HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Another Microsoft Zero Day! The HP TippingPoint Spin

dvlabs.gifLast weekend brought us another critical vulnerability in Microsoft Internet Explorer.  Tagged as CVE-2014-1776, this vulnerability is present in all versions of IE and is currently being exploited in the wild.  The following post contains information on HP TippingPoint DVLabs’ research techniques and response, as well as a unique recommendation from the Department of Homeland Security.

HP TippingPoint--Every second matters for security effectiveness

heartbleed lock.jpgHeartbleed might have given many an anxiety attack last week, but HP TippingPoint customers are protected. 

HP TippingPoint DVLabs--In a league of their own

dvlabs.gifNTP reflection attacks can create hundreds of gigabits of traffic within seconds. See how HP Security’s proactive creation of DV filters can stop those attacks.

Labels: HP| security

Heartbleed protection with HP TippingPoint

heartbleed.pngHeartbleed: It's sweeping the internet by storm. Here's what you can do to protect yourself now. 

Labels: HP| security

Learn to think like a bad guy at HP Discover 2014 in Las Vegas

silver bullet.jpgLooking for the silver bullet when it comes to cybersecurity? Heads up: There isn’t one. Learn how to beat the adversaries at their own game at HP Discover 2014 in Las Vegas—no silver bullet needed. 

Guest post by Stephanie Wisdom

HP Security contributor

Labels: HP| security

Proactive zero-day coverage from HP TippingPoint: CVE-2014-1761

A recent zero-day attack has been making the rounds—the vulnerability can be triggered via Microsoft Word, or Outlook using Word as the email viewer. See how HP TippingPoint proactively provided coverage as far back as December of 2012! 

Labels: HP| security

HP Government Summit security sessions encourage attendees to "Think like a bad guy"

photo 5.JPGHeld in the city that’s the very heart of the U.S. Government, security professionals converged to a room at the HP Government Summit 2014 to see what new technologies HP is using to escalate cybersecurity both in our government, and at large.

Labels: HP| security

Did you know: HP TippingPoint offers Zero-Day coverage to our customers

TP for march.jpgHP TippingPoint is leading the pack when it comes to zero-day filters. Read on to see the list of filters released in March!

Labels: HP| security

HP TippingPoint consolidates data centers for the win

sec intel.pngRecently, the HP TippingPoint team took on a customer that needed over 200 data centers consolidated to only 15. Here’s a data center consolidation for the ages.

Labels: HP| security

Standing at the crossroads of Cloud, Big Data, Mobility and Security? Head this way.

govsummit.jpgThe 4th Annual HP Government Summit is happening on April 2nd at the Ronald Reagan Building in Washington, D.C. If you're standing at the crossroads of Cloud, Big Data, Mobility and Security, head this way for clear direction!

Labels: HP| security

How to prevent vulnerabilities in WiFi access points

hacked.jpgVulnerabilities in consumer WiFi access points aren't new--but what can you do to ensure your WiFi isn't hacked?

HP Labs and HP TippingPoint collaborate to stop network attacks

What happens when two groups of security gurus put their minds together? Answer: A collaboration that can stop network attacks in their tracks!

Labels: HP| security

HP TippingPoint Advanced Threat API debuts at RSA 2014 Conference

HP announced the TippingPoint Advanced Threat application programming interface (API) at the RSA 2014 Conference on Monday, February 24th. 

Labels: HP| RSA| security

Trojan Horse Worked Against the Greeks, but it Cannot Work Against HP TippingPoint

Whether you are running an HP TippingPoint IPS or NGFW, the TippingPoint IPS is always at work for you. In this specific th.jpgcase, security intelligence was used to validate the threat and protect the retailer from a devastating breach.  Don’t let your organization be a modern day Troy!

Learn to think like a bad guy...one mission at a time

Are you BAD enough to be GOOD? Join us in the hunt at this year's RSA Conference. Prizes, fame, and notoriety are yours for the taking...

Labels: HP| RSA| security

Thinking like a 'bad guy' at RSA 2014 with HP Threat Central

threat central.jpgIt's a new year, and one of our resolutions is to help our customers rethink their security strategy. Keep reading to learn more.

Important Questions for Big Security Data

hp-HAVEn.jpgHAVEn is a big data toolbox; however, it’s what you can use it for that actually matters. This post asks a number of questions about how you can use big data to answer security questions that were never possible before. Using data to answer security questions instead of anecdotes is an important step forward for our industry. 

Security in the form of... a pizza box

"ShapeShifter"--have you heard about it? It's a new device that was developed to help stump hackers. Read more in this blog!

Labels: HP| RSA| security

HP TippingPoint--Putting security on the right track!


On January 21, 2014, HP had a big announcement! See how Swiss Federal Railways—the national railway of Switzerland—deployed HP TippingPoint technology to secure the national railway’s network infrastructure.


Malware from a universe far, far away

In 1977, Chewbacca and R2-D2 hid information from scrutiny, accessed systems that should have been barred to them, and exfiltrated secrets. Today, we'd call them hackers. Where's Obi-Wan when you need him?

Labels: HP| security

Insider Threat--Does it really affect my organization?

insider threats.jpgUnderstanding the insider threat to your organization is important. If you think you are not affected, you are wrong. Every organization, no matter the size, should be paying attention to the insider threat. The way you should be thinking about this is not if, but when it will happen within your company.

Labels: HP| security

Rethink your enterprise security and learn how to protect what matters

The world is constantly evolving and it is crucial that your security systems evolve as well. You need to have a sustainable approach to security and risk management.


If you are in APJ, we have a series of enterprise security events that you won’t want to miss. We are offering three “Protect what matters” events to help you understand the newest vulnerabilities and learn how to protect yourself.


Keep reading to learn how to attend one of these sessions.


Guest Post by Michelle Vu, HP Software APJ


Learn how to transform IT to create business value--with HP's Meg Whitman

meg webinar.jpgJoin us on January 8th, as Meg Whitman shares how to transform IT to create business value.


Tags: HP| security| Software

HP TippingPoint named a leader in Next-Gen Intrusion Prevention

ngips.jpgHP TippingPoint is pleased to announce our placement in the leader’s quadrant of the Intrusion Prevention System Magic Quadrant for the 9th consecutive year!

Tags: HP| security

Top questions to help you think like a cyber criminal

Screen Shot 2013-12-11 at 15.57.37.pngThese are questions I would like the answer to when evaluating a cyber criminal’s motivation, capability and likely, next-expected event. Thinking like a bad guy requires understanding them at a deeper level than just technology. This is a carry over from my last post on knowing your enemy. 

Tags: Defense| HP| security

Know Your Enemy – Not just what they are up to…

Screen Shot 2013-11-25 at 13.01.20.pngWhen you defend your enterprise you are defending against “someone” and WHO they are matters to HOW you best defend against them. What types of information can be useful to understanding your attackers?

Tags: Defense| HP| security

The top 3 things you need to know about ZDI

Over the last several weeks, we’ve received several questions about ZDI. In this
blog post, we answer the top 3 questions we get regarding the HP Security
Research’s program callzdi_logo.gifed Zero Day Initiative.

Did you know: DVLabs—Your secret security weapon

protect your network.jpgDid you know…that you have a secret security weapon at your disposal?  Psst…It’s HP DVLabs, and it’s one of the most effective ways to protect your network.


Guest post by TJ Alldridge

Product Marketing Manager
HP Enterprise Security Products

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.