HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Fend off threats from mobile apps with HP Fortify

New mobile application security service offers free reputation database, along with behavioral and privacy analysis for iOS, Android, and company-owned apps.

Labels: Fortify

HP WebInspect: Poodle check now available

no poodle.jpgHP WebInspect has a check for the latest SSLv3 protocol vulnerability--Poodle. Fortify customers may obtain via Smartupdate now.

Labels: Fortify

Don't miss the Bad Guy Lair at HP Protect!

credit-cards-security_coll.jpgWant to see how credit card breaches happen? How the Internet of Things gets hacked, or how your mobile device can be compromised? Then head over to the Bad Guy Lair at HP Protect. We aren't the bad guys, but we'll show you how to think like one. 

HP Protect--Which security sessions will you attend?

protec 2014.pngHP Protect is right around the corner, and there are so many sessions to choose from--over 150, to be exact. Read this blog to see a glimpse of what we're offering, and find the link to the full session catalog! We'll see you in D.C.!

Beat the bad guys at their own game: Attend HP Protect to build your plan

protect 0214.pngNo one knows more about security flaws than the bad guys.To succeed, security professionals need to be ahead of the game. Collaborate with the good guys at HP Protect--where you'll learn how to think like a bad guy, and beat the adversaries at their own game. 

HP Enterprise Security Products on tour!

IMG_1199.JPGHP Enterprise Security Products is rolling out a series HP Enterprise Security User Forums. The first stop is in Boston, MA on June 17th. This is not only a great opportunity to hear HP ESP’s comprehensive philosophy regarding how to secure your organization, but also a chance to earn CISSP credits at the same time.  To register for the event, visit the Boston User Group registration page.  And for more information about the agenda and our focus, read the entire article.

Expand your security knowledge with HP Enterprise Security at HP Discover

discover image 2.pngHP Discover kicks off next week in Las Vegas! Are you ready to expand your cybersecurity horizons? HP Enterprise Security Products will be there—ready to give you the scoop on what you can do to beat the adversaries at their own game. 

Viva Las Vegas! HP Enterprise Security Products represent at HP Discover 2014

discpng.pngAfter a year of record setting data breaches and critical vulnerabilities, there’s no denying in 2014 that security is a topic of concern. It should be no surprise, then, that security is of high importance at this year’s HP Discover event and a key part of HP’s ongoing strategy. Key security sessions include an examination of how companies need to rethink their security mindset and start developing the strategies necessary to combat highly organized and dangerous real world adversaries and a discussion regarding what the latest vulnerability research reveals about the current vulnerability landscape. For more information about those sessions and the host of other security events occurring during HP Discover, read the article.

Defensive Strategy - The 4 Principles of Active Defense

Screen Shot 2014-05-21 at 9.38.55 AM.pngWhen you move beyond the tactics, techniques and procedures of defense into the operational or strategic levels of defending your enterprise, there are 4 key principles to keep in mind. These are the strategic principles of defense and they have been tested for centuries by strategic thinkers.

The top 3 things you need to know about ZDI

Over the last several weeks, we’ve received several questions about ZDI. In this
blog post, we answer the top 3 questions we get regarding the HP Security
Research’s program callzdi_logo.gifed Zero Day Initiative.

HP sponsors Texas A&M’s 2nd Annual Coding Gig

tamu.jpgHP Enterprise Security sponsored some brilliant minds at Texas A&M in the 2nd Annual Coding Gig.  Read on to learn more about the big data challenge given to these students and their results.

Tags: appsec| HP| security

Announcing HP ArcSight Application View

Arcsight application view.pngWith the evolution of threats targeting applications as the weakest link in the security

ecosystem, it’s becoming more and more difficult to keep your information safeguarded. See how HP ArcSight Application View can help.

ArcSight, Fortify and TippingPoint training at HP Protect 2013

Did you know there are two full days of in-depth training available at the HP Protect conference?  Keep reading to learn about what training is offered and how you can sign up!

HP updates 'HP ArcSight' portfolio to enhance big data security analytics

big security.pngHP today announced updates to its HP ArcSight portfolio, offering enterprises unified security analytics for big data with expanded identity monitoring to accelerate the detection of persistent threats.


Enterprises must proactively anticipate intrusions and hasten the detection of risks in order to protect valuable assets. To successfully identify and remediate occurrences of prolonged unauthorized network access, also known as advanced persistent threats (APTs), organizations must be prepared to:


  • Handle and process information at high velocity, volume and variety
  • Analyze structured and unstructured data both inside and outside their network
  • Monitor events in cloud, mobile and virtual environments
  • Automatically take action once a threat has been detected


Top 10 reasons to register for HP Protect 2013

There were about 800 reasons (attendees) for attending the HP Protect’12 events. We are anticipating more than 1,000 security professionals to attend HP Protect 2013 this year starting September 16, 2013.











2 ways to coordinate application, information and network security

by Norm Follet, Director of Solutions Design and Demo Group


Overview.pngEnterprise security is stronger with a coordinated approach. Here is an explanation of how HP Enterprise Security products TippingPoint, ArcSight and Fortify can work in concert to provide a defense in depth solution.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.