Discover Performance Blog
Welcome to the Discover Performance blog, a resource for enterprise IT leaders who share a passion for performing better. Here you’ll find strategic insights and best practices from your peers as well as from HP’s own practitioners who help others define, measure and achieve better IT performances.

Use the IT Value Chain to embed security in every aspect of IT

michael-garrett2.jpgIn the New Style of IT, security isn’t something you do on the side. It has to be embedded in every aspect of IT.

 

The New Style of IT—the interrelated trends of cloud, mobile, security, and Big Data—is changing the way you deliver IT services and the way IT services are consumed. So certain assumptions no longer apply. For instance, the assumption used to be

 

  • You owned and controlled the end point device. Now you don’t.
  • You owned and controlled the network. Now you don’t.
  • You owned the environment. Now you don’t.

Your perimeter has changed. Instead of being a fence, it’s become like Swiss cheese: full of holes. If your users are on a mobile device and connected to Wi-Fi to look at something in the customer database, they’ve got one leg in the internal network and another on the external network. (If you’re concerned about security, come talk to our HP Software Professional Services experts at HP Protect.)

Labels: security

Why Converged Security matters: you locked all the doors but your window is open

Security threats are continuously evolving and shifting. One of the ways that that “bad guys” have changed their tactics is Miron_why converged security matters pt 1.pngto no longer to attempt to get in through your defenses. Instead they look for weak areas within your infrastructure and enter there –undetected.

 

Continue reading to find out how you can better protect your organization with Converged Security. It is your key to a holistic, secure enterprise.

Labels: security

Everything you need to know about Heartbleed

Heartdrip.jpg

The Heartbleed bug has been topping technology news searches this week, and you need answers. What’s the real vulnerability here—passwords or certificates? How should my IT shop respond? Is open source doomed? Fortunately, there’s been a lot of great coverage in the HP Software blogosphere. Whether you’re a CIO, CISO or IT worker in the trenches, these posts and videos will arm you with what you need to know about Heartbleed.

Labels: security

Unbreak my Heartbleed

heartlock.jpg

Ken O'Hagan is director of software presales at UK&I at Hewlett-Packard.

 

The Heartbleed bug has broken the Internet’s heart. At the bedrock of the web’s security, we have SSL—the trusted padlock in the browser. It has been the Holy Trinity of trust across the Internet for years, and now the day has arrived when the ultimate blasphemy has occurred: SSL has been cracked and it has broken the Internet’s heart.

 

This is a scary thought, as this brings into stark light the relative fragility of IT. From a security perspective it reinforces the simple premise of “trust no one.” This is a massive quake to the online world, the ripples of which are being felt across the globe.

Labels: security

Ponemon founder: Inside-out attacks can mirror outside-in attacks

aw-tendo-glam.jpg

According to the report “2013 Cost of Cyber Crime Study: United States,” the cost, frequency and time to resolve cyberattacks has risen for the fourth consecutive year. HP recently released the results from its global study, conducted by the Ponemon Institute, and the report determined that the most costly cybercrimes—to the tune of $11.56 million per organization annually—are caused by denial-of-service, malicious-insider and web-based attacks.

 

Keeping ne’er-do-wells out of your enterprise is no easy feat—fighting cybercriminals inside your office is even tougher. Discover Performance recently interviewed Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, to learn more about keeping malicious insiders at bay, whether they are employees, contractors or vendors.

Labels: security

What you can learn from the way revenue leaders handle enterprise security

daniel_dorr.JPGBy Daniel Dorr

 

We tend to think of security as something we use to keep the bad guys out and protect the good guys that are inside. But that attitude may be costing your company revenue.

 

HP recently surveyed 650 companies around the planet for 50 different IT attributes, and compared the results to revenue. We looked to see if there really is an IT difference between revenue leaders and followers. If there is a difference, what is it? When it comes to security do revenue leaders really use security as a competitive edge? And does security really matter when it comes to business performance?

Labels: security

Minimize impact of security vulnerabilities and incidents with COBIT 5 processes

IMG_1614-Edit_SML.jpgWith the new release of the COBIT standard IT organizations have a roadmap to achieve greater financial transparency, customer satisfaction, operational excellence, and future orientation. But what about security? With HP’s recent announcements about security, I thought I’d spend some time talking about how COBIT 5 processes will help you better manage risk and minimize business impact. As you can see in the below image, security does play a big role in the COBIT Scorecard.

Labels: security

Is social networking risky for the enterprise?

Maybe it’s because part of my day job is to interact with the IT community through my blog, Twitter and Facebook, but it seems to me that enterprise adoption of social media has quietly gone from being on the radical fringe to mainstream without as much as a “by your leave”. 

 

The question is not if or when, but how  it's being used that is challenging IT and compliance executives in enterprises. I take a look at where you can learn more. 

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
  • Alec Wagner is a longtime writer & editor, enterprise IT insider, and (generally) fearless digital nomad.
  • Lending 20 years of IT market expertise across 5 continents, for defining moments as an innovation adoption change agent.
  • This account is for guest bloggers. The blog post will identify the blogger.
  • I'm the community manager for Discover Performance and have been a writer/editor in the technology field for several years.
  • Mike has been with HP for 30 years. Half of that time was in R&D, mainly as an architect. The other 15 years has been spent in product management, product marketing, and now, solution marketing. .
  • Paul Muller leads the global IT management evangelist team within the Software business at HP. In this role, Muller heads the team responsible for fostering HP’s participation in the IT management community, contributing to and communicating best-practice in helping IT perform better.
  • Rafael Brugnini (Rafa) serves as VP of EMEA & APJ for HP Software. Joining in 1996 and has more than 20 years of knowledge and experience linked to HP. He resides in Madrid with his wife and family, and in his spare time he enjoys windsurfing.
  • Evangelist for IT Financial Management (ITFM), IT Governance and IT Portfolio Management, consulting IT organisations for Close to 15 years on principles of good governance.
Follow Us


HP Blog

HP Software Solutions Blog

Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation