HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: January 2014

HP TippingPoint--Putting security on the right track!


On January 21, 2014, HP had a big announcement! See how Swiss Federal Railways—the national railway of Switzerland—deployed HP TippingPoint technology to secure the national railway’s network infrastructure.


Through the looking glass...why security keeps getting harder, pt. 3

bo.pngFrom an ever expanding attack surface to human nature itself, the difficulties of security only seem to increase. This is the third in an ongoing series examining the factors that serve to hamper security efforts.  This specific post discusses why no system is safe, what the Internet of Things bodes for the future,  the extremity of response now required when dealing with high risk data, and how the current state of political gridlock also impacts cyber security efforts.

1 in 4 Security Operations Organizations Are Ineffective

soso.jpgDetailed in the newly released State of Security Operations report, HP finds that 1 in 4 security operations organizations are ineffective.  Read on to see a summary of findings from the report and the top 5 reasons why security operations organizations are missing the mark.

8 things your boss wants you to know about 'Big Data Security'

bi data security.PNGThe multitude of devices, users, and generated traffic all combine to create a proliferation of data that is being created with incredible volume, velocity, and variety. As a result, organizations need a way to protect, utilize, and gain real-time insight from “big data.”


Read through the 8 topics that your boss expects you to know about 'Big Data Security'.

Tags: ArcSight| siem

Could Behavioral Analytics Have Stopped Edward Snowden?

Behavioral analytics can be used to identify malicious activities by insiders.snowden.png

Could it have been used to stop Edward Snowden?


Read on to learn what behavioral analytics is and how it can be used to detect rouge insiders.

Malware from a universe far, far away

In 1977, Chewbacca and R2-D2 hid information from scrutiny, accessed systems that should have been barred to them, and exfiltrated secrets. Today, we'd call them hackers. Where's Obi-Wan when you need him?

Labels: HP| security

Security trends for 2014


Based on some of the major security threats last year, and my research on cool new trends in the market, this list shows some trends in the security space for 2014 that will continue to build momentum.

Insider Threat--Does it really affect my organization?

insider threats.jpgUnderstanding the insider threat to your organization is important. If you think you are not affected, you are wrong. Every organization, no matter the size, should be paying attention to the insider threat. The way you should be thinking about this is not if, but when it will happen within your company.

Labels: HP| security

What to expect from HP Enterprise Security for RSA Security Conference 2014

rsa conf 2014.PNG


The upcoming RSA conference takes place February 24-28 in San Francisco. HP Enterprise Security Products (ESP) is a Platinum sponsor of RSA with the key message: if you want better security, think like a bad guy.


If you are attending RSA, please join us at any of the following activities to hear more.


Visit us in booth #3401

  • Meet with HP ESP experts
  • Experience a mock SOC
  • See demos of ESP solutions
  • Discuss related services
  • Learn from our theater presentations
  • Expand your network
Tags: ArcSight| rsa| siem
Labels: Security events

Webinar on 1/23: Stay out of the headlines for breaches or non-compliance

small.pngWe welcome you to join us for a live webinar on 1/23 @ 9a PST. It is a joint webinar with Co3 Systems' Gant Redmon. We'll be discussing the similarities in security and compliance policies and how security analytics tools and incident response tools can help you stay out of the headlines for bad reasons.



Rethink your enterprise security and learn how to protect what matters

The world is constantly evolving and it is crucial that your security systems evolve as well. You need to have a sustainable approach to security and risk management.


If you are in APJ, we have a series of enterprise security events that you won’t want to miss. We are offering three “Protect what matters” events to help you understand the newest vulnerabilities and learn how to protect yourself.


Keep reading to learn how to attend one of these sessions.


Guest Post by Michelle Vu, HP Software APJ


A day in a life of a hacked organization

ddos 2.PNGMany organizations have been lucky enough to never experience a data breach. They don’t think they will ever be breached because they are "too small" or "too big" or simply too confident about their security posture. Let me try to combine some of the experiences and stories that I have heard from organizations that went through a data breach. You may recognize some parts of this story from the news headlines.


Reducing Hacker Operational Freedom and Capability

Screen Shot 2014-01-09 at 11.18.22.pngIt seems like many companies are just waiting to be attacked. What can we do as a security community to disrupt their capability and reduce their freedom to operate before they attack us? The more time we spend in their maneuver space the easier time we have defending our enterprise when they arrive in our space. 

Learn how to transform IT to create business value--with HP's Meg Whitman

meg webinar.jpgJoin us on January 8th, as Meg Whitman shares how to transform IT to create business value.


Tags: HP| security| Software
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.