HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: November 2013

Application vulnerabilities - protect your weakest link

hacked.jpgAccording to Gartner, 84% of breaches now occur at the application layer. In fact, repeated security

research shows that applications continue to represent the weakest link in enterprise security. The consequences and costs of breaches continue to rise while the complexity of application security also grows unchecked. So, what are organizations to do, especially when current approaches are too often expensive, reactive and ineffective?

The top 3 things you need to know about ZDI

Over the last several weeks, we’ve received several questions about ZDI. In this
blog post, we answer the top 3 questions we get regarding the HP Security
Research’s program callzdi_logo.gifed Zero Day Initiative.

HP ArcSight is simple and easy

3.PNGHP ArcSight is simple and easy after moving away from relational database. In Feb of this year we launched HP ArcSight ESM 6.0c where 'C' stands for CORRe. CORRe stands for 'Correlation Optimized Retention and Retrieval Engine', which is an HP proprietary columnar database which is built on current open standards that can scale to handle any Big Data. 

 

With it's own database optimized to correlate data and manage Big Data, ArcSight has removed all the complexities such as database tuning, scalabilities, and performance issues.

 

Visit our website, and learn more about how ArcSight can help you in 25 different use cases from security, compliance, IT operations, ops analytics, big data, machine data consolidation, etc.

 

www.hp.com/go/ArcSight

Network Security--How to stay ahead of the pack

You’ve heard it over and over by now: The threat landscape is changing. It’s
ever-evolving, and the threats are now more serious and more widespread than
they have ever been.  So, what does it network with lock.jpgmean for you, the network security professional?

 

A guest post by Jennifer Ellard
Director, Product Marketing
HP Enterprise Security Products

Labels: DVLabs| TippingPoint

Did you know: DVLabs—Your secret security weapon

protect your network.jpgDid you know…that you have a secret security weapon at your disposal?  Psst…It’s HP DVLabs, and it’s one of the most effective ways to protect your network.

 

Guest post by TJ Alldridge

Product Marketing Manager
HP Enterprise Security Products

5 questions for which every CIO should have answers

fraud.jpgIn today's new threat landscape what you don't know can hurt you. Moving from an IT issue to a board issue, security breaches are a huge problem, and the board is asking questions. Here are the answers you need...

Security breach response time: Get it right, and save money

co3.pngThe longer it takes you to respond to a security breach, the more it will cost your organization.  Read on to learn more about an upcoming free webinar, that will explain how security monitoring can be integrated with incident response programs to reduce the cost of an attack.

Top NGFW Features: Security Management System

NGFW.pngWelcome to our second blog post in the “Top NGFW Features” series. In this post, we’ll discuss Security Management System and how it simplifies the management of NGFW and NGIPS.

 

Guest Post by TJ Alldridge
Product Marketing Manager
HP Enterprise Security Products

Tags: HP| security

Security…and the people that should know better

Certain groups would seem to have adequate security processes in place as a matter of course. Turns out that isn't always the case.

Top NGFW Features: Granular Application Visibility

In this blog series, we will discuss the top 5 features of NGFW. We kick off the series by introducing you to granular application visibility and control.

Tags: HP| security

How to implement the kill chain use case methodology in your SIEM

killchain.pngThe newly published technical whitepaper HP SIEM Kill Chain use case methodology explains what a Cyber Kill Chain is and how the HP SIEM Kill Chain methodology can be applied for the authoring of use cases.  The whitepaper showcase the benefits of using a kill chain methodology over standalone use cases.

 

Read on to learn more about how you can apply the kill chain methodology with your ArcSight SIEM.

Are you doing security right? The BSIMM-V can help answer that.

The latest version of the BSIMM is now available and can help organizations determine where they are in building a successful security program.  Read the article to find out more.

SIEM sensor grid - You only get out what you put in

Radar ScrrenA common challenge to successful SIEM implementations is in the diversity, configuration and context of your sensor grid. Read this and understand the way around the garbage-in garbage-out dilemma of SIEM deployments.

Know Thyself – Cyber Defense Doctrine

Its time to open a conversation on effective defensive security doctrine. Let's take back the initiative from our opponents!

Tags: HP| security
Labels: appsec| ArcSight| ESM| HP| security
Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.