HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Why is your SOC stuck in a rut?

SOC Maturity over time.pngThere’s a definite pattern of cyber defense maturity. Curly Henry, Managing Principle of HP’s Security Intelligence and Operations Consulting Practice, sits down with this blogger to explain.

Actionable security intelligence you can “actually” use

CRR info.pngHave you seen it yet? Have you looked through the HP 2012 Cyber Risk Report? If not, don’t worry. I have a “cheat sheet” infographic in this blog. Keep reading to sneak a peek…

Combating professional security threats

Discover2013.pngHow will you recover from a security breach? How can you prevent a re-attack? How can you stay one step ahead of the criminals who are looking to capitalize from your data and information?


Art Gilliland, Senior Vice President and General Manager, HP Enterprise Security Products will discuss the current security climate and ways to protect from an attack.  Keep reading to find out how you can hear his presentation and learn about arming your organization.  


Guest post by Kim Lock, Editor, IT Experts Community

The new era of security intelligence

BigSecurityforBigData.jpgBig Data is both a blessing and a curse.  Harvesting insight from ‘big data’ sources can unlock powerful intelligence about potential security threats.  And, you may already have the tools needed.  This article will look at two such tools:  HP ArcSight and HP Autonomy, explaining the fundamental premise behind using them together. Keep reading to find out how to harness the power of big data for information security.

The new world of security threat intelligence

HP man with camera compressed.jpgIn the advancing world of threat intelligence, focusing on the attacker’s communications and actions can provide greater ability to identify and block attacks before they do harm.  Such intelligence about the ‘bad guys’ requires expertise and investigation typical of the most engrossing spy novels.  Two of HP’s security experts share examples of the techniques they use and the insight they are able to achieve.  How you obtain this capability is the challenge.  Subscription services will play an important role in bringing this level of sophisticated threat intelligence within reach to a large number of enterprises.

Act now and release the innovation drive in the business

More than ever before, it is imperative that an organisation becomes agile, flexible and dynamic enough to innovate ‘change.’  A key driver of change should and could be the IT organisation that delivers innovation by providing the business with the ability to react and exploit opportunities.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.