Logo
22.07.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – July 22, 2016

Welcome to the July 22nd edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
22.07.2016

Produkte

Best practices in Security Operations—Why real-time monitoring/in-memory correlation are critical

Paul Brettle, HPE Security Architect, talks about why real-time monitoring and in-memory correlation are critical....

lesen
Logo
20.07.2016

Produkte

Comprehensive application security with Black Duck Hub and HPE Fortify

Black Duck is pleased to announce the integration of their Hub solution into HPE Security Fortify Software Security Center (SSC), which helps organizations measure and control their application security posture and provides visibility into software risk across the ente...

lesen
Logo
19.07.2016

Produkte

Discover data-centric security at HPE Protect

HPE Security -- Data Security users have much to gain from attending HPE Protect in September! From learning about new technologies to exploring how to integrate data protection into your legacy systems, we've got you covered! ...

lesen
Logo
18.07.2016

Produkte

Implementing intelligent SecOps capability

What does it take to implement an intelligent security operations capability?  An intelligent security operations center (SOC) is not a technology-in-a-box solution but is a process of maturation and advancing competencies within an organization. In this new whitepaper by HP...

lesen
Logo
18.07.2016

Artikel

HP-Abonnement für Hardware

Mit HP Device as a Service (DaaS) können Kunden für Hardware pro Arbeitsplatz auf monatlicher Basis bezahlen. Das Abonnement enthalte aktuelle Technologie, Kundenservice und Unterstützung bei Konfiguration, Installation, Datenmigration und Recycling.

lesen
Logo
18.07.2016

Artikel

HP-Abonnement für Hardware

Mit HP Device as a Service (DaaS) können Kunden für Hardware pro Arbeitsplatz auf monatlicher Basis bezahlen. Das Abonnement enthalte aktuelle Technologie, Kundenservice und Unterstützung bei Konfiguration, Installation, Datenmigration und Recycling.

lesen
Logo
15.07.2016

Nachrichten

Privacy: The quarter-year in review

Following a large, fast-moving space such as information privacy is a bit like birdwatching – you think you’re on the trail of one creature, and then some other gaudy feathered thing swoops down at you. Without further ado, the quarter’s sharp-beaked highlights....

lesen
Logo
15.07.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – July 15, 2016

Welcome to the July 15th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen
Logo
13.07.2016

Produkte

HPE Security Fortify and Black Duck partner

 Announcing the partnership between HPE Security Fortify and Black Duck, providing organizations a way to measure and control their application security posture and deliver visibility into software risk across the enterprise. ...

lesen
Logo
12.07.2016

Produkte

Think twice before jumping on the Pokemon Go wagon

 Pokemon Go--The smartphone game's outrageous popularity is responsible for a massive jump in the value of Nintendo's stock. The app already has more downloads than Tinder and Instagram since its release last week, and in a few more days, is projected to have more active us...

lesen
Logo
12.07.2016

Produkte

Learning better ways to respond to today's threats--at HPE Protect

So, you're an HPE Security ArcSight user. Should you attend HPE Protect? What will you gain from attending this security event? We answer those questions, and more, in this blog post! ...

lesen
Logo
08.07.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – July 8, 2016

Welcome to the July 8th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen
Logo
06.07.2016

Produkte

HPE Protect 2016: What to expect

It's almost here: HPE Protect 2016. If you've joined us at HPE Protect in years past, you know what you can expect from such an awesome event. And you also know that year after year, it keeps getting better and better. If you've never attended HPE Protect, we think it's time you...

lesen
Logo
05.07.2016

Artikel

Vom Prototyping zur Produktion: Siemens und HP entwickeln 3D-Druck weiter

Siemens gibt die Zusammenarbeit mit HP Inc. bekannt. Gemeinsames Ziel ist es, neue Lösungen zu entwickeln, um die additive Fertigung von einem reinen Werkzeug für das Prototyping zu einem kompletten Verfahren für die industrielle Produktion zu machen.

lesen
Logo
04.07.2016

Artikel

Vom Prototyping zur Produktion: Siemens und HP entwickeln 3D-Druck weiter

Siemens gibt die Zusammenarbeit mit HP Inc. bekannt. Gemeinsames Ziel ist es, neue Lösungen zu entwickeln, um die additive Fertigung von einem reinen Werkzeug für das Prototyping zu einem kompletten Verfahren für die industrielle Produktion zu machen.

lesen
Logo
04.07.2016

Artikel

Siemens und HP entwickeln 3-D-Druck weiter

Siemens gibt die Zusammenarbeit mit HP bekannt. Gemeinsames Ziel ist es, neue Lösungen zu entwickeln, um die additive Fertigung von einem reinen Werkzeug für das Prototyping zu einem kompletten Verfahren für die industrielle Produktion zu machen.

lesen
Logo
04.07.2016

Artikel

Vom Prototyping zur Produktion: Siemens und HP entwickeln 3D-Druck weiter

Siemens gibt die Zusammenarbeit mit HP Inc. bekannt. Gemeinsames Ziel ist es, neue Lösungen zu entwickeln, um die additive Fertigung von einem reinen Werkzeug für das Prototyping zu einem kompletten Verfahren für die industrielle Produktion zu machen.

lesen
Logo
04.07.2016

Artikel

Vom Prototyping zur Produktion: Siemens und HP entwickeln 3D-Druck weiter

Siemens gibt die Zusammenarbeit mit HP Inc. bekannt. Gemeinsames Ziel ist es, neue Lösungen zu entwickeln, um die additive Fertigung von einem reinen Werkzeug für das Prototyping zu einem kompletten Verfahren für die industrielle Produktion zu machen.

lesen
Logo
01.07.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – July 1, 2016

Welcome to the July 1st edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
30.06.2016

Produkte

HPE Security Fortify Software Security Content 2016 Update 2

HPE Security Fortify Software Security Research (SSR) is pleased to announce the immediate availability of updates to HPE Security Fortify Application Defender, HPE Security Fortify WebInspect SecureBase (available via SmartUpdate), HPE Security Fortify Secure Coding Rulepacks (...

lesen
Logo
29.06.2016

Produkte

Threat gathering to hunting: A proactive approach to cyber-threats

Hunt teams are an evolutionary step in threat detection that borrow skills from elsewhere in the Big Data security organization and pair them with data analytics to help organizations more effectively fight back against advanced and persistent threa...

lesen
Logo
28.06.2016

Produkte

The Psychology of Technology

With advancements in technology expanding faster than the ability for anyone to fully protect it......

lesen
Logo
24.06.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – June 24, 2016

Welcome to the June 24th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
23.06.2016

Produkte

Why should you integrate Backup and recovery with your enterprise security strategy?

Imagine that your employees, vendors, or partners get attacked with a ransomware, and about 1000 critical employees endpoint is hijacked. You have two options: one, pay them ransom and hope that they maintain the data integrity, not leak it and deliver everything back to you. Tw...

lesen
Logo
23.06.2016

Produkte

Best practices in Security Operations—Customizations

What customizations are critical for security operations to ensure strong security posture?  ...

lesen
Logo
22.06.2016

Produkte

Do I still need a SIEM?

With Big Data advances, can I just log all my data in a central repository and then apply Big Data analytics to find the security threats? What about behavior analytics with machine learning that do not require predefined rules, would that replace the security information and ev...

lesen
Logo
21.06.2016

Produkte

Priorities in data security revealed

Data is spreading into the cloud, mobile, remote, and partner environments--and as it spreads, the surfaces over which enterprises can be attacked is expanding. Hackers are creating profitable data-theft businesses; leaving companies overwhelmed and unprotected. ...

lesen
Logo
21.06.2016

Produkte

The level of healthcare fraud

As I noted in a previous post, in many industries, the damage from loss of consumer and merchant confidence are much greater than the direct costs of cybercrime. But there is one industry in which this is probably not true, and that’s healthcare. This is both because the direct ...

lesen
Logo
20.06.2016

Produkte

Accelerating innovation, intelligence, & readiness through IT

Tampa Tech Day 2016 is approaching quickly! Open to military, government, and systems integrators, this briefing will cover 4 transformation areas. Read more... ...

lesen
Logo
17.06.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – June 17, 2016

Welcome to the June 17th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
15.06.2016

Produkte

Defying tomorrow’s security challenges with Next-Gen SIEM

With security threats on the rise, federal agencies are working to mature their cyber efforts to thwart attacks and improve detection. In order to keep sensitive data safe and meet mission requirements, federal agencies are turning to intelligence-aware Security Information and ...

lesen
Logo
14.06.2016

Produkte

Best practices in Security Operations—Machine Learning

How machine learning can specifically be applied to intelligent security operations....

lesen
Logo
14.06.2016

Produkte

Learning how to encrypt healthcare information

Encrypting sensitive information is a good way to protect it from misuse by cyber criminals, but lots of sensitive information still is not encrypted. This seems to be particularly common in the healthcare industry. But as the healthcare industry starts to look more seriously at...

lesen
Logo
14.06.2016

Nachrichten

The known unknown of unconscious incompetence

Recently, HPE partnered with UCL, a member of RISCS and CESG within the UK to produce a white paper setting out a framework for security awareness that employees will actually engage with, empowering them to become the strongest link—rather than a vulnerability—in defending the ...

lesen
Logo
10.06.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – June 10, 2016

Welcome to the June 10th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen
Logo
08.06.2016

Produkte

Is Your Server Trusted? Look for Common Criteria Validation to Prove Security Assurance!

When it comes to securing the encryption keys that protect your sensitive data, would you want to rely on a vendor that certifies only a part of their security solution (which may not offer complete assurance of meeting regulatory and policy compliance requirements) or one that c...

lesen
Logo
03.06.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – June 3, 2016

Welcome to the June 3rd edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
02.06.2016

Produkte

Defending against ransomware: Avoiding the “catch-up game” when dealing with today’s newest threat

 What would you do if you lost access to all of your work laptop or mobile files—right now? Are you prepared to deal with today’s latest threats which intend to hold your PC hostage?...

lesen
Logo
02.06.2016

Artikel

Cloud28+ mit App Center und erweitertem Technologiekonzept

Die von HP Enterprise (HPE) geförderte europaweite Cloud-Community Cloud28+ verabschiedet sich von der konsequenten Orientierung an OpenStack und öffnet sich damit breiteren Provider- und Anwenderkreisen.

lesen