HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Standing at the crossroads of Cloud, Big Data, Mobility and Security? Head this way.

govsummit.jpgThe 4th Annual HP Government Summit is happening on April 2nd at the Ronald Reagan Building in Washington, D.C. If you're standing at the crossroads of Cloud, Big Data, Mobility and Security, head this way for clear direction!

Labels: HP| security

How to prevent vulnerabilities in WiFi access points

hacked.jpgVulnerabilities in consumer WiFi access points aren't new--but what can you do to ensure your WiFi isn't hacked?

HP Labs and HP TippingPoint collaborate to stop network attacks

What happens when two groups of security gurus put their minds together? Answer: A collaboration that can stop network attacks in their tracks!

Labels: HP| security

HP TippingPoint Advanced Threat API debuts at RSA 2014 Conference

HP announced the TippingPoint Advanced Threat application programming interface (API) at the RSA 2014 Conference on Monday, February 24th. 

Labels: HP| RSA| security

Trojan Horse Worked Against the Greeks, but it Cannot Work Against HP TippingPoint

Whether you are running an HP TippingPoint IPS or NGFW, the TippingPoint IPS is always at work for you. In this specific th.jpgcase, security intelligence was used to validate the threat and protect the retailer from a devastating breach.  Don’t let your organization be a modern day Troy!

Learn to think like a bad guy...one mission at a time

Are you BAD enough to be GOOD? Join us in the hunt at this year's RSA Conference. Prizes, fame, and notoriety are yours for the taking...

Labels: HP| RSA| security

Thinking like a 'bad guy' at RSA 2014 with HP Threat Central

threat central.jpgIt's a new year, and one of our resolutions is to help our customers rethink their security strategy. Keep reading to learn more.

Important Questions for Big Security Data

hp-HAVEn.jpgHAVEn is a big data toolbox; however, it’s what you can use it for that actually matters. This post asks a number of questions about how you can use big data to answer security questions that were never possible before. Using data to answer security questions instead of anecdotes is an important step forward for our industry. 

Security in the form of... a pizza box

"ShapeShifter"--have you heard about it? It's a new device that was developed to help stump hackers. Read more in this blog!

Labels: HP| RSA| security

Target-style Breaches—Change your security response time from months to minutes


The average response time to a serious threat incident is currently counted in months. Learn how to utilize HP ArcSight, coupled with CO3 Systems, to change your response time to minutes.


Tags: ArcSight| HP| security
Labels: HP| security

HP TippingPoint--Putting security on the right track!


On January 21, 2014, HP had a big announcement! See how Swiss Federal Railways—the national railway of Switzerland—deployed HP TippingPoint technology to secure the national railway’s network infrastructure.


1 in 4 Security Operations Organizations Are Ineffective

soso.jpgDetailed in the newly released State of Security Operations report, HP finds that 1 in 4 security operations organizations are ineffective.  Read on to see a summary of findings from the report and the top 5 reasons why security operations organizations are missing the mark.

Labels: ArcSight| HP| security

Could Behavioral Analytics Have Stopped Edward Snowden?

Behavioral analytics can be used to identify malicious activities by insiders.snowden.png

Could it have been used to stop Edward Snowden?


Read on to learn what behavioral analytics is and how it can be used to detect rouge insiders.

Malware from a universe far, far away

In 1977, Chewbacca and R2-D2 hid information from scrutiny, accessed systems that should have been barred to them, and exfiltrated secrets. Today, we'd call them hackers. Where's Obi-Wan when you need him?

Labels: HP| security

Insider Threat--Does it really affect my organization?

insider threats.jpgUnderstanding the insider threat to your organization is important. If you think you are not affected, you are wrong. Every organization, no matter the size, should be paying attention to the insider threat. The way you should be thinking about this is not if, but when it will happen within your company.

Labels: HP| security

Rethink your enterprise security and learn how to protect what matters

The world is constantly evolving and it is crucial that your security systems evolve as well. You need to have a sustainable approach to security and risk management.


If you are in APJ, we have a series of enterprise security events that you won’t want to miss. We are offering three “Protect what matters” events to help you understand the newest vulnerabilities and learn how to protect yourself.


Keep reading to learn how to attend one of these sessions.


Guest Post by Michelle Vu, HP Software APJ


Learn how to transform IT to create business value--with HP's Meg Whitman

meg webinar.jpgJoin us on January 8th, as Meg Whitman shares how to transform IT to create business value.


Tags: HP| security| Software

HP TippingPoint named a leader in Next-Gen Intrusion Prevention

ngips.jpgHP TippingPoint is pleased to announce our placement in the leader’s quadrant of the Intrusion Prevention System Magic Quadrant for the 9th consecutive year!

Tags: HP| security

Top questions to help you think like a cyber criminal

Screen Shot 2013-12-11 at 15.57.37.pngThese are questions I would like the answer to when evaluating a cyber criminal’s motivation, capability and likely, next-expected event. Thinking like a bad guy requires understanding them at a deeper level than just technology. This is a carry over from my last post on knowing your enemy. 

Tags: Defense| HP| security

HEMLOCK methodology - Identify security threats faster

HEMLOCK2.pngSIEM technology…it’s great at detecting potential threats, but at the end of the day, there is no substitute for effective human analytics. Read on to learn how to apply human analytics to increase your security organization's effectiveness.

Tags: HP| security
Labels: Hemlock| HP| security| SIEM

Know Your Enemy – Not just what they are up to…

Screen Shot 2013-11-25 at 13.01.20.pngWhen you defend your enterprise you are defending against “someone” and WHO they are matters to HOW you best defend against them. What types of information can be useful to understanding your attackers?

Tags: Defense| HP| security

The top 3 things you need to know about ZDI

Over the last several weeks, we’ve received several questions about ZDI. In this
blog post, we answer the top 3 questions we get regarding the HP Security
Research’s program callzdi_logo.gifed Zero Day Initiative.

Did you know: DVLabs—Your secret security weapon

protect your network.jpgDid you know…that you have a secret security weapon at your disposal?  Psst…It’s HP DVLabs, and it’s one of the most effective ways to protect your network.


Guest post by TJ Alldridge

Product Marketing Manager
HP Enterprise Security Products

5 questions for which every CIO should have answers

fraud.jpgIn today's new threat landscape what you don't know can hurt you. Moving from an IT issue to a board issue, security breaches are a huge problem, and the board is asking questions. Here are the answers you need...

Security breach response time: Get it right, and save money

co3.pngThe longer it takes you to respond to a security breach, the more it will cost your organization.  Read on to learn more about an upcoming free webinar, that will explain how security monitoring can be integrated with incident response programs to reduce the cost of an attack.

Top NGFW Features: Security Management System

NGFW.pngWelcome to our second blog post in the “Top NGFW Features” series. In this post, we’ll discuss Security Management System and how it simplifies the management of NGFW and NGIPS.


Guest Post by TJ Alldridge
Product Marketing Manager
HP Enterprise Security Products

Tags: HP| security

Top NGFW Features: Granular Application Visibility

In this blog series, we will discuss the top 5 features of NGFW. We kick off the series by introducing you to granular application visibility and control.

Tags: HP| security

Know Thyself – Cyber Defense Doctrine

Its time to open a conversation on effective defensive security doctrine. Let's take back the initiative from our opponents!

Tags: HP| security
Labels: appsec| ArcSight| ESM| HP| security
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.