HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Adapt or Die (Emergence of Software-Defined Security Models)

Johnpirc.pngWhat will happen to Software-defined Data Centers in the face of Cloud, Saas and other flexible models if they don't adapt? 

Guest post by: John Pirc, Director, HP Security Research

Author (Blackhatonomics, Cybercrime and Espionage)

Tags: Gartner| security

Jump Start Application Security Initiatives with SaaS

HP Application Security's own Caleb Sima, Chenxi Wang of Forrester Research, and Vinnie Liu of Stach and Liu give a great presentation about why corporations with seemingly insurmountable application security issues would do well to implement a SaaS solution. Tight timelines, limited budgets, and a lack of security experts? Compliance deadlines and hundreds of applications to secure? Learn how companies can leverage SaaS to meet these challenges.


Register for the presentation at:



Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.