HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: June 2013

Improve your business service SLAs with intelligent correlation of security analytics data

ppt_library_4x3_title-11.pngConnect poor application performance to a database query that’s being abused by a hacker, or a poor user experience to a corrupt database index. Whether you’re confronted with a security issue or an operational one, connecting all endpoints into a single tiered-analysis engine gives you shorter time to identification and faster troubleshooting through increased visibility


Unified approach takes analysis a step further by feeding domain-specific information into a high-scale analytics engine to analyze cross-domain issues. This is critical for both real-time issue identification and alerting, and for advanced forensic activities

Tags: SLA

Why is continuous monitoring (OMB M-10-15 Compliance) so important?

it ops analytics.pngIT operators rely on event reduction techniques such as correlation engines, or limit either the breadth or depth of data collection to only machine data from business-critical applications. The machine data collected is typically not categorized or normalized, and there are no tools to search events or logs.


The data is also retained for the short term and may not fulfill the need to keep services up and running at all times. This short-term retention of data limits the intelligence in the system, as events fixed and annotated a few months ago may not be stored for retrieval. The alternate option is to invest in expensive databases and resources to manage and analyze the data.

Tags: ArcSight| BSM

Verify the application security of your 3rd party development

fortify.pngWhen you create applications in-house, you can control the application security standards.  But what about your third-party applications?  How can you ensure that these applications are truly secure?


I have a few ways that you can verify security of out-sourced applications and hold your third-party developers to the same standards as your in-house development shop.

Actionable security intelligence you can “actually” use

CRR info.pngHave you seen it yet? Have you looked through the HP 2012 Cyber Risk Report? If not, don’t worry. I have a “cheat sheet” infographic in this blog. Keep reading to sneak a peek…

HP Security's chief discusses why HP ArcSight is named in leader's quadrant for 10 consecutive years

The 2013 Gartner Magic Quadrant for Security Information and Event Management has been published and HP Arcsight is in the Leaders Quadrant for the tenth consecutive year.


Gartner evaluates vendors in a Magic Quadrant on two main dimensions – completeness of vision and ability to execute on that vision.


HP Arcsight continues its strong leadership on both dimensions, driving its placement as the most visionary.


In 2013 Gartner ranked HP ArcSight SIEM as the most complete solution on the market. In four of the categories evaluated, we ranked first.


In three more, we ranked second. And when all eight categories are combined, we once again are first.


HP introduces HAVEn to combat $4 billion cyber-theft in Big Data space

photo.JPGHP announced at HP Discover 2013, the new big data solutions along with security portfolio to combat $4 billion cyber theft in big data space. The acronym HAVEn  is built with best of HP’s technology such as Hadoop, AutonomyVertica and Enterprise Security represented by Arcsight and "n" apps built on this platform, all representing various aspects of big data.


Big data is unmanageable and complex data comprised of machine and human generated data. This is a perfect platform to manage that big data from all perspective including analytics, reporting, and security. Autonomy is the best big data solutions for human generated data, ArcSight has been managing the machine generated big data since 2007 with introduction of CORRe, Hadoop is a great place to consolidate all of this data with which you can use any analytical tool such as Vertica to perform real-time, near-real-time, and historical analysis of all type of data.

Top 10 things for security people to do at HP Discover 2013 - Las Vegas, NV

small.pngHP Discover kicks off today with over 10,000 people from some of the best brands in various parts of the world. Meg Whitman the CEO and President of Hewlett-Packard, kicked-off the HP Discover 2013 with a keynote suggesting her top 10 list things to do at the show.


With cyber-security gaining momentum every year, we would like to recommend our IT Security & Compliance people to make sure they complete this check list of top 10 things to attend while in Las Vegas for the event.

Combating professional security threats

Discover2013.pngHow will you recover from a security breach? How can you prevent a re-attack? How can you stay one step ahead of the criminals who are looking to capitalize from your data and information?


Art Gilliland, Senior Vice President and General Manager, HP Enterprise Security Products will discuss the current security climate and ways to protect from an attack.  Keep reading to find out how you can hear his presentation and learn about arming your organization.  


Guest post by Kim Lock, Editor, IT Experts Community

HP ArcSight updates Logger and Connector Appliances to the next generation G8, HP Proliant platforms


Starting June 1, 2013, HP ArcSight Logger and Connector Appliances gets an update from Generaion-7 to Generation-8 Hardware on Cx500, Lx500 series. This enables our customers to get the latest HP Proliant hardware bundled with HP ArcSight software for enhanced support and performance. 

For successful security analysis—add a pinch of training

It turns out that what you don’t know really can hurt you. Without proper education (and continuing education) your security analysts won’t be as efficient or effective.


Keep reading to find out how the power of education can supercharge your teams.  

Labels: ArcSight| education
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.