HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Trojan Horse Worked Against the Greeks, but it Cannot Work Against HP TippingPoint

Whether you are running an HP TippingPoint IPS or NGFW, the TippingPoint IPS is always at work for you. In this specific th.jpgcase, security intelligence was used to validate the threat and protect the retailer from a devastating breach.  Don’t let your organization be a modern day Troy!

Learn to think like a bad guy...one mission at a time

Are you BAD enough to be GOOD? Join us in the hunt at this year's RSA Conference. Prizes, fame, and notoriety are yours for the taking...

Labels: HP| RSA| security

Thinking like a 'bad guy' at RSA 2014 with HP Threat Central

threat central.jpgIt's a new year, and one of our resolutions is to help our customers rethink their security strategy. Keep reading to learn more.

Important Questions for Big Security Data

hp-HAVEn.jpgHAVEn is a big data toolbox; however, it’s what you can use it for that actually matters. This post asks a number of questions about how you can use big data to answer security questions that were never possible before. Using data to answer security questions instead of anecdotes is an important step forward for our industry. 

Security in the form of... a pizza box

"ShapeShifter"--have you heard about it? It's a new device that was developed to help stump hackers. Read more in this blog!

Labels: HP| RSA| security

Target-style Breaches—Change your security response time from months to minutes


The average response time to a serious threat incident is currently counted in months. Learn how to utilize HP ArcSight, coupled with CO3 Systems, to change your response time to minutes.


Tags: ArcSight| HP| security
Labels: HP| security

HP TippingPoint--Putting security on the right track!


On January 21, 2014, HP had a big announcement! See how Swiss Federal Railways—the national railway of Switzerland—deployed HP TippingPoint technology to secure the national railway’s network infrastructure.


1 in 4 Security Operations Organizations Are Ineffective

soso.jpgDetailed in the newly released State of Security Operations report, HP finds that 1 in 4 security operations organizations are ineffective.  Read on to see a summary of findings from the report and the top 5 reasons why security operations organizations are missing the mark.

Labels: ArcSight| HP| security

Malware from a universe far, far away

In 1977, Chewbacca and R2-D2 hid information from scrutiny, accessed systems that should have been barred to them, and exfiltrated secrets. Today, we'd call them hackers. Where's Obi-Wan when you need him?

Labels: HP| security

Insider Threat--Does it really affect my organization?

insider threats.jpgUnderstanding the insider threat to your organization is important. If you think you are not affected, you are wrong. Every organization, no matter the size, should be paying attention to the insider threat. The way you should be thinking about this is not if, but when it will happen within your company.

Labels: HP| security

Learn how to transform IT to create business value--with HP's Meg Whitman

meg webinar.jpgJoin us on January 8th, as Meg Whitman shares how to transform IT to create business value.


Tags: HP| security| Software

HP TippingPoint named a leader in Next-Gen Intrusion Prevention

ngips.jpgHP TippingPoint is pleased to announce our placement in the leader’s quadrant of the Intrusion Prevention System Magic Quadrant for the 9th consecutive year!

Tags: HP| security

Top questions to help you think like a cyber criminal

Screen Shot 2013-12-11 at 15.57.37.pngThese are questions I would like the answer to when evaluating a cyber criminal’s motivation, capability and likely, next-expected event. Thinking like a bad guy requires understanding them at a deeper level than just technology. This is a carry over from my last post on knowing your enemy. 

Tags: Defense| HP| security

HEMLOCK methodology - Identify security threats faster

HEMLOCK2.pngSIEM technology…it’s great at detecting potential threats, but at the end of the day, there is no substitute for effective human analytics. Read on to learn how to apply human analytics to increase your security organization's effectiveness.

Tags: HP| security
Labels: Hemlock| HP| security| SIEM

Know Your Enemy – Not just what they are up to…

Screen Shot 2013-11-25 at 13.01.20.pngWhen you defend your enterprise you are defending against “someone” and WHO they are matters to HOW you best defend against them. What types of information can be useful to understanding your attackers?

Tags: Defense| HP| security

The top 3 things you need to know about ZDI

Over the last several weeks, we’ve received several questions about ZDI. In this
blog post, we answer the top 3 questions we get regarding the HP Security
Research’s program callzdi_logo.gifed Zero Day Initiative.

Top NGFW Features: Security Management System

NGFW.pngWelcome to our second blog post in the “Top NGFW Features” series. In this post, we’ll discuss Security Management System and how it simplifies the management of NGFW and NGIPS.


Guest Post by TJ Alldridge
Product Marketing Manager
HP Enterprise Security Products

Tags: HP| security

Top NGFW Features: Granular Application Visibility

In this blog series, we will discuss the top 5 features of NGFW. We kick off the series by introducing you to granular application visibility and control.

Tags: HP| security

Know Thyself – Cyber Defense Doctrine

Its time to open a conversation on effective defensive security doctrine. Let's take back the initiative from our opponents!

Tags: HP| security
Labels: appsec| ArcSight| ESM| HP| security

HP sponsors Texas A&M’s 2nd Annual Coding Gig

tamu.jpgHP Enterprise Security sponsored some brilliant minds at Texas A&M in the 2nd Annual Coding Gig.  Read on to learn more about the big data challenge given to these students and their results.

Tags: appsec| HP| security

It’s the ‘Witching Hour’…for Cyber Security

For many of us in the U.S., October means Fall weather, the changing of the leaves, and Halloween. But October is also Cyber Security Awareness Month.


Keep reading to uncover what gobilns and ghouls you can uncover...

Labels: cybercrime| HP| security

Detecting Fraud with ArcSight ESM

digital hoodie.jpgHP ArcSight ESM has long been known to monitor for security incidents and to track high-risk users. What you may not know, is that ArcSight ESM also proves very useful in identifying fraud. So what is the key to identifying and designing fraud-use cases? Read on to find out.

Tags: HP| security

CVE-2013-3893: A study in TippingPoint DVLabs vulnerability coverage

Microsoft recently released details of a critical vulnerability that was being actively exploited in the wild. We thought this would be a great opportunity to share our approach to filtering these types of critical vulnerabilities… 


Guest Post by Steve Povolny

Manager, HP TippingPoint Digital Vaccine Team

Cybercrime is on the rise—Is your organization protected?

security webinar.jpgRegardless of the size of your corporation, cybercrime is taking a toll on your bottom line. So, you have to ask yourself: Is your organization protected?


Guest Post by Frank Mong
VP/GM of HP Security Solutions

Labels: cybercrime| HP| security

As cost of cybercrime rises, security intelligence solutions save average of $4M annually

cybercrime infographic.pngToday, HP today made public the results from the 4th annual study on the cost of cybercrime—a global study conducted by the Ponemon Institute and sponsored by HP Enterprise Security Products.


Guest post by Frank Mong
VP/GM of HP Security Solutions

Labels: cybercrime| HP| security

Have you reached your tipping point when it comes to enterprise security?

Frost and Sullivan Reported Code Execution.pngUnfortunately, security breaches are simply part of daily life right now. And while your enterprise organization is demanding the need for security, today’s IT specialists continue to struggle with the challenge of protecting the integrity and confidentiality of your enterprise’s data. Unfortunately IPS appliances are no longer enough. The next-generation IPS provides higher level prevention. 

HP introduces HAVEn to combat $4 billion cyber-theft in Big Data space

photo.JPGHP announced at HP Discover 2013, the new big data solutions along with security portfolio to combat $4 billion cyber theft in big data space. The acronym HAVEn  is built with best of HP’s technology such as Hadoop, AutonomyVertica and Enterprise Security represented by Arcsight and "n" apps built on this platform, all representing various aspects of big data.


Big data is unmanageable and complex data comprised of machine and human generated data. This is a perfect platform to manage that big data from all perspective including analytics, reporting, and security. Autonomy is the best big data solutions for human generated data, ArcSight has been managing the machine generated big data since 2007 with introduction of CORRe, Hadoop is a great place to consolidate all of this data with which you can use any analytical tool such as Vertica to perform real-time, near-real-time, and historical analysis of all type of data.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
Top Kudoed Posts
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.