A Comprehensive Security Strategy Bringing Together
Best of Breed Vendor Partners
Having a comprehensive cyber protection strategy is undisputedly the most critical element in an IT environment. No matter how advanced your technology stack may be, and no matter how well it supports your organization now and into the future, it is a house of cards without the strongest, most up-to-date security strategy on the market.
That is precisely why CPP Associates provides a broad range of security, data protection, and back-up/recovery services, including:
- Insight and guidance into the current environment via assessments Identify weak points and provide actionable remediation options based on vertical (i.e., SOX, HIPAA, PCI, State and Local regulations/requirements)
- Design and Implementation of new solutions to fit into any environment (regardless of current vendors)
- IT Managed Services Options for environments that may not have a dedicated security team or SME on staff
- Technology Refreshes within the existing environments to remove aging insecure infrastructure
Through our carefully vetted list of “best of breed” vendor partners, CPP has constructed a Zero Trust Security Fabric (ZTSF) which can be adapted to organizations of all sizes and across all industries.
CPP’s Zero Trust Security Fabric (ZTSF) from the Core, to the Edge, to the Cloud
ZTSF follows a “least privilege” model of access using proven solutions to protect an environment from bad actors. We strive to leverage industry leading analytics, detection, and control solutions that go beyond traditional signatures. Providing future-ready, visionary products enables us to help protect environments on multiple fronts. This approach allows us to extend the borders of infrastructure to anywhere and still be protected.
How does ZTSF work?
CPP’s ZTSF offering protects customer environments by implementing leading products within these core areas:
Network Infrastructure and Edge
With the traditional perimeter giving way to the “edge,” safeguarding every possible entry point into the network has become increasing challenging. Aruba, a Hewlett Packard Enterprise company, has heeded the call and created a market-leading portfolio of Aruba Wireless Networking and Switching, Cloud Management, Remote Access Points (RAP’s), and the Aruba Edge Services Platform (ESP). To complete the solution, CPP also incorporates Citrix NetScaler, Palo Alto and Fortinet Solutions into its ZTSF Framework.
Server Hardware Security
HPE Silicon Root of Trust integrates security directly into the hardware level of HPE servers–specifically, the embedded lights-out (iLO) chip that makes secure out-of-band management of HPE servers (e.g., remote controlling and monitoring) possible. Because this design effectively creates an immutable fingerprint in the silicon, security mechanisms based on Silicon Root of Trust offer unprecedented levels of protection against new firmware attacks and previously undetected firmware compromises.
HPE Silicon Root of Trust now serves as a secure foundation for all HPE Gen10 servers, including the ProLiant, Apollo, Synergy and EdgeLine 8000 series, as well as HPE’s line of hyper-converged systems.
Advanced Endpoint Protection
CPP turns to the following solutions for advanced endpoint protection:
- VMware Carbon Black Suite
- Sophos Antivirus and Mobile Device Encryption
Backup and Disaster Recovery
The reality is that for the vast majority of companies, it’s not a matter of “if” they might get breached, it’s “when.” No matter how tight an organization’s security posture may be, it can take one click by an employee on a malicious email to launch a full-scale cyberattack.
That is why an essential element of any cyber protection strategy must include Back-up and Disaster Recovery (BU/DR). A sound BU/DR plan will ensure that when a breach occurs, your company will be in a position to quickly and efficiently restore your operations without any major impact on the bottom line.
BU/DR plans differ from company to company based on their unique service level requirements, and industry regulatory compliance, among other variables. CPP has strong relationships with both Veeam and Zerto, a Hewlett Packard Enterprise company (in conjunction with iland’s Enterprise Cloud Services) to provide enterprise level back-up and disaster recovery services. In addition, Hewlett Packard Enterprise has a suite of cybersecurity solutions designed for companies who are comfortable architecting a complete solution on their own.
Customer Case Study:
A major client working within the travel and leisure industry was unable to meet the compliance requirements of a security audit of their data protection measures, CPP was brought on board to provide a complete security audit and recommend a course of action which included HPE’s Secure Root of Trust, HPE InfoSight, and Zerto Disaster Recovery as a Service (DRaaS).
TSM Reporting Tool:
TSM is a powerful, flexible and feature-rich backup/recovery platform. However, these traits also make TSM complicated to tune, size, and report on. CPP’s TSM Reporting Tool (TRT) helps improve and simplify the administration and reporting of your TSM backup environment- without requiring additional employee training or resources.