Leading Security Intelligence & Risk Management Enterprise Platform
HP is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect today’s applications and IT infrastructures from sophisticated cyber threats. Visit HP Enterprise Security at: www.hpenterprisesecurity.com.
Cloud Access Security—Keep Sensitive Data Safe and Compliant in the CloudAlbert Biketi, VP and general manager of HP Atalla and HP Security VoltageThe exploding use of cloud applications like Office 365, Google Apps, and SalesForce CRM is giving enterprises unprecedented agility. But it also brings new challenges in ensuring data security and demonstrating compliance. In this webinar HP Atalla shows why many enterprises are turning to HP Cloud Access Security Protection platform to protect sensitive data in SaaS cloud deployments.Read more >
The exploding use of cloud applications like Office 365, Google Apps, and SalesForce CRM is giving enterprises unprecedented agility. But it also brings new challenges in ensuring data security and demonstrating compliance. In this webinar HP Atalla shows why many enterprises are turning to HP Cloud Access Security Protection platform to protect sensitive data in SaaS cloud deployments.
Join Chris Westphal, Head of Product Marketing at Adallom, and Andy Radle, Cloud-Security Architect at HP, as they describe how you can enable a comprehensive security solution for your cloud applications.
Cyber criminals continue to steal data and interrupt business at alarming rates. The average annualized cost of cyber crime is $7.6 million per company per year, with a range of $500K to a staggering $61 million, according to a global study by the Ponemon Institute. That’s an increase in cost of 9 percent over last year’s global results. The most costly criminal activities come from malicious insiders, denial-of-service and web-based attacks – and no industry is immune. It’s not a matter of if you will be attacked, but when. Fortunately, there are ways to fight back.
Watch this short video to learn:
- How proactive security measures can save millions of dollars
- What seven security technologies are key to winning the cyber crime war
- Where to get more information and guidance
In the world of information security, the past isn’t dead; it isn’t even the past. The 2015 edition of HP’s annual security-research analysis reveals a threat landscape still populated by old problems and known issues, even as the pace of new developments quickens. In 2014, well-known attacks and misconfigurations existed side-by-side with mobile and connected devices (the “Internet of Things”) that remained largely unsecured. As the global economy continues its recovery, enterprises continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.
The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.
Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
A webinar with Gartner VP Mark Nicolett, provides solid tips to reduce your vulnerability.
The recent data breach cost Target more than $60 million in recovery costs. And even that has been exceeded at other companies that have fallen victim to advanced targeted cyber attacks.
View the webinar to learn:
•How to present a hard target to hackers
•How advanced persistent attacks work
•How the SOC and NOC can work together
•Best practices for security information and event management (SIEM)
To combat advanced adversaries, we must improve our detection and response capabilities. This presentation will cover emerging processes and technologies in security operations that allow organizations of all sizes to improve their detection and response effectiveness. The capabilities presented here have been used by HP to detect and remove advanced threats for organizations across the globe.
Many organizations have been building client-server and web applications for some time, and quite a few have reached a good level of maturity in regards to building security into their SDLC. Yet that traditional model of securing applications can’t fully address the security challenges presented by mobile and cloud infrastructures and the applications built around them. The business benefits of ubiquitous and quick data access (that come with mobile and cloud) are obvious, but the security issues are very real.
Join this discussion to find out how internal development and security groups can update their software security assurance processes so that they are embracing AND securing mobile and cloud solutions.
Software Security Assurance (SSA) programs take many forms across various industries. What remains constant across all programs and industries is the challenge of choosing appropriate measurements. We often ask: “Is this the right metric?” “Am I collecting enough data?” “What should be reported to my managers and senior executives?” In this webinar we help you answer those questions, and we also show you how the right metrics mature your SSA program and keep it focused on business priorities.