HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

How to talk to a female in InfoSec

boardroom.jpgInformation Security” is a male-dominated field—but I promise you, there ARE females out there! Read on to find out how to approach your female security colleagues. 

State of Security Operations 2015 Report

StateOfSecOps2015.pngLearn more about the State of Security Operations 2015 report, including: Key findings, customer examples, industry-specific statistics, and assessment methodology. 




What do the experts have to say about their SOC journey?

protect.jpgAre you thinking of building a security operations center (SOC)? Join hundreds of security experts at the 9th annual HP Protect conference to learn from other’s experiences in building and maturing their SOCs.  Best practices will be shared as well as undocumented lessons learned (don’t do this or you’ll regret it! stories).


Read on to see what sorts of SOC sessions and panels are being offered at HP Protect 2013.

5G/SOC: The NOW of security operations

SOC Generations.pngWhat generation of security does your organization utilize?  If your answer involves nuisance programs—it might just be time for an update.


This blog post discusses the five generations of security operations and what the next generation of security operations centers look like.

So, you want to build a Security Operations Center...

soc.pngHow much damage would a security breach cause for your organization?  A Security Operations Center provides your organization with centralized security monitoring and embedded operations to handle incidents and events of concern.


Find out how a Security Operations Center can power your organization and provide you with the additional protection you need. Keep reading to find out how to best integrate it into your system.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.