HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

4 Steps for Putting Together Good User Stories

IBackToTheBasics.pngn the SIEM world, the terms User Story and Use Case are used as we tune the SIEM knobs and dials to more effectively find breaches. See how you can dig further into User Stories and what makes them good…or bad.

Firewalls more critical than ever

greatfirewallofchina.jpgEveryone complains about firewalls, but nobody is abandoning them, either. So how critical are they? The results of a recent survey may surprise you. Read the article for more information.

Capture the Flag at Black Hat USA and win some seriously cool stuff

IMG_2948.JPGCan you hack it? HP Enterprise Security Products wants to find out in our Capture the Flag hacking contest at Black Hat USA. We’re giving away some seriously cool prizes like Ironkey secure storage flash drives, several slices of Raspberry PI, and quadcoptors. You know you want a quadcoptor. Visit us at Booth #911 during Black Hat USA in Las Vegas from August 5th-7th,2014 for the HP Security Capture the Flag Event. And for more information and details regarding the contest, read the article.

Rethink your enterprise security and learn how to protect what matters

The world is constantly evolving and it is crucial that your security systems evolve as well. You need to have a sustainable approach to security and risk management.


If you are in APJ, we have a series of enterprise security events that you won’t want to miss. We are offering three “Protect what matters” events to help you understand the newest vulnerabilities and learn how to protect yourself.


Keep reading to learn how to attend one of these sessions.


Guest Post by Michelle Vu, HP Software APJ


Did you know: DVLabs—Your secret security weapon

protect your network.jpgDid you know…that you have a secret security weapon at your disposal?  Psst…It’s HP DVLabs, and it’s one of the most effective ways to protect your network.


Guest post by TJ Alldridge

Product Marketing Manager
HP Enterprise Security Products

How to implement the kill chain use case methodology in your SIEM

killchain.pngThe newly published technical whitepaper HP SIEM Kill Chain use case methodology explains what a Cyber Kill Chain is and how the HP SIEM Kill Chain methodology can be applied for the authoring of use cases.  The whitepaper showcase the benefits of using a kill chain methodology over standalone use cases.


Read on to learn more about how you can apply the kill chain methodology with your ArcSight SIEM.

5 reasons why security is harder today than a decade ago

DC cherry blossoms.pngAfter speaking with other security professionals I have noticed that everyone seems to have a similar perspective: that application security seems harder now than it was ten years ago. What do you think?


Continue reading to find out my thoughts and what I think has led to these sentiments.

ArcSight, Fortify and TippingPoint training at HP Protect 2013

Did you know there are two full days of in-depth training available at the HP Protect conference?  Keep reading to learn about what training is offered and how you can sign up!

Actionable security intelligence you can “actually” use

CRR info.pngHave you seen it yet? Have you looked through the HP 2012 Cyber Risk Report? If not, don’t worry. I have a “cheat sheet” infographic in this blog. Keep reading to sneak a peek…

2 ways to coordinate application, information and network security

by Norm Follet, Director of Solutions Design and Demo Group


Overview.pngEnterprise security is stronger with a coordinated approach. Here is an explanation of how HP Enterprise Security products TippingPoint, ArcSight and Fortify can work in concert to provide a defense in depth solution.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.