HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Back to the Basics: Defining a Use Case for SIEM

BackToTheBasics.pngWelcome to our introductory, "Back to the Basics" blog. We are a team focused on innovation but it is hard to embrace innovation unless you have the basics down. And thus, we start this blog series. We begin our series speaking about SIEM use cases, because without understanding use cases, it’ll be tough to understand and explain all the great work you are doing with your SIEM.

Tags: ArcSight| siem

Why is your SOC stuck in a rut?

SOC Maturity over time.pngThere’s a definite pattern of cyber defense maturity. Curly Henry, Managing Principle of HP’s Security Intelligence and Operations Consulting Practice, sits down with this blogger to explain.

State of Security Operations 2015 Report

StateOfSecOps2015.pngLearn more about the State of Security Operations 2015 report, including: Key findings, customer examples, industry-specific statistics, and assessment methodology. 




HP TippingPoint provides protection for new Microsoft bulletins - December 2014




This month, Microsoft released seven update bundles to fix two dozen security vulnerabilities in Windows and supported software. Our latest Digital Vaccine package includes coverage for the Microsoft Security Bulletins released on December 9, 2014...

HP TippingPoint provides protection for new Microsoft bulletins—November 2014

TP.jpgThe second Tuesday of each month, Microsoft announces security updates to fix critical vulnerabilities in their software. This was a big month, as Microsoft announced 16 updates on their November 11th Bulletin.  

Could Behavioral Analytics Have Stopped Edward Snowden?

Behavioral analytics can be used to identify malicious activities by insiders.snowden.png

Could it have been used to stop Edward Snowden?


Read on to learn what behavioral analytics is and how it can be used to detect rouge insiders.

Actionable security intelligence you can “actually” use

CRR info.pngHave you seen it yet? Have you looked through the HP 2012 Cyber Risk Report? If not, don’t worry. I have a “cheat sheet” infographic in this blog. Keep reading to sneak a peek…

Combating professional security threats

Discover2013.pngHow will you recover from a security breach? How can you prevent a re-attack? How can you stay one step ahead of the criminals who are looking to capitalize from your data and information?


Art Gilliland, Senior Vice President and General Manager, HP Enterprise Security Products will discuss the current security climate and ways to protect from an attack.  Keep reading to find out how you can hear his presentation and learn about arming your organization.  


Guest post by Kim Lock, Editor, IT Experts Community

The new era of security intelligence

BigSecurityforBigData.jpgBig Data is both a blessing and a curse.  Harvesting insight from ‘big data’ sources can unlock powerful intelligence about potential security threats.  And, you may already have the tools needed.  This article will look at two such tools:  HP ArcSight and HP Autonomy, explaining the fundamental premise behind using them together. Keep reading to find out how to harness the power of big data for information security.

The new world of security threat intelligence

HP man with camera compressed.jpgIn the advancing world of threat intelligence, focusing on the attacker’s communications and actions can provide greater ability to identify and block attacks before they do harm.  Such intelligence about the ‘bad guys’ requires expertise and investigation typical of the most engrossing spy novels.  Two of HP’s security experts share examples of the techniques they use and the insight they are able to achieve.  How you obtain this capability is the challenge.  Subscription services will play an important role in bringing this level of sophisticated threat intelligence within reach to a large number of enterprises.

Act now and release the innovation drive in the business

More than ever before, it is imperative that an organisation becomes agile, flexible and dynamic enough to innovate ‘change.’  A key driver of change should and could be the IT organisation that delivers innovation by providing the business with the ability to react and exploit opportunities.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.