HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

7 habits of a successful SSA program

SSA.pngA Software Security Assurance (SSA) program, done right, can reduce risk for your organization. Here are 7 habits of successful organizations that have been uncovered over the years by our SSA experts. You can use these gems to make your program even more successful.

HP TippingPoint Protects Against Zero-Day Microsoft Internet Explorer Vulnerabilities

IE.pngOn July 20, 2015, the HP Zero Day Initiative (ZDI) publicly disclosed four new zero days found in Microsoft Internet Explorer that can lead to remote code execution. If you’re a HP TippingPoint customer, you’ve been protected for over five months!

HP Protect: 5 tracks and over 150 sessions!

protect 2015.gifBenefit from expert-led sessions and interactive discussions targeted at your specific security needs--all at HP Protect, September 1-4, in National Harbor, Maryland. 

Labels: Security events

Avoiding the Notorious 9: Protecting Cloud-based Data Against Threats

Jim reavis.jpgWhat are the “Notorious 9”? This is the term given by the Cloud Security Alliance (CSA) to the “top threats” to data security in the cloud. When it comes to moving to the cloud, data security is the number one objection that CSA hears from IT folks. How do you protect sensitive and proprietary data in a multitenant environment?


In this new blog series, CSA’s Jim Reavis will provide expert advice on how to avoid the dangers posed by each of the Notorious 9 threats. This first entry introduces Jim and the Notorious 9, and how CSA identified them. Subsequent blog entries will provide more details on each of the Notorious 9 and how to mitigate the threats.



Will the OPM hack usher in an era of risk-based compliance in the public sector? We hope so.

hack.jpgWith the recent OPM hack, many questions have been raised pertaining to the prevention of such attacks. Are hacks such as these making way for an era of risk-based compliance in the public sector? 


Guest post by Rob Roy, Public Sector Chief Technology Officer 
HP Enterprise Security Products


The new school of cyber security with HP TippingPoint

resort.jpgSeptember 1-4th, the best in the security industry will converge upon National Harbor, Maryland to discuss the new school of cyber security at HP Protect. With over 150 sessions to choose from, there’s something for everyone. Read this blog post for insight on a few HP TippingPoint sessions available to you!

Labels: Security events

HP Protect--Strength in numbers

strength in numbers _1.jpgSingularly, the bad guys can’t be stopped; but with a team behind you, they don’t have a chance. You need strength in numbers. Join HP Security at HP Protect--learn more...

Labels: Security events

Hang out with HP Security at Black Hat USA

blackhat.pngHP Security is headed to Vegas for Black Hat USA. Stop by and see us in booth 411, for a chance to talk shop, and to win some great prizes. 

Labels: Security events

Lateral movement: the key to any attack or escape

150610103412-escaped-ny-convicts-split-richard-matt-david-sweat-super-169 cnn.jpgWhether you are breaking out of prison or planning the perfect targeted attack you will need to get help from others, knowledge of when and where security is monitoring, a plan of attack, and a lot of luck. See how lateral movement is a key underlying component of each of these as we show how the two inmates escaped from prison because simple monitoring tools were missing.

HP 2015 Cyber Risk Report: Gains by determined adversaries

crr 4.jpgWelcome to Part 4 of a 7-part series, where will be discussing the key themes of the 2015 HP Cyber Risk Report.

6 ways to screw up a SIEM implementation

Working in a team that regularly tends to client SIEM installations; we do things like we set up a SIEM for the first time, tune a SIEM, and build security operations around a SIEM. Because of the breadth of clients and situations we work in, we have some good insights into what works and what doesn't work. Today we bring you our list of top mistakes when it comes to SIEM technology.

Outrunning the bear - 5 critical ways to take a more collaborative approach to security

ourtunning the bear.JPG

Companies still rely heavily on fairly traditional methods of data security like password management and acceptable use policies to protect their information from unauthorized access. Unfortunately these traditional approaches to security are no longer enough in the era of the data breach. A new survey from IDG Research indicates that IT security professionals remain more reactive than proactive when implementing data security — a mindset that could leave them dangerously underprepared to respond effectively in the event of a breach, possibly letting small incidents be leveraged into something far more sinister. At the same time, however, even the best data security operations centers only have the resources to focus on the highest priority threats. This white paper offers insights from the IDG Research survey and explores how organizations can be more proactive and efficient in understanding the threats they face and how to apply that to their data security efforts.


For more information and to download the white paper, read the article.

What is a "critical friend" and why do you need one?

handshake.jpgDo you have a critical friend? You should. Read on to learn what a critical friend is and how they can contribute to your success.

3 ways to make big data small data

big data.pngBig data is overwhelming. Here are 3 ways to make the vast amounts of data smaller and more manageable.

Tags: siem

HP Principles of Software Security seminar

big-data.jpgJoin us on June 23 or June 25 for a 2.5 hr seminar where we will demonstrate some of our best-in-class software security technologies.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.