HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Heartbleed: Joy and Joanna discuss how HP Security Products stopped the bleeding

Join Joy Forsythe, HP Security Research; and Joanna Burkey, HP TippingPoint DVLabs, as they discuss the Heartbleed bug and how HP Fortify and HP TippingPoint were abljoy and joanna.jpge to quickly protect customers.

The HP Security Research group details Iranian cyber capabilities

cybarwar.jpgThe HP Security Research group (HPSR) has done some incredible work in detailing the cyber capabilities of Iran. It’s fascinating stuff.  Cyber warfare is simply the best way for smaller nations or groups with a malevolent agenda who could never compete with  a superpower military to level the playing field.  And while Iran might not have the tanks and aircraft to match the western world, they definitely have the keyboards. Read the full article for more information.

Thinking like a 'bad guy' at RSA 2014 with HP Threat Central

threat central.jpgIt's a new year, and one of our resolutions is to help our customers rethink their security strategy. Keep reading to learn more.


Attack cybercrime head-on at RSA 2014

attacklifecycle2.jpgHP is ready to attack cybercriminals--are you? Get ready by attending these security sessions at RSA 2014!

The new era of security intelligence

BigSecurityforBigData.jpgBig Data is both a blessing and a curse.  Harvesting insight from ‘big data’ sources can unlock powerful intelligence about potential security threats.  And, you may already have the tools needed.  This article will look at two such tools:  HP ArcSight and HP Autonomy, explaining the fundamental premise behind using them together. Keep reading to find out how to harness the power of big data for information security.

HP introduces the new HP Reputation Security Monitor 1.5

HP conf room graphic.jpg

HP introduces the new HP Reputation Security Monitor 1.5, an update to a solution that integrates the power of two market-leading products:  HP ArcSight for SIEM and HP DVLabs for threat intelligence.  Now even more sophisticated attacks can be detected and blocked with new capabilities that provide greater insight and integration with other HP enterprise security tools.

The new world of security threat intelligence

HP man with camera compressed.jpgIn the advancing world of threat intelligence, focusing on the attacker’s communications and actions can provide greater ability to identify and block attacks before they do harm.  Such intelligence about the ‘bad guys’ requires expertise and investigation typical of the most engrossing spy novels.  Two of HP’s security experts share examples of the techniques they use and the insight they are able to achieve.  How you obtain this capability is the challenge.  Subscription services will play an important role in bringing this level of sophisticated threat intelligence within reach to a large number of enterprises.

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.