HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Hunting Today: What you can do with what you already have

hunting today.pngIf you are like most organizations, you have spent thousands, if not millions, building up your security organizations. See how you can use your existing security technologies to hunt for cyber criminals and breaches.

Labels: ArcSight

HP Introduces User Behavior Analytics as part of security analytics portfolio

dashboard4.pngHP today announced HP ArcSight User Behavior Analytics (UBA), a new offering that gives companies visibility into user behavior, delivering a simple, efficient way to detect malicious users within the enterprise.
UBA gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. It helps detect and investigate malicious user behavior, insider threat and account misuse. Therefore, it enables organizations to detect breaches before significant damage occurs by finding the adversary faster.

New HP ArcSight harnesses predictive power of user behavior

New HP ArcSight offering harnesses the predictive power of user behavior to rapidly detect and mitigate risks.

Labels: ArcSight

4 Steps for Putting Together Good User Stories

IBackToTheBasics.pngn the SIEM world, the terms User Story and Use Case are used as we tune the SIEM knobs and dials to more effectively find breaches. See how you can dig further into User Stories and what makes them good…or bad.

ArcSight Activate Framework - FREE!

Activavte.pngDid you know that the HP ArcSight Activate Framework is available for FREE on Protect724 for ArcSight users? Read on for information on how to access it and what benefits it can bring to your organization.

Labels: ArcSight| SIEM

Is it stupid to "Think like a bad guy"?

think like a bad guy.pngI don't think that hackers are lone wolf pack, but they collaborate, follow a methodology, and an attack life cycle that increases their chances many times. The internet is filled with SDLC products, tools, and testing methodology for attackers to build great malware and test it through various security tools.


While all the good guys are busy competing against each other, the bad guys are all collaborating. There are multiple groups of attackers who find the vulnerabilities, who do research, who infiltrate, discover critical assets, and exfiltrate with data/ IP/ money. All these are people are different and you can never trace back to them as most transactions happen openly in black market websites.

HP ArcSight Logger launches mobile app for monitoring on-the-go

03-dashboard-login.jpgHP is really excited to announce the HP ArcSight Logger mobile app for iPhone and iPad. The operation is actually VERY familiar to anyone who has used the normal Web interface with the dashboards. All we are doing is using the REST API to login, access, retrieve and display these dashboards. You can of course customize and change these (from the Logger web interface), but the Apps are designed to just display and view the data. Its simple, easy and VERY straightforward to use.


Search for HP Logger on Apple App Store for iPhone and iPad...

SIEM, machine learning, & Analytics; Better together

medium.pngSIEM is evolving; It is a Cat and a Mouse game with the bad guys. It’s no just cyber criminals who are in the mix, we have state actors and hactivists too. Their means may be different but their methodology is similar.


Is HP ArcSight ready for this challenge? Absolutely yes. ArcSight has evolved SIEM and is currently on 6th generation platform that can consume up to 10 TB of data a day, perform search in full-text english at 2 billion events per second, and analyze 13 billion events in a handful of seconds and create a visualization of trends from a variety of different data types.



What is new with HP ArcSight SIEM (ArcSight ESM 6.8c update on ESM 6.5c)

HP announced few months ago, a new version of its market-leading security information and event management (SIEM) solution, HP ArcSight ESM. Leveraging enhanced performance capabilities, the new update provides customers with the ability to analyze billions of events per day and greatly accelerate the time it takes to identify and prioritize security threats.




5 biggest data breaches of 2014

2014 data breaches.GIFAs we welcome 2015 with new resolution and goals, let us take a moment to remember 2014 and see what were the biggest data breaches. Some of them were attacked as early as 2013, but this was the impact in 2014.


The top 5 data breaxches were:

  1. Adobe : 152 million records stolen
  2. eBay: 145 million records stolen
  3. JP Morgan Chase: 76 million records stolen
  4. Target: 70 million records stolen
  5. Home Depot: 56 million records stolen

Webinar: HP and Paladion speak about security operations through ArcSight Logger

paladion webinar invite 2.GIFArcSight Logger 6.0 is the fastest search engine on the planet for machine data today. This universal log management solution collects, stores, and analyzes all of your Big Data for security event management.  Join us for a free webinar on how ArcSight Logger unifies your entire IT data through a unique technology called normalization and categorization, and then stores and analyzes years’ worth of data for multiple use cases.



HP ArcSight partners with Guidance Software to identify the most critical threats

guidance.GIFHP ArcSight partners with Guidance Software to identify the most critical threats. The new bundled solution is designed for small to medum sized organizations that are both in entry-level mode for security and the ones that have plans to build sophisticated SOC. HP ArcSght Express is a high performance SIEM soluton that correlates securty events in real-time to detect threats. When you combine the best of both worlds such as auto-priorization of events and high performance SIEM, organizations get a simple and powerful automated solutons to combat cyber threats.

Identify and monitor ShellShock vulnerability through HP ArcSight content pack

batch 4.GIFOur Professional Services team has done a huge amount of work to help in this vey quickly by building content pack that will help you identify ShellShock vulnerability and monitor the batch bug. We are very proud to make this available to our HP ArcSight community, quickly.


The content is primarily based on based on two rules:


  1. /All Rules/Public/Shellshock/Sysdig Shellshock Exploit Detected
  2. /All Rules/Public/Shellshock/Shellshock Bash Vulnerability Detected


The Sysdig Shellshock Exploit Detected rule looks for events from the Sysdig utility to identify devices as they are probed or attacked with the Shellshock exploit.


The Shellshock Bash Vulnerability Detected rule looks for events where one of the Shellshock vulnerabilities (CVE-2014-6271, CVE-2014-7169 or Nessus - 14272) is referenced.


The Shellshock dashboard gives an overview of the recent Shellshock events reported, as well as a listing of the assets that have been tagged with one of the Shellshock vulnerabilities.




Don't be Shell Shocked! HP ArcSight appliance does not use CGI


Shellshock.jpgIf you are one of the 10,000 ArcSight customers, follow these steps to safeguard from Shell Shock vulnerability through HP ArcSight.


  1. Install and configure sysdig, an open source utility used to monitor and analyse system state activity
  2. Configure RHEL where ArcSight ESM is installed to prepare to push the ShellShock content
  3. Apply the sysdig flexconnector that will parse events from sysdig
  4. Install ShellShock content pack from ArcSight support
  5. ArcSight is ready to monitor logs for potential attacks and exploits



HP ArcSight Logger for David and Goliath

logger shipment.JPG

 15 tons of ArcSight Logger was shipped to a large enterprise IT the same day a small healthcare company in India bought Logger to manage for just 25 users. HP ArcSight shipped its log management solution for both David and Goliath the same day.


We have been overwhelmed with the positive response we are getting for our brand new HP ArcSight Logger 6.0 that we released last week. You can read about the all-new Logger on this post, but just to summarize it is a universal log management solution that has the best performance to price in the market.

Demo of the all-new static correlation functionality with HP ArcSight Logger 6.0

The all new HP ArcSight Logger has many new features including the brand new static correlation through file look up. It means that you simply download a csv file with records and Logger can correlate the search data with the file lookup. Unlike SIEM solution that does real-time correlation of security events across the devices, Logger does static correlation. Check out these video demos built by Paul Brettle who is our security architect for Logger.


Introducing all-new HP ArcSight Logger 6.0, bringing you the best performance/ price

02-Dashboard---intrusions.jpgHP today introduced HP ArcSight Logger 6.0, the latest release of its universal log management solution that unifies collection, storage, and analysis of machine data to consolidate security and compliance. A core part of the HP ArcSight leading Security Information and Event Management (SIEM) portfolio, HP ArcSight Logger 6.0 offers enhanced scalability to handle eight times more data at 10 times higher performance than the previous version(1) to deliver continuous monitoring and high-speed contextual forensic investigation capabilities.

HP Protect--It's time to network with your security peers

protec 2014.pngHP Enterprise Security is dedicated to helping you build a proactive, intelligence-based risk management environment; attending the HP Protect event is only the beginning. Read this blog for more info on 2 of the track keynotes that you can attend.

Fill out the 'Security Analytics and Intelligence' Survey and shape the future of security industry

SANS.GIFFill out the 'Security Analytics and Intelligence' Survey and shape the future of security industry.


In 2013 SANS conducted its first analytics and intelligence survey. In this followup survey, SANS 2014 survey derive deeper understanding of the functional role of intelligence and analytics in the enterprise security management infrastructure. This will also further delve into which tools are implemented, the role of outside third-party service providers and whether or not intelligent analysis is improving an organization's ability to detect, defend and investigate attacks in their networks.

HP Protect--Which security sessions will you attend?

protec 2014.pngHP Protect is right around the corner, and there are so many sessions to choose from--over 150, to be exact. Read this blog to see a glimpse of what we're offering, and find the link to the full session catalog! We'll see you in D.C.!

Security Operations Maturity: The Sweet Spot

On a maturity scale of 0 to 5, you should aim for a 3? That is exactly right.SOCInfographic.png

Read on to find the sweet spot of security operations maturity in this new infographic.

Tags: siem| SIOC| SOC
Labels: ArcSight

Characteristics of a successful SOC

SOC fail.jpgDo you know the fastest path to building a capable SOC? HP has accumulated the largest dataset of its kind to answer that exact question. Here are the top 10 do’s and don’ts of a successful SOC.


A guest post by JC Zapata, HP Security PMM

Labels: ArcSight

What does it take to create a security operations capability?

WProtect_2014_Banner_Blu_RGB_72_MN.pngant to learn what it takes to create a security operations capability? Don’t miss this opportunity to learn the ins and outs of making your security organization successful with the “Security Operations Workshop” at HP Protect 2014.

Labels: ArcSight

HP ArcSight introduces all-in-one SIEM virtual appliance

express geo.pngHP ArcSight recently introduced an all-in-one security incident and event management (SIEM) virtual appliance to enable simple, rapid deployment of security analytics. As the threat landscape grows increasingly complex, the appliance detects threats and attacks in real-time – providing security professionals with insight into security events through a single intuitive interface. Pre-built rules, reports, and dashboards bring clarity to security and compliance analytics – offering valuable intelligence to keep your organization safe.

Labels: ArcSight

HP ArcSight is named a leader for SIEM in the Gartner MQ 2014

gartner mq 2014.pngMore than a decade in the leaders quadrant – and there’s no slowing down. HP ArcSight is a Security Information and Event Management (SIEM) leader in the Gartner Magic Quadrant (MQ). HP ArcSight is named a leader again, for 11th year in a row. 



Labels: ArcSight

How HP Enterprise Security Products confronts the security industry’s communication gap

commgap355x209.jpgTwo of the greatest security challenges that organizations face are discovery of vulnerabilities and communication of results.  One way HP Enterprise Security Products (HP ESP) is confronting these issues is via our product integrations.

Read on to learn more about how we're bringing together different security technologies to create a holistic method of security that realistically deals with how attacks occur in the real world. 

HP’s Cyber Defense Center: A new frontier of innovation for enterprise security

world.jpgAfter analyzing over 90 Security Operations Centers and accumulating the largest dataset of its kind, HP has taken industry best practices and lessons learned and applied them to our very own Cyber Defense Center (CDC). Learn more in the article.

A guest post by JC Zapata, HP Security PMM

Labels: ArcSight

HP Enterprise Security Products on tour!

IMG_1199.JPGHP Enterprise Security Products is rolling out a series HP Enterprise Security User Forums. The first stop is in Boston, MA on June 17th. This is not only a great opportunity to hear HP ESP’s comprehensive philosophy regarding how to secure your organization, but also a chance to earn CISSP credits at the same time.  To register for the event, visit the Boston User Group registration page.  And for more information about the agenda and our focus, read the entire article.

Viva Las Vegas! HP Enterprise Security Products represent at HP Discover 2014

discpng.pngAfter a year of record setting data breaches and critical vulnerabilities, there’s no denying in 2014 that security is a topic of concern. It should be no surprise, then, that security is of high importance at this year’s HP Discover event and a key part of HP’s ongoing strategy. Key security sessions include an examination of how companies need to rethink their security mindset and start developing the strategies necessary to combat highly organized and dangerous real world adversaries and a discussion regarding what the latest vulnerability research reveals about the current vulnerability landscape. For more information about those sessions and the host of other security events occurring during HP Discover, read the article.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
Top Kudoed Posts
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.