HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Thinking like a 'bad guy' at RSA 2014 with HP Threat Central

threat central.jpgIt's a new year, and one of our resolutions is to help our customers rethink their security strategy. Keep reading to learn more.


Attack cybercrime head-on at RSA 2014

attacklifecycle2.jpgHP is ready to attack cybercriminals--are you? Get ready by attending these security sessions at RSA 2014!

Announcing HP Threat Central security intelligence platform

collaborative defense.pngAs attackers and their malicious attacks become more sophisticated, it becomes harder to stay one step ahead of them.  Enterprises are also spending an exorbitant amount of time and effort on repeat attacks.

 

Keep reading to find out how the latest security intelligence platform can help you identify threat trends in fewer steps.

The new era of security intelligence

BigSecurityforBigData.jpgBig Data is both a blessing and a curse.  Harvesting insight from ‘big data’ sources can unlock powerful intelligence about potential security threats.  And, you may already have the tools needed.  This article will look at two such tools:  HP ArcSight and HP Autonomy, explaining the fundamental premise behind using them together. Keep reading to find out how to harness the power of big data for information security.

HP introduces the new HP Reputation Security Monitor 1.5

HP conf room graphic.jpg

HP introduces the new HP Reputation Security Monitor 1.5, an update to a solution that integrates the power of two market-leading products:  HP ArcSight for SIEM and HP DVLabs for threat intelligence.  Now even more sophisticated attacks can be detected and blocked with new capabilities that provide greater insight and integration with other HP enterprise security tools.

The new world of security threat intelligence

HP man with camera compressed.jpgIn the advancing world of threat intelligence, focusing on the attacker’s communications and actions can provide greater ability to identify and block attacks before they do harm.  Such intelligence about the ‘bad guys’ requires expertise and investigation typical of the most engrossing spy novels.  Two of HP’s security experts share examples of the techniques they use and the insight they are able to achieve.  How you obtain this capability is the challenge.  Subscription services will play an important role in bringing this level of sophisticated threat intelligence within reach to a large number of enterprises.

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.