HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

HP introduces HP ArcSight Risk Insight, a heatmap for SIEM security events

heatmap.pngToday HP introduced  Risk Insight 1.0 as a new product to the HP ArcSight ESM portfolio.  It enables organizations to understand the business impact of real-time threats detected by ESM.


The landscape for cyber threats is evolving rapidly. To assist Security Operations Center (SOC) teams with cyber threats, ArcSight Risk Insight 1.0 will help to:


  • Identify sophisticated attack targets
  • Interpret the current state of security technology deployment
  • Scale potential business risk to help you decide where to best focus mitigation efforts




Combining security intelligence with business risk

HP ArcSight Risk Insight 1.0 is intended to leverage investments in the current SIEM technology while ultimately engaging and combining security intelligence with business risk. This will provide senior-level management teams with business-level insight to security information so they can prioritize and act on intelligence to address risk.


Build dashboards, reports, and KPI’s

HP ArcSight Risk Insight 1.0 provides easy to read and understand dashboards to enable managers to consume and communicate information. These dashboards reflect risk information that users would like to display by customizing existing dshboards or by creating new ones. 




Introducing the Heatmap for SIEM security events

Risk Insight processes billions of events every day, watching trends, collecting, correlating, security information, and displaying large amount of data on a simple heat map. Heatmap lets you pick the most important security event that you need to fix based on business impact and not just severity of the event.  Continuous monitoring on an heatmap enables better compliance monitoring. This large amount of information or big data on a heatmap and asset map provides metrics and KPIs to see how your business is actually performing from a risk standpoint. 


risk indicator.png


Vulnerability Management

HP ArcSight Risk Insight provides an aggregated vulnerability score for the business assets. This also provides the list of vulnerabilities affecting a particular business asset. The trending of score enables you to monitor the risk in your business to see if your services are getting safer or riskier. It also helps in remediation status. 




Continuous complaince

The breadth, depth and speed of data collection, its correlation and big data analytics ensures continuous compliance through SIEM and Risk Insight. You don't have to wait till the quarter end or auding to identify non-compliance, ArcSight will let you know of any non-compliance in real-time that can be fixed initially without making it a bigger problem.


For more information, click here to learn more about HP ArcSight Risk Insight

Astuce Pour Parier | ‎11-19-2013 12:46 AM
Un travail d orfevre, merci pour le plaisir.
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Showing results for 
Search instead for 
Do you mean 
About the Author
Top Kudoed Posts

Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.