HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Enterprise network security: What’s new for the week of May 25, 2015

small-weeklytp.pngHere’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week of May 25, 2015.

Breaking out of the real world into your network

SHAWSHANK-ESCAPE.jpgWhen it comes to monitoring ports and protocols, are you monitoring all the points of entry to your network?  Like an old school prison break, using the front door is too obvious.  Bad guys today are using multi-vector attack schemes to access your network, targeting weak points in your perimeter that you may not be monitoring. 

HP Security is Vegas bound!

vegas 1.jpgHP Discover kicks off next week in Las Vegas! Are you ready to expand your cybersecurity horizons? HP Security will be there—ready to give you the details on what you can do to beat the bad guys at their own game. Read this post for a printable list of all security sessions! 

Labels: Security Events

Enterprise network security: What’s new for the week of May 18, 2015

small-weeklytp.pngHere’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week of May 18, 2015.

Labels: TippingPoint

Think like a bad guy – 5 “Bad guy” personas and motivations

badguy.pngWe routinely advise the industry that they need to “think like a bad guy” in order to develop and implement better security. But what does that mean? Who are the bad guys and why do they do what they do?

Labels: security

Enterprise network security: What’s new for the week of May 11, 2015

small-weeklytp.pngHere’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week of May 11, 2015.

Labels: TippingPoint

Can these 4 strategies prevent 85% of targeted high risk vulnerabilities?

cert.JPGThe United States Computer Emergency Readiness team (CERT) recently released a list of the top 30 targeted high-risk vulnerabilities. The list confirms what the 2015 Cyber Risk Report showed…that unpatched software is a huge problem. What’s offered is four strategies that claim to resolve 85% of those targeted high risk vulnerabilities. But are those 4 strategies really that effective? And does that even matter? Read the article for more information.

Protection for May 2015 Microsoft bulletins now available for HP TippingPoint customers

HP-TippingPoint.pngHP TippingPoint’s Digital Vaccine package includes coverage for the following Microsoft Security Bulletins released on May 12, 2015.

Labels: TippingPoint

Expand your security knowledge in Vegas

track descriptions.jpgHP Discover kicks off the first week of June in Las Vegas, Nevada! HP Security will be there—ready to give you the scoop on what you can do to beat the adversaries at their own game.

Labels: Security Events

Enterprise network security: What’s new for the week of May 4, 2015


entsec news_small.jpgHere’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week May 4, 2015.

Insights from HP Security's best and brightest

cio.JPG

Visit the Enterprise CIO Forum, a platform that features some truly outstanding work by some of the best and brightest security minds that HP Security has to offer. Composed of a group of former CISOs and executive security practitioners within HP who help develop our security strategies, their opinions bear the wealth only real-world experience can provide, and are worth checking out.  For access to their insights, read the article.   

Labels: security

Enterprise network security: What’s new for the week of April 27, 2015

entsec news_small.jpgHere’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week April 27, 2015.

Does your vendor have your back? Not to worry--HP TippingPoint does.

vuln ahead.jpgThere’s a serious command injection vuln out there that’s attacking SOHO routers. If you’re an HP TippingPoint IPS customer, you’re safe!

Labels: TippingPoint

Hunting Today: What you can do with what you already have

hunting today.pngIf you are like most organizations, you have spent thousands, if not millions, building up your security organizations. See how you can use your existing security technologies to hunt for cyber criminals and breaches.

Labels: ArcSight

This one time at RSA…

See my top 5 observations from this year’s RSA2.jpg

RSA convention in San Francisco.

Labels: RSA

Introducing the new school of cyberdefense - HP at RSA 2015

booth.PNGIf the headlines are any indication, the old methods of security are simply not working. It’s time for a change. At RSA 2015 in San Francisco, HP Security announced details of new partnerships, initiatives, and releases that highlight our commitment to giving organizations their best chance of securing their data in an era of ever increasing and more damaging attacks. The old school of cyber defense emphasized securing infrastructure—the endpoints, the network, the servers—and attempted to restrict data flows. However, data needs to run freely to power modern organizations. Protecting something as fluid as data presents unique challenges.  While building on security fundamentals such as monitoring events and securing the perimeter, organizations must shift their focus to protecting what matters most -- the interaction between the users, the applications and the data that carry the sensitive information adversaries target. 

 

For more information about how HP is leading industry to the new school of cyberdefense, read the article.

HP Introduces User Behavior Analytics as part of security analytics portfolio

dashboard4.pngHP today announced HP ArcSight User Behavior Analytics (UBA), a new offering that gives companies visibility into user behavior, delivering a simple, efficient way to detect malicious users within the enterprise.
 
UBA gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. It helps detect and investigate malicious user behavior, insider threat and account misuse. Therefore, it enables organizations to detect breaches before significant damage occurs by finding the adversary faster.

Going beyond information sharing with HP Threat Central

threatcentral.jpgCollaboration: One of the most high-powered weapons in a company’s arsenal of defense. At HP, we understand how information-sharing is fundamental to a comprehensive security strategy. Read this article for more information. 

New HP ArcSight harnesses predictive power of user behavior

New HP ArcSight offering harnesses the predictive power of user behavior to rapidly detect and mitigate risks.

Labels: SIEM

HP Atalla data-centric security impact expands

HP’s recent acquisition of Voltage Security demonstrates our commitment to data-centric security; and today, HP announced a new partnership that furthers that commitment!

Fend off threats from mobile apps with HP Fortify

New mobile application security service offers free reputation database, along with behavioral and privacy analysis for iOS, Android, and company-owned apps.

Why not simply defend your software vulnerabilities?

facebook cover.jpgWhy waste precious time, money and effort to monitor a vulnerable application using a web application firewall that may only be guessing? For software vulnerabilities - known and unknown - why not #simplydefend it.. 

 

Meet the App Defender!  Come to the HP booth on Tuesday at 11:40 to learn about this new kind of defense. And, on Tuesday at 2:40, get a sneak peek into the study conducted by the SANS Institute that compares RASP and WAF technology.  

 

Follow The App Defender on Facebook for the latest news: TheAppDefender

 

Enterprise network security: What’s new for the week of April 13, 2015

entsec news_small.jpgIt's finally Friday--and you know what that means...Here’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week April 13, 2015.

HP TippingPoint DVLabs provides threat protection for April 2015 Microsoft Update Tuesday bulletins

HP-TippingPoint.pngMarch Madness may be over here in the U.S., but the madness never stops when it comes to network security. HP TippingPoint’s Digital Vaccine package includes coverage for the following Microsoft Security Bulletins released on April 14, 2015.

Labels: TippingPoint

4 Steps for Putting Together Good User Stories

IBackToTheBasics.pngn the SIEM world, the terms User Story and Use Case are used as we tune the SIEM knobs and dials to more effectively find breaches. See how you can dig further into User Stories and what makes them good…or bad.

ArcSight Activate Framework - FREE!

Activavte.pngDid you know that the HP ArcSight Activate Framework is available for FREE on Protect724 for ArcSight users? Read on for information on how to access it and what benefits it can bring to your organization.

Labels: ArcSight| SIEM
Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.