Endpoint Security - RFP Guide
Endpoint Security - RFP Guide
FOR ENDPOINT
SECURITY AGAINST
EVER-EVOLVING
CYBERTHREATS
Making the right decisions for IT security can safeguard your
devices, data and reputation. Discover how robust hardware
and services can keep your organization protected.
CO N T E N T S
01
Staying protected against cybercrime pg. 3
02
Changing work styles bring new security challenges pg. 5
03
Scanning the current cybersecurity landscape pg. 7
04
What threats should be on your radar? pg. 10
05
Starting at the endpoint pg. 13
06
Security requirements for your next RFP pg. 17
07
Asking the right questions to strengthen security pg. 20
PA G E 2
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
01 STAYING PROTECTED
AGAINST CYBERCRIME
The stakes are high. But there are ways to strengthen your defenses.
PA G E 3
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
Resilient hardware
Layers of protection
Proactive management
PA G E 4
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
02 CHANGING WORK
STYLES BRING NEW
SECURITY CHALLENGES
Our powerful digital environment means we’re better connected than ever. And
it’s made flexible working not only possible, but a popular option for teams
around the world. There’s a growing desire for flexibility in the workplace, and
while it can lift both productivity and employee wellbeing, it also brings new
locations, devices and networks into the environment. And working on unsecure
networks or endpoint devices leaves organizations vulnerable to attacks.
PA G E 5
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
Over half of global employees Management services can offer support when away from
work outside the office at least the office, equip users with secure, up to date devices and
2.5 days a week.1 offer remote data wipe.
Coffee shops and cafes are Self-healing hardware can detect and protect against
the second most popular place attacks that lurk on unsecure networks, containing the
to work.2 threat in real time to stop it from spreading. Plus, built-in
privacy screens can avoid visual hacking.
Only 40% of personal devices Security and threat analytics give visibility and insights to
used for work tasks are subject predict issues, and a managed service can monitor status
to security regulations.3 and analyse threats.
“People can work on the go – they work in coffee shops, hotels and planes. A
lot of people are connecting to random wireless networks, they have no idea of
credentials. And then they go back to the office, plug back into the environment and
that system has been compromised, thus putting the whole company at risk.”
Michael Calce, a.k.a. ‘MafiaBoy’, Chairman of HP’s Security Advisory Board
PA G E 6
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
The internet is fundamental to how we do business today. But as the internet and
digital world grows in complexity, so does cybercrime and its threat to security.
Threats are growing in number and intricacy, and are fast to infiltrate the wider
organization once they’ve made their way into a system.
Organizations have decisions to make and features to look out for when acquiring
new services and devices, to safeguard against the rising risks. By looking towards
hardware and services that can respond to threats quickly, users stay up and running,
and organizations stay productive and avoid the long-term financial consequences
that come with cybercrime.
PA G E 7
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
FACEBOOK
In April 2019, Facebook was once
again under scrutiny as millions of
user records had been exposed. The
popular social networking site allowed
two apps access to the personal
information of its users – and the data
had been stored on insecure servers. A
total of 540 million records, including
Facebook IDs, comments and likes,
could be found.5
PA G E 8
HOW TO PLAN FOR ENDPOINT SECURIT Y AGAINST
E V E R - E V O LV I N G C Y B E R T H R E AT S
US CITIES OF BALTIMORE
AND GREENVILLE
According to Verizon’s 2019 data breach
investigation, 16% of breaches involved
public sector entities – the highest
percentage of sectors investigated.7
In May 2019, a ransomware attack hit
“The reality is we’re getting to a Baltimore, Maryland, infecting around
point where most cities are facing 10,000 government devices with
a new strain of ransomware called
a million of these attacks every RobbinHood,8 which blocked essential
week – this is now what local city services such as the payment of
municipalities are up against.9” water bills and property taxes. Hackers
initially demanded the city pay 13
Nicole Perlroth, cybersecurity reporter, New York Times
bitcoins, approximately $100,000, to
restore access to the systems. The city
didn’t pay the ransom, and the resulting
costs reached millions of dollars.
PA G E 9
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
PA G E 1 0
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
Firmware attacks
Firmware security, particularly in the BIOS, Self-healing BIOS protection can detect threats
can be vulnerable to malware and exploited and automatically recover the BIOS from attacks
by hackers. or corruption, without intervention from IT.
PA G E 1 1
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
Ransomware
The second most common type of malware Hardware-enforced protection can help
incident7 – up 15% in the first half of 20193 – protect PCs from ransomware and facilitate
ransomware is designed to lock, encrypt and fast recovery to minimize impact and reduce
deny access to data until a ransom is paid. downtime.
Cryptojacking
A form of cyberattack where a hacker Management services can ensure you’re
hijacks a target’s processing power to equipped with the latest devices, up to date
mine cryptocurrency. Cryptomining software and sophisticated protection.
malware soared by 4000% in 2018, McAfee
found11 and can be costly in electricity, Want to know more about cryptojacking? View
network performance and vulnerability to our Cryptojacking Guide to discover how to keep
other attacks. jackers at bay.
PA G E 1 2
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
05 STARTING AT
THE ENDPOINT
Endpoints are a target for cyberattacks, and it’s with growing frequency that
breaches are traced back to starting at the endpoint.12 From the decentralization
of the workplace – where devices can be difficult to keep track of – to the
pressure from attacks that antivirus miss, a lack of endpoint security can mean
huge disruption to an organization, to productivity and to the bottom line.
64%
of organizations reported a major breach
that started at the endpoint.12
PA G E 1 3
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
Zero-day attacks are four times more likely Managed security services can protect against
to compromise organizations.12 zero-day attacks through real-time threat
protection and analytics services.
57% of successful attacks are missed by Going beyond traditional antivirus protection
traditional antivirus.12 with deep-learning-based artificial intelligence
can further protect devices.
Over half of breaches take months or longer Services that give a full overview of device
to discover.7 health and insights reporting can help
organizations uncover issues and protect
devices.
The frequency of new or unknown zero-day With new types of malware appearing every
attacks has increased from 24% to 37% in day, deep learning AI can protect against never
2018.12 before seen attacks, before they happen.
48% of malicious email attachments are Real-time threat isolation technology traps
Office files.13 malware from email attachments and file
download attacks, preventing them from
impacting the device and network.
PA G E 1 4
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
PA G E 1 5
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
When human error brings vulnerability, decision makers need to explore new
ways to protect the rest of the network. And although internal training and
policies can work to cut down susceptibility, introducing security-enforced
hardware, threat protection solutions and managed services can bolster
defenses and fill in the security gaps.
Level of impact16
PA G E 1 6
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
06 SECURITY REQUIREMENTS
FOR YOUR NEXT RFP
The forecast for today’s threats, vulnerabilities and risks may seem cloudy,
but asking the right questions can equip your organization with the right
protection. Your hardware and service requirements should reflect
the changing face of cybersecurity and support your IT department in
addressing the current and future risks – so prioritizing security features
when acquiring new resources is a must. Think resilient hardware, layers
of protection and proactive management.
PA G E 1 7
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
1 HARDWARE
Don’t allow malware or ransomware to take down your
fleet and stall important projects. Choose hardware that’s
designed to detect and recover from attacks, keeps you
alerted to changes and limits the spread of breaches, so if
an attack gets in your users can be back to business quickly.
2 THREAT PROTECTION
When one in ten URLs leads to malware,13 your organization
needs to keep endpoints protected against malicious
websites and attachments. Look for resilient hardware
features that can recognize new risks and secure your
systems, in real time, against the advanced malware that
employees and traditional antivirus can miss.
PA G E 1 8
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
4 MANAGED SERVICES
IT security teams are faced with a complex, busy workload
and little time for other priorities. Work with a provider that
offers managed services to keep an eye on device health.
5 DEVICE REFRESH
Today’s landscape means the security goalposts frequently
change. Organizations need to ensure their device refresh
cadence allows for new technology with up to date security
features to face the evolving cyberthreats.
PA G E 1 9
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
07 ASKING THE
RIGHT QUESTIONS TO
STRENGTHEN SECURITY
PA G E 2 0
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
To help precisely identify your security expectations, delve deeper into the important hardware and
services areas, and direct any questions you have to all potential providers. This will help you ensure it’s a
partner you want to work with and will be able to sufficiently protect your organization. Use the following
ten questions to explore your requirements, and inspire new queries and considerations.
PA G E 2 1
H O W T O P L A N F O R E N D P O I N T S E C U R I T Y A G A I N S T E V E R - E V O LV I N G C Y B E R T H R E AT S
Although attacks are growing with frequency and sophistication, there are
opportunities for organizations to challenge the threats with strong security.
With HP, you can explore a whole range of hardware features and services to
meet your organization’s needs. By working with HP Elite PCs, you have the
world’s most secure PCs.27 And with HP Services, you get proactive protection,
for your organization and your IT hero reputation.
HP Security solutions can secure your devices, data, and identity, and
protect your business against ever-evolving cyberthreats.
Discover how
PA G E 2 2
HOW TO PLAN FOR ENDPOINT SECURIT Y AGAINST
E V E R - E V O LV I N G C Y B E R T H R E AT S
© Copyright 2019 HP Development Company, L.P. The information contained herein is subject to change without notice.