HP White Papers
IT white papers and technology resources for implementing and optimizing IT strategy, enterprise solutions, technology products, and more.
The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape. It provides information you need to effectively plan your cyber security strategy and deploy your defenses.
3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats
This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight-a Security Information and Event Management (SIEM) solution from HP-applies these techniques to spot and stop attacks.
Protecting Your Mid-Size Business from Today's Security Threats
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack.
This e-book examines the security challenges unique to mid-size companies and the steps you should take to protect your business. Read it to learn:
* Why mid-size companies are just as vulnerable to cyber attack as the big brands
* The tactics cyber thieves use
* The differences between security and compliance
* How security solutions meet the needs of mid-size organizations and can protect your business
The Importance of Reputation
A study by Verizon finds 86% of security breaches come from the outside. Spotting cyber attacks in your network means identifying the signatures of known threats. Reputation data takes that one step farther by identifying communications coming from or going to known bad actors based on their reputations. This white paper explains:
* How reputation data makes security more proactive
* How to evaluate reputation security services
* How HP ArcSight Security Information and Event Management (SIEM) applies reputation data to prevent exfiltration of data from infected internal machines to sites with bad reputations
Read this white paper now for more details.
HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction
Turkey's Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months-far too long. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management.
Gartner 2013 ALM Magic Quadrant Report
This Gartner Group report is a must-read to gain a better understanding of the automated software quality assurance market today. It examines key market trends and drivers, and provides a comprehensive overview of ASQ vendors, including a detailed evaluation of various vendor strengths and cautions. Download this essential report now.
Unifying Secuirty Operations
Agile enterprises know that the way to quickly identify and react to threats to the business is to break down operational siloes by using collaborative processes, relationships, and shared resources. This business white paper outlines how a unified approach across security and operations is an invaluable solution.
Seagate Case Study
Seagate Technology has successfully managed risks associated with transitioning mission-critical email service from internal platform to a third-party cloud, and has achieved numerous business and IT benefits. HP Application Performance Management software has enabled the company to manage cloud-computing SLAs and also quickly triage availability and performance issues. Read on.
Finding agility in the age of applications
Agile promises to help application teams deliver higher-quality software faster and to make software more closely aligned with business requirements. But many organizations still find it difficult to implement true Agile. This white paper reveals how to extend Agile throughout the enterprise and make your business more nimble. Read on.
CSO QuickPulse IT Security: Midsize Businesses Face Enterprise
The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize companies often lack the sophisticated defenses of large enterprises, many fail to recognize their vulnerability and are overconfident in their ability to spot and counter threats.
This white paper uses survey data to examine the security posture of midsize companies. Read it to learn:
* How respondents view their security defenses
* How many experience security breaches
* Why midsize companies need effective security information management
* The four important insights about midsize company security
10 Ways to Build a Better Big Data Security Strategy
When it comes to enterprise security, Big Data is part of the problem-and it is part of the solution. Collecting vast amounts of data from disparate sources-including the cloud-exposes the enterprise to new threats and creates vast new stores of data you must protect. But you can apply Big Data techniques for finding insight in mountains of data to find security threats as well.
eBook: Security for a faster world
Business today is driven by a global economy that generates an unprecedented volume and variety of data with alarming velocity. The information in this dossier can help your security team adapt to a world that's evolving faster than ever before
Not Your Father's IPS: SANS Survey on Network Security Results
With cyber crime on the rise, many organizations rely on intrusion prevention systems (IPS) to detect and stop attacks. But to counter increasingly sophisticated threats, IPS is evolving into next-generation IPS (NGIPS). What drives the need for these new systems? And how are they different from earlier IPS?
Why You Need a Next-Generation Firewall
Next-generation (NG) firewalls, with features such as deep packet inspection, intrusion detection, application identification, and granular control, are important weapons in the battle against hacking and malware. Mobile applications have taken the overall scheme of corporate IT, and NG firewalls enable organizations to incorporate full-stack inspection to support intrusion prevention. This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations.