HP White Papers
IT white papers and technology resources for implementing and optimizing IT strategy, enterprise solutions, technology products, and more.
The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat landscape. It provides information you need to effectively plan your cyber security strategy and deploy your defenses.
Why You Need a Next-Generation Firewall
Next-generation (NG) firewalls, with features such as deep packet inspection, intrusion detection, application identification, and granular control, are important weapons in the battle against hacking and malware. Mobile applications have taken the overall scheme of corporate IT, and NG firewalls enable organizations to incorporate full-stack inspection to support intrusion prevention.
Mainstay ROI - Does Application Security Pay?
Does Application Security Pay? Actually, it does! Mainstay reviewed the Software Security Assurance solutions of 17 organizations and found financial benefits as high as $2.4M from efficiency and productivity improvements. Download this whitepaper to see how you and your enterprise might benefit from better software security.
SANS - Survey on Application Security Programs
How do your peers secure their mobile apps? The SANS Institute surveyed 488 respondents on the state of their application security programs and practices. Download this report to see how mature and effective these programs are as well as what tools they use and how they justify budget.
SANS - Securing Web Applications Made Simple and Scalable
The weakest point in modern networking infrastructures is often not the low-level hardware and software running on the servers, but the web applications that are developed and hosted upon them. According to the SANS survey on application security, poor understanding of web security needs on the part of developers also limit the effectiveness of application security programs.
Know the Big Three
How do you protect your mobile applications? Check out this whitepaper on three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Designing a defense for mobile apps
Mobile apps may be a threat, but they don't have to be. Download this whitepaper to review the various considerations for defending mobile applications-from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
Infographic: HP Global 2000 Mobile Risk Report
Do you trust your mobile applications? Insecure mobile applications represent a real security threat to enterprises and individuals. HP Security Research leveraged HP Fortify on Demand Mobile to scan more than 2,000 mobile applications from more than 600 companies to find out. Download this info-graphic to learn more.
HP Global 2000 Mobile Risk Report
Mobile applications represent a growing threat to the enterprise. But how big of a threat? HP Security Research leveraged HP Fortify on Demand Mobile to scan more than 2,000 mobile applications from more than 600 companies to find out.
HP ArcSight ESM Solution Helps Finansbank to Combat Fraud and Increase Customer Satisfaction
Turkey's Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months-far too long. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management.
3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats
This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight-a Security Information and Event Management (SIEM) solution from HP-applies these techniques to spot and stop attacks.