HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Advanced analytics made easy with HAVEn

12691859-old-treasure-map-on-wooden-background.jpgBuried within the volumes of your data lies a treasure—just waiting to be found. But without a map or an “X” that marks the spot, how do you know where to look for the elusive business value (aka treasure) of your data?

Labels: discover| haven

Big Data Security Analytics Part 6: 3 Keys to Success

The first step in successfully solving the security big data problem is to approach the challenge with your eyes open and a realistic set of expectations. You cannot load all your data into a pot, have it boil for a while and expect it will report back with Edward Snowden in handcuffs. Work to solve all the tactical challenges along the way and you will find the strategic value. 

Labels: haven

Big Data Security Analytics Part 5: The Challenges of Successful BDSA

Realizing value in security analytics can a bumpy road.  Read on to see issues that teams commonly struggle with as they build a security analytics capability on the back of big security data.

Labels: haven

Big Data Security Analytics Part 4: Visualization is Key

Finding the right questions to ask of the data requires an ongoing exploration of data.  Making sense of the answers often requires visualization.  How you use your visualization tools with BDSA can be the key to success.  Read on to see how.

Labels: haven

Big Data Security Analytics Part 3: Data science & Putting Structure to the Problem

It’s Part 3 of the Big Data Security Analytics series! Now is the time to discuss how to answer security questions based on the disciplines of data science.

Labels: ArcSight| haven

Important Questions for Big Security Data

hp-HAVEn.jpgHAVEn is a big data toolbox; however, it’s what you can use it for that actually matters. This post asks a number of questions about how you can use big data to answer security questions that were never possible before. Using data to answer security questions instead of anecdotes is an important step forward for our industry. 

HP introduces HAVEn to combat $4 billion cyber-theft in Big Data space

photo.JPGHP announced at HP Discover 2013, the new big data solutions along with security portfolio to combat $4 billion cyber theft in big data space. The acronym HAVEn  is built with best of HP’s technology such as Hadoop, AutonomyVertica and Enterprise Security represented by Arcsight and "n" apps built on this platform, all representing various aspects of big data.


Big data is unmanageable and complex data comprised of machine and human generated data. This is a perfect platform to manage that big data from all perspective including analytics, reporting, and security. Autonomy is the best big data solutions for human generated data, ArcSight has been managing the machine generated big data since 2007 with introduction of CORRe, Hadoop is a great place to consolidate all of this data with which you can use any analytical tool such as Vertica to perform real-time, near-real-time, and historical analysis of all type of data.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.