HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: January 2013

Adapt or Die (Emergence of Software-Defined Security Models)

Johnpirc.pngWhat will happen to Software-defined Data Centers in the face of Cloud, Saas and other flexible models if they don't adapt? 

Guest post by: John Pirc, Director, HP Security Research

Author (Blackhatonomics, Cybercrime and Espionage)

Tags: Gartner| security

Gartner report 2013: "ArcSight should be on the list of every large organization building a SOC"

A recent Gartner's report published on Jan 4, 2013 on 'SIEM Market Trends, Solutions, Assessment and Select Product Profiles 2013' wrote that "ArcSight has been the most visible product in the SIEM space since at least 2005, and ArcSight SIEM tools are currently used in many of the largest SIEM deployments in the world". Gartner recommends the vendors looking for SIEM solution that "ArcSight ESM software should be on the list for every large organization building an SOC".

 

Key Security Investments for 2013…and beyond

HP conf room graphic.jpgHave you seen the 2013 Global State of Information Security Survey (GISS) from CIO Magazine, CSO Magazine and Price Waterhouse Coopers?  It reveals an interesting trend in regard to security programs and it highlights a shift in security priorities.   Today I want to discuss a Security Maturity model to help assess where security capabilities will head in 2014. I also want to provide a framework for you to assess your own capabilities—without bias of self-confidence.

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.