HP Unveils Expanded Enterprise Security Solutions for the Instant-On Enterprise

HP Unveils Expanded Enterprise Security Solutions for the Instant-On Enterprise

Comprehensive security services and technology portfolio delivers insight and protection against modern cyberthreats

(PALO ALTO, Calif., Sept. 12, 2011) HP today announced its expanded Enterprise Security Solutions portfolio, designed to help enterprises establish and execute a comprehensive security strategy that addresses threats and potential liabilities resulting from the rise of mobility, cloud computing and social media.

Cyberthreats have become more sophisticated, persistent and unpredictable. New research conducted on behalf of HP demonstrates that the volume and complexity of security threats has continued to escalate. More than 50 percent of senior business and technology executives surveyed believe that security breaches within their organizations have increased during the last year. Nearly 30 percent responded that they experienced a security breach by unauthorized internal access, while 20 percent responded that they had experienced an external breach.

Faced with these challenges, organizations need to establish a more sustainable approach to managing security and risk. The HP Enterprise Security Solutions framework addresses this need by delivering overarching information security management capabilities coupled with modern security operations centers and technologies that provide actionable security intelligence.

The expanded portfolio includes new capabilities to help enterprises assess, transform, manage and optimize their security investments.

Organizations today are quickly realizing the importance of a comprehensive risk management strategy to securing assets across their corporate infrastructures and protecting corporate reputation,” said Jan Zadak, executive vice president, Global Sales and Enterprise Marketing, HP. “HP’s extended security portfolio provides the protection that enterprises require, while providing customers, employees, partners and consumers with instant access to the right enterprise assets without compromising risk.”

Assessing security environments to identify and prioritize risks

HP is now offering a one-day Enterprise Security Discovery Workshop based on the HP Enterprise Security Solutions framework, which enables clients to identify the interaction required between information management and security operations. The workshop helps clients understand their organizations’ vulnerabilities to external and internal threats, identify the critical success factors for a secure enterprise, and create tailored transformation programs based on best practices.

In addition, HP released the HP Digital Vaccine Labs’ (DVLabs) Cyber Security Risks Report, which offers clients a detailed look at vulnerability, threat and attack data for the first half of 2011. This semiannual report helps enterprises to understand the threat landscape so they can assess and adjust their security postures.

Transforming security

By combining market-leading capabilities from ArcSight, an HP company; Fortify, an HP company; and HP TippingPoint, HP has established a foundation for the unified approach to enterprise security. The HP Security Intelligence and Risk Management platform offers advanced correlation, application protection and network defense technology to protect applications and IT infrastructures from sophisticated cyberthreats.

Supported by a wide network of partners, the platform helps organizations reduce risk from existing infrastructures, provide security testing and remediation for existing applications, and establish a foundation to deploy future systems within a secure environment.

To help clients use this transformational approach to risk management, HP announced a full complement of new risk- and security-related offerings:

  • HP ArcSight Express 3.0 delivers market-leading correlation, log management and user-activity monitoring to improve an organization’s ability to rapidly detect and prevent cyberthreats. It is the first Security Information and Event Management (SIEM) product powered by the breakthrough Correlation Optimized Retention and Retrieval Engine (CORR-Engine).
  • HP Reputation Security Monitor provides HP ArcSight clients with an advanced, real-time list of known bad IP and DNS addresses to combat attacks that exploit web application vulnerabilities.
  • HP Fortify Software Security Center suite is the only comprehensive application security testing solution available on-premises or on-demand that scales to identify vulnerabilities in thousands of applications.
  • HP TippingPoint Web Application Digital Vaccine (WebAppDV) 2.0 service extends protection to commercial and custom-built online applications with real-time identification of vulnerabilities in web applications, and delivery of virtual patches until a fix can be developed. The updated WebAppDV 2.0 filters with Adaptive Web Application Firewall (WAF) Technology help discriminate between normal network activity and malicious traffic. HP also offers advanced protection and simplified migration from open source-based IPS solutions with the Digital Vaccine Toolkit (DVToolkit) 2.0 for Snort® as well as improved transparency into the state of a security environment with the HP TippingPoint Reporting and Archiving powered by Logger software.

Managing security transformation

To help organizations manage their security transformation programs, adopt the best security technologies and choose from flexible sourcing models, HP also introduced new Enterprise Services:

  • HP Information Security Management (ISM) services deliver a comprehensive approach to managing security policies and processes, enabling clients to make informed security decisions and minimize risks.
  • HP Enterprise Cloud Service (ECS) – End Point Threat Management protects desktop and notebook PCs and servers against viruses, malware, spyware and intrusions by blocking unauthorized communication and preventing installation of unwanted programs.
  • HP Security Information and Event Management (SIEM) services collect and log security-relevant events to provide a unified view of the security activity across an enterprise as well as generating predefined reports to demonstrate compliance with policies and regulations.
  • HP Application Security Testing-as-a-Service identifies and closes security vulnerabilities in the application layer with code scanning and web penetration services that reduce the risk, time and investment needed to deliver software security assurance.

Optimize with continually monitoring to identify improvements

HP Secure Boardroom is a comprehensive, enterprise-level online portal that combines existing sources of security data into one central system. Senior-level executives and CIOs are provided greater insight and actionable information that facilitates business-led strategic investment and management decisions.

HP gives Instant-On Enterprises the power to protect data, defend resources, manage risk and drive innovation. More information about HP’s new solutions and services is available at www.hp.com/go/risk2011.

HP’s premier client event, HP DISCOVER, takes place Nov. 29 – Dec. 1 in Vienna, Austria. The event showcases how organizations can get started on their Instant-On Enterprise journeys.

About HP

HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. The world’s largest technology company, HP brings together a portfolio that spans printing, personal computing, software, services and IT infrastructure at the convergence of the cloud and connectivity, creating seamless, secure, context-aware experiences for a connected world.

More information about HP (NYSE: HPQ) is available at http://www.hp.com.

Source: HP

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

What is the 12/12 Program?

This program is designed to better handle the thousands of requests we receive from people looking to submit articles. The 12/12 program is the commitment of 12 articles delivered over a 12-month period.  

Wait! What if I just want to submit one article?

Our popular pay as you go sponsorship program provides the flexibility to submit as you wish and is designed for all budgets.

Contributors

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

What Ever Happened To Google Glass?

What Ever Happened To Google Glass?

What Ever Happened to Google Glass? It was supposed to be the next big thing in tech so where did it go? Last year you could not go anywhere without hearing about some insane new use for the product and now it seems to have vanished in a plume of smoke. A Lackluster Rollout Back

Posted on by

Big Data

To Have and Have Not: Big Data Initiatives In Developing Countries

To Have and Have Not: Big Data Initiatives In Developing Countries

Big Data Initiatives In Developing Countries The poor of the developing countries are becoming increasingly connected, to the point where they too are part of the Big Data revolution that’s happening across the globe. It didn’t come with laptops, though, as some supposed it would. Whereas it costs a fortune to connect broadband to a

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data in Your Garden Big Data and IoT initiatives are springing up all across the globe, making cities, protesters–and just about everything else–smarter. However, thus far there’s been little attention paid to the interactions between these bizarre technologies and living things other than humans. Biology, that is, human biology is one field where Big

Who Holds the Key to the City: Big Data and City Management

Who Holds the Key to the City: Big Data and City Management

Big Data and City Management Cities like New York, Madrid, and especially Rio de Janeiro are augmented with Big Data-powered initiatives that range from combating crime with predictive analytics (New York & Madrid) to providing real-time data for improved management. Although Big Data is no panacea and is mainly used in conjunction with a greater

Internet of Things

Where’s the Capital of the Internet of Things?

Where’s the Capital of the Internet of Things?

Where’s the Capital? We all know the capitals of fashion are London, New York and Paris, while the capital of film is Hollywood (or Bollywood!) – but what’s the new capital of the internet? Specifically, the internet of things? The answer – according to new research by Ozy – might surprise you. It’s not Tokyo, Seoul,

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities And Big Data As Anthony Townsend argues in his SMART CITIES, even though the communications industry has changed beyond recognition since its inception, the way we consume power has remained stubbornly anachronistic. The rules of physics are, of course, partially to blame, for making grid networks harder to decentralize, as opposed to communication

Aggregated News

Popular News Sources

Q&A: Intel’s Take on Chinese Startups, Innovation

Q&A: Intel’s Take on Chinese Startups, Innovation

Intel’s venture-capital arm on Tuesday said it would be investing $28 million in five Chinese startups that work on new technologies ranging from wearable devices to iris detection. It is Intel Capital’s first infusion from a $100 million China fund launched in April … Read the source article at WSJ Blogs About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized

Smart glasses: Prototypes ‘look to rival Google Glass’

Smart glasses: Prototypes ‘look to rival Google Glass’

With an increasing number of firms looking to enter the wearable technology market, smart glasses were in abundance at this year’s Ceatec electronics show in Japan. New designs featured fitness trackers and technology that could act as a speedometer … Read the source article at BBC – Homepage About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as

Microsoft to enter the STRUGGLE of the Human Wrist

Microsoft to enter the STRUGGLE of the Human Wrist

It’s not just a thumb war, it’s total digit war The battle for the future of the human wrist entered a new phase on Monday after it was claimed that tech goliath Microsoft is planning to release its own wearable computer in the coming weeks.…Read the source article at The Register About Latest Posts Follow