HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: October 2012

2 ways to coordinate application, information and network security

by Norm Follet, Director of Solutions Design and Demo Group


Overview.pngEnterprise security is stronger with a coordinated approach. Here is an explanation of how HP Enterprise Security products TippingPoint, ArcSight and Fortify can work in concert to provide a defense in depth solution.

Cost of each cyber-attack is estimated at $600,000

Ponemon Institute

Did you know that it takes around 24 days to resolve a cyber-attack? The cost of resolution of each incident is estimated at $600,000 per incident. The research indicates an upward trend of increased attack by 42% year on year. In absolute terms, each of those companies had more than 100 attacks every week.



What do you currently have on your computer?

thCAFC22MO.jpgDo you know most spyware is developed by legitimate companies and the odds are that you probably have some on your computer right now?


The fact is most developers stuck doing security testing have little to no training on security or testing tools.


Do you think of your development tools, object libraries, or applets add-ons as a security risk?

Labels: IT| security

Development is a security risk?

thCAN9353N.jpgSoftware & Corprate hacking is big business and if you wanted to know someone information where the best place to start? we need to discuss the security risk of internal applications and how developing stucture in SDLC can help. 

Labels: IT| security
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.