HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: December 2013

HP TippingPoint named a leader in Next-Gen Intrusion Prevention

ngips.jpgHP TippingPoint is pleased to announce our placement in the leader’s quadrant of the Intrusion Prevention System Magic Quadrant for the 9th consecutive year!

Tags: HP| security

Top questions to help you think like a cyber criminal

Screen Shot 2013-12-11 at 15.57.37.pngThese are questions I would like the answer to when evaluating a cyber criminal’s motivation, capability and likely, next-expected event. Thinking like a bad guy requires understanding them at a deeper level than just technology. This is a carry over from my last post on knowing your enemy. 

Be aware of cyber security when you travel...

hams.jpgBarcelona is known for many things, including its fabulous architecture, Picasso, and Iberian Ham (which should come with an addiction warning - that stuff is tasty).  However, it's also known for the creativity of its petty criminals. Recently, though, there was an attempt at a different kind of crime here that perfectly illustrates how physical crime and cyber crime are becoming more frequently intertwined.  Read the article for more information....

Labels: Security events

HEMLOCK methodology - Identify security threats faster

HEMLOCK2.pngSIEM technology…it’s great at detecting potential threats, but at the end of the day, there is no substitute for effective human analytics. Read on to learn how to apply human analytics to increase your security organization's effectiveness.

Tags: Hemlock| siem

Sri's Travel Log--Representing Security in Barcelona!

bocqueria.jpgThis is my Travel Logger (log book) to Barcelona for HP Discover 2013. Barcelona has been an amazing place for the last 3 days. So far, it has been an eventful trip with lots of things to write about.



Labels: Security events
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.