HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

What happened after the world's biggest data breach occured?

breach 1.PNGRecently there was a great infographic that I got from CISSP newsletter on the World's Biggest Data Breaches. This infographic  showed that the world's largest data breaches occurred where over 30,000 records were stolen. This is an interactive inforgraphic, and while I was playing with various filters I hapened  to see a pattern. I went to our internal CRM database and I surprised to see that more than half of all these large companies that were breached, reached out to us right after the breach occured.


In many cases, we were the first responders to these companies. Most CIOs, CSOs, and leaders in the IT team know about HP's security and IT management tools and we have 44,000 customers that we have helped o over the last 25+ years.


Typically when companies get breached, they call us out for help. We have a team that can fly to any part of the world from China to Washington, D.C with our security software and appliances, and most companies have started seeing the sources and data transfers within the first hour. 




If you look at this list of companies, approximately 50 percent of them have called us after they were breached. The picture on the right shows all the data breaches due to hacking and cyber-threats that could have been prevented through simple controls and inexpensive tools.


HP Enterprise security group offers best-of-breed technologies that are all in leaders quadrant of Gartner's magic quadrant. We can help with:

  •  Information security
  • Application security
  • Network security
  • Log management
  • Identity management

This all leads to security with ease.  

 So, now you have a friend when you have a security breach... Feel free to reach us here.


Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Google Tools | ‎02-22-2014 01:03 AM
I feel that you can do with
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Showing results for 
Search instead for 
Do you mean 
About the Author

Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.