HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: July 2013

2 Reasons iOS is More Secure Than Android

Be sure to catch Daniel Miessler's latest post on mobile security   2 Reasons iOS is More Secure Than Android in our sister application security blog.

 

And if you're planning on attending HP Protect in September, he'll be speaking there on  mobile security and also presenting an in-depth examination of Cross-Site Scripting and Cross-Site Request Forgery vulnerabilities. 

Save $200 NOW for HP Protect, the Enterprise Security event of 2013

art gilliland video.pngAre you interested in saving $200 on your registration for HP Protect, the Enterprise Security event of 2013 in Washington, D.C.? Watch this video which showcases Art Gilliland personally inviting you to the security user conference. This is your opportunity to get first-hand experience with the product updates that we have performed over the last year.

 

Continue reading to see the video and learn more about the amazing learning opportunities that are available to you at HP Protect.

 

Turn your entire network security into a massive botnet detector with Software-Defined Networking

Arcsight sentinal.pngThe influx of technology is making security tough for IT administrators. So what if you could turn your entire network into a massive botnet detector? Read more here.

 

Guest Post by Mauricio Sanchez
Director of Advanced Technology and Chief Technologist—Security, HP Networking

What do the experts have to say about their SOC journey?

protect.jpgAre you thinking of building a security operations center (SOC)? Join hundreds of security experts at the 9th annual HP Protect conference to learn from other’s experiences in building and maturing their SOCs.  Best practices will be shared as well as undocumented lessons learned (don’t do this or you’ll regret it! stories).

 

Read on to see what sorts of SOC sessions and panels are being offered at HP Protect 2013.

Have you reached your tipping point when it comes to enterprise security?

Frost and Sullivan Reported Code Execution.pngUnfortunately, security breaches are simply part of daily life right now. And while your enterprise organization is demanding the need for security, today’s IT specialists continue to struggle with the challenge of protecting the integrity and confidentiality of your enterprise’s data. Unfortunately IPS appliances are no longer enough. The next-generation IPS provides higher level prevention. 



2013 Gartner Magic Quadrant for Application Security Testing Report

gartner136.gif HP has been named a leader in the Gartner 2013 Magic Quadrant for Application Security Testing (AST), a category that now combines static and dynamic application security testing. HP paved the way for this shift in Gartner’s reporting by bringing together SPI Dynamics and Fortify Software, the respective leaders in dynamic and static analysis. We believe being named a leader in the newly combined category is not only a testament to the breadth and depth of the Fortify application security portfolio, but also to the forward-looking security vision of HP Enterprise Security Products (ESP).

Smart meter monitoring using HP ArcSight

electric.pngSmart meters can provide automation to usage tracking and can reduce power consumption, but they also open the door for malfunction and fraud. Monitoring these devices is the first line of defense for detecting malicious behavior.

 

Keep reading to find out what we are doing in the smart meter space to improve availability, security and privacy.

Labels: ArcSight

HP introduces update to ArcSight Threat Detector 2.0 and Threat Response Manager 5.5

TRM.pngHP today announced updates to its Big Data Security Analytics through HP ArcSight portfolio to enhance early detection and accelerate threat response and prevention.

 

According to a recent report on advanced targeted attacks released by Mandiant, attackers spend an estimated 243 days on a victim’s network before they are discovered.  In addition, nearly two-thirds of organizations learn that they have been breached from an external source, such as a customer or law enforcement.

 

HP updates 'HP ArcSight' portfolio to enhance big data security analytics

big security.pngHP today announced updates to its HP ArcSight portfolio, offering enterprises unified security analytics for big data with expanded identity monitoring to accelerate the detection of persistent threats.

 

Enterprises must proactively anticipate intrusions and hasten the detection of risks in order to protect valuable assets. To successfully identify and remediate occurrences of prolonged unauthorized network access, also known as advanced persistent threats (APTs), organizations must be prepared to:

 

  • Handle and process information at high velocity, volume and variety
  • Analyze structured and unstructured data both inside and outside their network
  • Monitor events in cloud, mobile and virtual environments
  • Automatically take action once a threat has been detected

 

The Catalog of technical sessions for HP Protect 2013 is out

HP_Protect_Register_Now_600x60_Static.jpg

 

Have you seen the Advanced technical sessions on the catalog for HP Protect 2013 yet? There are some really good deep-dive technical discussions on the catalog. Check it out today and see which sessions you want to attend.

 

 

Why Fortify?

 

 

 

Odd Todd returns for a second turn at explaining Why Fortify?

 

 

 

 

 

 

If you missed Why Fortify? - Part 1, see it here: http://www.youtube.com/watch?v=IWnRDxriUCc

Top 10 reasons to register for HP Protect 2013

There were about 800 reasons (attendees) for attending the HP Protect’12 events. We are anticipating more than 1,000 security professionals to attend HP Protect 2013 this year starting September 16, 2013.

 

 

 

 

 

 

 

 

 

 

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.