HP announced HP Continuous Monitoring, designed to identify and report IT security vulnerabilities in real time.
The solution provides U.S. government agencies with an accurate assessment of their IT security risk posture for improved security situational awareness and enhanced protection of the nation’s sensitive information.
To respond rapidly to changing political, economic and constituent needs, the government must balance service delivery and risk exposure. A key component of implementing an overall enterprise risk management strategy, HP Continuous Monitoring provides real-time threat monitoring, actionable intelligence and overarching security profile insight as well as risk assessments.
HP Continuous Monitoring actively identifies, quantifies and reports potential vulnerabilities, such as newly discovered hardware or software on the network. This service enables government agencies to gain instantaneous visibility into threats and trends. It also provides a proactive continuous evaluation of network security configurations and risks, rather than relying on a periodic snapshot of potential vulnerabilities.
Government agencies can also reduce costs by making informed risk management decisions and prioritizing investments or remediation efforts.
HP Continuous Monitoring offers an open architecture that enables clients to integrate their existing tool suites into the solution, protecting legacy investments and allowing the incorporation of a broad range of pre-existing vendor tools and technologies.
Protecting our nation’s data and network infrastructure is critically important to the country’s safety, ability to compete and economic posture,” said Betsy Hight, vice president, Cybersecurity Solutions Group, HP Enterprise Services, U.S. Public Sector. “Whereas traditional solutions only provide a snapshot of potential threats, HP Continuous Monitoring allows government agencies to see threats across the enterprise in real-time, enabling them to better understand risk exposure, make informed risk management decisions and respond to their vulnerabilities.”