HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

RSA Conference 2013 summary: Big vendors with Big security solutions using the Big data

The security conference RSA 2013 concludes on Friday with Condoleezza Rice’s remarks on disclosure principles of large corporations when hacked. She suggested that now that Wall Street Journal and New York Times were hacked last week, the issue might get bigger and louder.


Hugh Thompson, the chairman of RSA Conference also compared the cold war and the “code war” with many countries. He also said that the conversation is long over about whether security is needed for IT, and is now only about how much and ROI of security analytics. Billy Bean, the guy who “stole everything and didn’t invent anything” on the baseball analytics using the moneyball strategy also suggested that it’s the security analytics and intelligence that could keep helping the good guys getting better than the bad guys.


Art Gilliland, the head of security group at Hewlett-Packard said that bad guys are depending on the big data such as combination of application vulnerabilities, network gaps, machine data, and social media to know who you are, where you go, and what you do to target specific company, group or even machine. So, this issue can be resolved through big data security intelligence platforms.


Art Corviello from RSA, who delivered the opening keynote started with how big data, converging with social, mobile, and cloud, will provide a wealth of information that can be sliced, diced, and analyzed to fuel intelligence-based security systems. He said an "intelligence-driven model can be made future proof. It evolves and learns from change". However he added a caveat that “if we, as an industry, overhype this situation, organizations won't take the necessary measures to prepare themselves”. 

Labels: Security events
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Showing results for 
Search instead for 
Do you mean 
About the Author

Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.