HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: November 2013

Application vulnerabilities - protect your weakest link

hacked.jpgAccording to Gartner, 84% of breaches now occur at the application layer. In fact, repeated security research shows that applications continue to represent the weakest link in enterprise security. The consequences and costs of breaches continue to rise while the complexity of application security also grows unchecked. So, what are organizations to do, especially when current approaches are too often expensive, reactive and ineffective?

Labels: Security events

The top 3 things you need to know about ZDI

Over the last several weeks, we’ve received several questions about ZDI. In this
blog post, we answer the top 3 questions we get regarding the HP Security
Research’s program callzdi_logo.gifed Zero Day Initiative.

HP ArcSight is simple and easy

3.PNGHP ArcSight is simple and easy after moving away from relational database. In Feb of this year we launched HP ArcSight ESM 6.0c where 'C' stands for CORRe. CORRe stands for 'Correlation Optimized Retention and Retrieval Engine', which is an HP proprietary columnar database which is built on current open standards that can scale to handle any Big Data. 


With it's own database optimized to correlate data and manage Big Data, ArcSight has removed all the complexities such as database tuning, scalabilities, and performance issues.


Learn more in this blog post!

Tags: ArcSight| siem

Network Security--How to stay ahead of the pack

You’ve heard it over and over by now: The threat landscape is changing. It’s
ever-evolving, and the threats are now more serious and more widespread than
they have ever been.  So, what does it network with lock.jpgmean for you, the network security professional?


A guest post by Jennifer Ellard
Director, Product Marketing
HP Enterprise Security Products

Labels: DVLabs| TippingPoint

Active Defense – Not just passive protection...

AdrianopleWhat does it mean to defend your network as opposed to just protecting it? In this post, I continue thinking out loud about defensive information security doctrine. I will look at an active and mobile defense of your enterprise.

Did you know: DVLabs—Your secret security weapon

protect your network.jpgDid you know…that you have a secret security weapon at your disposal?  Psst…It’s HP DVLabs, and it’s one of the most effective ways to protect your network.


Guest post by TJ Alldridge

Product Marketing Manager
HP Enterprise Security Products

5 questions for which every CIO should have answers

fraud.jpgIn today's new threat landscape what you don't know can hurt you. Moving from an IT issue to a board issue, security breaches are a huge problem, and the board is asking questions. Here are the answers you need...

Security breach response time: Get it right, and save money

co3.pngThe longer it takes you to respond to a security breach, the more it will cost your organization.  Read on to learn more about an upcoming free webinar, that will explain how security monitoring can be integrated with incident response programs to reduce the cost of an attack.

Top NGFW Features: Security Management System

NGFW.pngWelcome to our second blog post in the “Top NGFW Features” series. In this post, we’ll discuss Security Management System and how it simplifies the management of NGFW and NGIPS.


Guest Post by TJ Alldridge
Product Marketing Manager
HP Enterprise Security Products

Tags: HP| security

Security…and the people that should know better

Certain groups would seem to have adequate security processes in place as a matter of course. Turns out that isn't always the case.

Top NGFW Features: Granular Application Visibility

In this blog series, we will discuss the top 5 features of NGFW. We kick off the series by introducing you to granular application visibility and control.

Tags: HP| security

How to implement the kill chain use case methodology in your SIEM

killchain.pngThe newly published technical whitepaper HP SIEM Kill Chain use case methodology explains what a Cyber Kill Chain is and how the HP SIEM Kill Chain methodology can be applied for the authoring of use cases.  The whitepaper showcase the benefits of using a kill chain methodology over standalone use cases.


Read on to learn more about how you can apply the kill chain methodology with your ArcSight SIEM.

Are you doing security right? The BSIMM-V can help answer that.

The latest version of the BSIMM is now available and can help organizations determine where they are in building a successful security program.  Read the article to find out more.

SIEM sensor grid - You only get out what you put in

Radar ScrrenA common challenge to successful SIEM implementations is in the diversity, configuration and context of your sensor grid. Read this and understand the way around the garbage-in garbage-out dilemma of SIEM deployments.

Tags: ArcSight| siem

Know Thyself – Cyber Defense Doctrine

Its time to open a conversation on effective defensive security doctrine. Let's take back the initiative from our opponents!

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.