HP ProLiant 2500 Compaq Enterprise Security Framework

HP ProLiant 2500 Manual

HP ProLiant 2500 manual content summary:

  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 1
    balanced hardware/software solution, and interoperablity with current security at multiple platform levels to clarify security solutions. Through use of The Compaq Enterprise Security Framework, you can develop solutions that do not compromise performance yet are still pragmatic and easy to use. In
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 2
    quality or correctness, nor does it ensure compliance with any federal, state or local requirements. Compaq does not warrant products other than its own strictly as stated in Compaq product warranties. Product names mentioned herein may be trademarks and/or registered trademarks of their respective
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 3
    variety of threats computer users and administrators must defend $100 million. While most security problems remain basic, such as viruses must design a practical roadmap to guide their enterprises through this tangle meets their business requirements. Compaq's Enterprise Security Framework delivers
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 4
    information, applications, and hardware assets in the hands of numerous people. • The next trend is the importance of networked (client/server) computing, primarily in enterprises and small businesses. As this type of computing has become the dominant architecture, more people have networked
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 5
    must contend (see Figure 2). - Security Threats - DB Mainframe WebServer Internet Corporate Network Intranet/ Externet Users Application Server Firewall Modem Bank Corporate User Figure 2 Mobile User • Saboteurs and thieves (either internal or external) can access, steal, and change the
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 6
    attacks which crash strategic company systems such as call centers, web servers, etc.), and secondly if a competitor accesses or copies private under-price their product in the market). By the same token, crashing a rival's critical systems can hurt their reputation for customer service or on
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 7
    the web Partner Efficiencies n Opportunity to share supply chain data n Opportunity to implement affordable EDI also lose their competitive position when product plans or designs are stolen or pricing strategies are spread to a competitor. • Additionally, there is the reduced confidence
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 8
    store/web site for customers to purchase specific food bundles that could be packaged and delivered and suppliers reduce their customer service costs. Security Environment: Current applications on these devices are far more valuable. The problem is widespread. As mentioned earlier, over 75% of
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 9
    WHITE PAPER (cont.) ... nature of some attacks, and because digital material can be copied without any evidence of access or theft. In addition, most computer crimes and security incidents go unreported because businesses are unwilling to reveal the weaknesses of their computer systems to outsiders
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 10
    types of resources the solution is attempting to protect (those serving single users on the device, those serving groups of internal network users, or those serving users across the Externet). Using these terms, Compaq's enterprise customers can better understand the market for security products and
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 11
    and complexity of solutions available in the security market. Products/ Technologies Hardware Software Services n Component locks/monitors n BIOS level firmware Ÿ Authentication Ÿ Anti-virus n Encryption chips n Hardware tokens n Network encryption/authentication n Firewalls n Anti-virus
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 12
    device or as a tool that signs a digital certificate that identifies a user across an external network. Enterprises can use these terms to understand and - Security Objectives Desktop/Server/Laptop Hardware Encryption Software Secure OS, Environments VPN Services Systems Consulting, Security
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 13
    market trends on their purchasing decisions. Compaq has identified four key computing security platforms, building their installed base by educating users about firewalls, and finding VAR or OEM Privacy Integrity Firewall Base Firewall Web filter Support for VPN, secure remote access APIs for
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 14
    In addition, by reliably identifying users locally, it becomes easier for the network servers to authorize users to access a variety of information and application resources. There is a much broader and more powerful variety of mechanisms available to identify users. These mechanisms might serve as
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 15
    and technology is still developing. Certificate server products are still in development and Certificate Authority services are in their infancy. For example, -based security architecture. For example, a server or PC can require that a user submit his/her fingerprint description, which will
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 16
    using SET will require multiple public-key encryption operations per transaction, potentially slowing existing servers to a crawl. Specialized hardware will be necessary to alleviate this problem. In addition, smartcards and tokens can provide robust, high-performance encryption solutions on the
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 17
    Intel Concord Eracom Atalla Corporation (Tandem) Authentication Servers Security Dynamics Enigma Logic Leemah Datacom Encryption RSA Services Cross-vendor usage, ease of use, interoperability, and practical applicability remain crucial issues. Firewalls provide some examples of the problems
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 18
    Compaq has developed the Enterprise Security Framework. Using this framework, Compaq extends from the local client/server platform to external network (e.g., impersonation, denial of service, theft) and the security provides security in a way that users and administrators will actually use, as
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 19
    those with some level of computing power/expertise: • Attacker with sophisticated limited maintenance time required. Solution performs transparently to user. Ease of Use/Integration Offers a solution which services. Table 4 details at what platforms and levels specific solutions operate: 19
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 20
    (cont.) ... TABLE 4: PLATFORM AND LEVEL-SPECIFIC SOLUTIONS Level A Level B Level C Client/Server Device • Local information privacy- • Robust privacy • Basic ACLs, embedded in robust security services of security services with centralized management network operating system • Centralized
  • HP ProLiant 2500 | Compaq Enterprise Security Framework - Page 21
    performance and attune technical information to our customers. • Supply our customers with capacity planning information. • Explore the opportunity for Compaq to build hardware and software security solutions that address both specific and generic enterprise security requirements. By using the
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21

W
HITE
P
APER
248A/0897ECG
1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
August 1997
Prepared By
Internet Solutions
Business Unit
Compaq Computer
Corporation
C
ONTENTS
Introduction
................
3
Security
Environment
................
4
Security Environment:
Importance and Trends
.....
4
Security Environment:
Threats and Pressures
......
5
Security Environment:
Enterprise Opportunities/
Risks
................................
7
Security Environment:
Current Situation
..............
8
Understanding
Security
.....................
10
Security Market
.........
13
Security Market: Firewall
Expansion
......................
13
Security Market:
Identification and
Authentication
Importance
.....................
14
Security Market:
Balanced Hardware/
Software Solutions
..........
15
Security Market:
Proliferation/Limitation of
Security Offerings
...........
16
Enterprise Security
Framework
................
18
Conclusion
................
21
Compaq Enterprise Security
Framework
In the highly competitive world of enterprise computing, security has become an intricate
and critical element. The Compaq Enterprise Security Framework incorporates the latest
technology, a balanced hardware/software solution, and interoperablity with current
security at multiple platform levels to clarify security solutions. Through use of The
Compaq Enterprise Security Framework, you can develop solutions that do not
compromise performance yet are still pragmatic and easy to use. In so doing, you can
help to determine a practical roadmap for the deployment of enterprise security.