risks
................................
7
Security Environment:
Current Situation
..............
8
Understanding
Security
.....................
10
Security Market
.........
13
Security Market: Firewall
Expansion
......................
13
Security Market:
Identification and
Authentication
Importance
.....................
14
Security Market:
Balanced Hardware/
Software Solutions
..........
15
Security Market:
Proliferation/Limitation of
Security Offerings
...........
16
Enterprise Security
Framework
................
18
Conclusion
................
21
Compaq Enterprise Security
Framework
In the highly competitive world of enterprise computing, security has become an intricate
and critical element. The Compaq Enterprise Security Framework incorporates the latest
technology, a balanced hardware/software solution, and interoperablity with current
security at multiple platform levels to clarify security solutions. Through use of The
Compaq Enterprise Security Framework, you can develop solutions that do not
compromise performance yet are still pragmatic and easy to use. In so doing, you can
help to determine a practical roadmap for the deployment of enterprise security.