HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: May 2014

SIEM is NOT dead, SIEM means never having to say 'sorry'

3.pngSIEM is NOT dead, SIEM means never having to say 'sorry'. We have been leading the market, technology, and industry for as long as SIEM existed. We have been recognized by Gartner in the leaders quadrant every year. In fact, we have been leaders for more years than anyone has been in the MQ consistently. This blog is about the top 10 use cases of SIEM that hundreds of thousands of customers are using through SIEM technology.

 

For more information on how SIEM continues to drive innovation in the security industry, attend my session at the Discover DF3968. My session starts on Wednesday, Jun 11, 2014 between 11:15 AM - 11:45 AM.

 

 

Labels: ArcSight

Getting started with FREE trial version of HP ArcSight Logger

placeit24.pngHP ArcSight Logger delivers a cost-effective universal log management solution that unifies searching, reporting, alerting, and analysis across any type of enterprise machine data. Read this to get your free trial. 

 

 

Security for unstructured sensitive data

atalla.pngFind out how to have complete protection of sensitive unstructured data and enhanced visibility of the data and its usage. Read more here. 

Labels: Atalla

Big Data Security Analytics Part 6: 3 Keys to Success

The first step in successfully solving the security big data problem is to approach the challenge with your eyes open and a realistic set of expectations. You cannot load all your data into a pot, have it boil for a while and expect it will report back with Edward Snowden in handcuffs. Work to solve all the tactical challenges along the way and you will find the strategic value. 

Labels: haven

DVToolkit and DVConverter – Leveraging Custom Filter Detection in Your Network

dvtoolkit.pngThis post features a link to a webcast with in-depth training for the HP DVToolkit in order to write, convert and/or deploy custom filters in your network. 

What's new with HP ArcSight Logger 5.5? It is the fastest Logger ever!

HP ArcSight Logger is an enterprise ready, universal log management solution that is truly borderless in collecting, analyzing, and storing Big Data. The new Logger 5.5 comes with an accelerated search on the most frequently used fields, up to 1000x faster than the previous version.

 

HP Software announces: Discover 2014 Awards of Excellence – Enterprise Security Winners

usaa.jpgHP Software has announced the winners of the Discover 2014 Awards of Excellence.  Thesehave been brought to you by the HP Software Americas Marketing team.  This award recognizes the quantified improvements and corresponding business benefits achieved using HP Software solutions within 8 categories

Labels: ArcSight

Big Data Security Analytics Part 5: The Challenges of Successful BDSA

Realizing value in security analytics can a bumpy road.  Read on to see issues that teams commonly struggle with as they build a security analytics capability on the back of big security data.

Labels: haven

Heartbleed still causing heartburn

heartbleed1.jpgI recently estimated that within three weeks of the release of the Heartbleed security vulnerability, roughly 70 percent of organizations would have it resolved. It’s a good thing I wasn’t in Vegas when I made that prediction because I’d have lost that bet. Roughly six weeks later, over half still haven’t corrected the problem. So why are so many organizations still vulnerable? Read the article for more information.

Defensive Strategy - The 4 Principles of Active Defense

Screen Shot 2014-05-21 at 9.38.55 AM.pngWhen you move beyond the tactics, techniques and procedures of defense into the operational or strategic levels of defending your enterprise, there are 4 key principles to keep in mind. These are the strategic principles of defense and they have been tested for centuries by strategic thinkers.

A sneak peek at the future of security with HP Labs

big-data.jpgToday’s enterprises generate terabytes of security event data. These volumes are increasing exponentially as the security landscape grows ever more complex. But how can you turn this data into actionable security insight?

TELUS leverages HP TippingPoint for managed security services

telus.jpgThe HP TippingPoint intrusion prevention system (IPS)—plays a critical role across the TELUS enterprise. Most importantly, it is pivotal in helping protect the customer-facing part of the business through the company’s managed security services.

Labels: TippingPoint

Big Data Security Analytics Part 4: Visualization is Key

Finding the right questions to ask of the data requires an ongoing exploration of data.  Making sense of the answers often requires visualization.  How you use your visualization tools with BDSA can be the key to success.  Read on to see how.

Labels: haven

CARVER Analysis – Are you defending the right things?

Screen Shot 2014-05-14 at 12.50.35 PM.pngAre you defending what the bad guys are really going after or just what YOU consider critical? Use CARVER analysis to tell the difference.This techniques has been used by irregular forces since WW2 for target selection and defense and it applies well to defending your enterprise.

HP TippingPoint NGFW ATP security training

TP.jpgLearn to increase the availability, reliability, and security of your network at HP Discover, June 10-12!

It's time to secure your enterprise

discover theatre.jpgSecuring your enterprise is getting more and more difficult. Learn how to significantly reduce your attack surface, mitigate risk, and prevent losses associated with successful attacks.   

Big Data Security Analytics Part 3: Data science & Putting Structure to the Problem

It’s Part 3 of the Big Data Security Analytics series! Now is the time to discuss how to answer security questions based on the disciplines of data science.

Labels: ArcSight| haven

Secure your cloud

hp-a-cloudsecurity.jpgMoving workloads to a cloud service provider? Learn how to retain control of your data while realizing the benefits of cloud.  

Labels: Atalla| HP| security

Big Data Security Analytics Part 2: Security Analytics Results From a Combination of Tools

products.pngWelcome to Part 2 of the Big Data Security Analytics series! In this post, we’ll discuss tools and build approaches.

Labels: ArcSight
Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.