HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: August 2013

ArcSight, Fortify and TippingPoint training at HP Protect 2013

Did you know there are two full days of in-depth training available at the HP Protect conference?  Keep reading to learn about what training is offered and how you can sign up!

Should we still care about APTs?

Gilliland protect video.pngA couple of weeks ago, I was having lunch with a long-time CISO. We were chatting about the state of our industry when the topic landed on APTs. My friend asked, “This is 2013…should we still care about APTs?”

 

Guest post by Perry Payne
CISSP, CISM , CISA, HP Enterprise Security Products

What happened after the world's biggest data breach occured?

breach 1.PNGTypically when companies get breached, they call us out for help. We have a team that can fly to any part of the world from China to Washington, D.C with our security software and appliances. Most companies have started seeing the sources and data transfers within the first hour of our assistance . 

 

In today's blog I want to take a look at these companies and examine what they did after the data breach.

Why research is fundamental to security

Microsoft vulnerability.pngResearch…it’s always looked over as something a security vendor should just do.  However, research is relevant to security. 

 

Here’s why I think you should take time to perform research. 

Search
About the Author(s)
Follow Us


HP Blog

HP Software Solutions Blog

Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation