Logo
22.02.2017

Produkte

Save-the-date: Protect 2017!

Save the date! HPE Protect is coming to Washington, D.C. September 11-13th, 2017! ...

lesen
Logo
21.02.2017

Produkte

Save-the-date: HPE Protect 2017!

Save the date! HPE Protect is coming to Washington, D.C. September 11-13th, 2017! ...

lesen
Logo
16.02.2017

Produkte

ArcSight for the win!

HPE Security is thrilled to announce that ArcSight is the winner of “Best SIEM Solution” by SCMagazine in their 2017 SC Awards. Winners were announced on February 14th, 2017 at RSA Conference in San Francisco, CA. ...

lesen
Logo
14.02.2017

Produkte

Data-centric IoT security is here!

HPE Security kicks off RSA Conference 2017 with an exciting announcement: Hewlett Packard Enterprise Delivers First-to-Market Data-centric IoT Security!...

lesen
Logo
14.02.2017

Produkte

Looking for the fastest threat investigation solution? Found it!

HPE debuts ArcSight Investigate, the industry’s fastest threat investigation solution, at RSA Conference 2017! ...

lesen
Logo
09.02.2017

Produkte

The 2017 State of SecOps: Providing effective business metrics

In this 8-part blog series, we give a high-level overview of the findings and lessons learned in the 2017 State of Security Operations Report. This is part 3, wherein we discuss providing EFFECTIVE business metrics. ...

lesen
Logo
07.02.2017

Produkte

You're invited: HPE Software Government Summit 2017

Please join us for Hewlett Packard Enterprise Software Government Summit 2017, taking place Wednesday, March 22 in Washington, D.C. ...

lesen
Logo
02.02.2017

Produkte

The 2017 State of SecOps: Development of Fusion Centers

In this 8-part blog series, we give a high-level overview of the findings and lessons learned in the 2017 State of Security Operations Report. This post delves into finding 2: Development of fusion centers. ...

lesen
Logo
02.02.2017

Produkte

The 2017 State of SecOps: Decreased maturity with hunt-only programs

In this 8-part blog series, we give a high-level overview of the findings from the 2017 State of Security Operations Report....

lesen
Logo
02.02.2017

Produkte

Security (in DevOps) is something that happens every single day

In a recent live webinar, HPE Security Strategist, Stan Wisseman, spoke to Coveros CEO and Founder, Jeff Payne about his thoughts on DevOps and how to fit security into the process. It was a great conversation, and one that any company thinking of adopting DevOps should hear. &nb...

lesen
Logo
24.01.2017

Produkte

Talk Security with HPE at RSA Conference

RSA Conference is the largest security conference in the world--rightfully referred to as, 'Where the world talks security." At HPE Security, we know that RSA is an amazing opportunity to share our approaches to the changing cyber landscape, help you discover new and evolvin...

lesen
Logo
23.01.2017

Produkte

Decreased maturity with hunt-only programs

In this 8-part blog series, we give a high-level overview of the findings from the 2017 State of Security Operations Report....

lesen
Logo
19.01.2017

Produkte

Don't jeopardize your innovation

Join HPE Security at the largest security conference in the world! ...

lesen
Logo
19.01.2017

Produkte

Adopting an open architecture to secure your business

In the past, Security environments have traditionally been closed, sealed and ‘secured’; but as organizations look to solve today’s more complex problems, they are now embracing the idea of adopting open standards and architectures. By evolving to accept new, innovative and open ...

lesen
Logo
17.01.2017

Produkte

The 2017 State of Security Operations

The State of Security Operations 2017 report of capabilities and maturity of cyber defense organizations was released by Hewlett Packard Enterprise today, and provides deep analysis on the effectiveness of organizations’ security operations centers (SOCs), and best practices for ...

lesen
Logo
13.01.2017

Produkte

HPE supports Scholarships for Women Studying Information Security (SWSIS)

I had the opportunity to attend the 32nd Annual Computer Security Applications Conference in Los Angeles, California where 16 scholarships co-funded by Hewlett Packard Enterprise (HPE) were awarded to Scholarships for Women Studying Information Security (SWSIS)....

lesen
Logo
12.01.2017

Produkte

The true state of security in DevOps and how to bridge the gap

Gain practical advice that DevOps and Application Security Teams, of any maturity level, can take away from recent survey findings. Build your roadmap for adding security into every step of the SDLC, from coding through production. ...

lesen
Logo
12.01.2017

Produkte

Understanding and detecting advanced malware that slips past your perimeter defense

External facing DNS servers are vulnerable to a myriad of cyberattacks; however, threats aren't always outside your firewalls—they can come from anywhere. Today’s targeted attacks come with a host of challenges. How do you detect malware that easily gets past traditional security...

lesen
Logo
07.01.2017

Produkte

HPE supports Scholarships for Woman Studying Information Security (SWSIS)

HPE Supports Scholarships for Woman Studying Information Security...

lesen
Logo
20.12.2016

Produkte

GDPR: It DOES apply to you

Unless you've been living under a rock, you've heard of the General Data Protection Regulation (GDPR). What you may not know, however, is that it doesn't only apply to international companies. GDPR--which officially takes effect in May of 2018--applies to any business that collec...

lesen
Logo
20.12.2016

Produkte

Complexity is the enemy of security

We understand that you may be struggling to find the proper balance between a growing compliance burden and increasing demand for more strategic operational security coverage. Let us help answer your questions....

lesen
Logo
16.12.2016

Produkte

HPE Security Fortify Software Security Center and HPE Security Fortify Static Code Analyzer 16.2

HPE Security Fortify is pleased to announce the immediate availability of Fortify Software Security Center (SSC) and HPE Security Fortify Static Code Analyzer (SCA) 16.2, and HPE Security Fortify Software Security Content 2016 Update 4....

lesen
Logo
15.12.2016

Produkte

Gain confidence to securely innovate at RSAC 2017

Security must accelerate, not impede innovation. We invite you to join us at RSA Conference 2017, to help you learn more about building security directly into your data and your apps....

lesen
Logo
05.12.2016

Produkte

Staffing a successful cyber threat hunting team, Part 3: Skills to look for in a threat hunter

There are many skillsets that compliment hunt operations and matching individual talents to the hunting process allows for more specialized concentrations. It’s often difficult, or even impossible, to find individuals that carry complete security knowledge in every domain, and th...

lesen
Logo
28.11.2016

Produkte

Staffing a successful cyber threat hunting team, Part 2: How cyber security hunting works

Welcome to part 2 in a series: “Staffing a successful cyber threat hunting team.”...

lesen
Logo
22.11.2016

Produkte

Is your SOC Intelligent?

 Having a Threat Intelligence function isn’t a "go big or stay home" proposition....

lesen
Logo
16.11.2016

Produkte

Protect your organization against ransomware

Learn how to mitigate risk and proactively protect your organization against ransomware at HPE Discover 2016 London! ...

lesen
Logo
16.11.2016

Produkte

GDPR, Data Security, and more--at HPE Discover London

This year at Discover London, a hot topic is the EU General Data Protection Regulation, or GDPR.  We also have several sessions that pertain strictly to Data Security, IoT, and Ransomware. ...

lesen
Logo
11.11.2016

Produkte

You need not compromise security in your DevOps journey

How to integrate security and DevOps to meet faster delivery cycles without compromising application security. ...

lesen
Logo
09.11.2016

Produkte

Consumer privacy: Oxymoron or opportunity?

The meaning of “providing for the common defense” has changed significantly since 1787. After all, the writers of the Constitution could not anticipate the services government would be able to provide to citizens through computers, or the potential for threats to and loss of valu...

lesen
Logo
08.11.2016

Produkte

Discover intelligent security operations

Intelligent security operations enable you to reduce business and security risks. Learn more about how you can improve your organization’s ability to detect and respond to malicious security events at HPE Discover London....

lesen
Logo
08.11.2016

Produkte

Staffing a successful cyber threat hunting team, Part 1: Cyber threat hunting

Cyber threat hunting is no longer a nice-to-have. It’s now becoming a necessity for many security organizations. Join us for a 3-part series, “Staffing a successful cyber threat hunting team.” This post is part 1 in the series....

lesen
Logo
02.11.2016

Produkte

How the US election is like your SOC

Believe it or not, this year’s US election has many similarities with your SOC. Because the flood of information and misinformation comes at you 24x7?  Because it can be exhausting? Because the decisions you make can have a huge impact? Because it is painful? Perhaps. ...

lesen
Logo
02.11.2016

Produkte

What it takes to staff an intelligent Security Operations capability

What does it take to staff an intelligent security operations capability? In this new whitepaper by HPE Security, you will be guided through a roadmap for staffing an intelligent SOC, roles and responsibilities, staffing models, a roadmap for growth, and more....

lesen
Logo
02.11.2016

Produkte

Looking through the crystal ball: Top 5 federal cyber priorities for 2017

As we prepare for the New Year and a new federal administration, I find myself reflecting on events that shaped our nation’s cybersecurity landscape in 2016. With that in mind, we’ve highlighted below the top 5 priorities around federal cybersecurity for 2017....

lesen
Logo
01.11.2016

Produkte

A Secure Root of Trust

 I’m proud to be part of the “Chain of Trust” that begins here in Sunnyvale California for the HPE Atalla HSM (Hardware Security Module). When I joined Tandem Computers 20 years ago I was awed by what the Atalla security products provided our Payment Card Industry (PCI) customer...

lesen
Logo
31.10.2016

Produkte

Addressing Micro Focus Fear, Uncertainty and Doubt

As you have likely heard, Hewlett Packard Enterprise announced plans for a spin off and merger of our Software business with Micro Focus. The combination of HPE’s software assets, including our Fortify team, with Micro Focus will form a pure play, $4.5 billion software powerhous...

lesen
Logo
29.10.2016

Produkte

Connect Technical Boot Camp offers latest HPE NonStop and HPE Data Security news

The Connect NonStop Technical Boot Camp is the most comprehensive technical education and training event dedicated exclusively to the global Hewlett Packard Enterprise NonStop community.  Information and content for this event is driven by NonStop users for NonStop users. T...

lesen
Logo
28.10.2016

Produkte

What applications are best for RASP?

Interested in using Runtime Application Self-protection (RASP), but unsure of where to begin?  Which applications are best for applying this monitoring and protection capability? Are there best practices? Read this blog post for more information!...

lesen
Logo
25.10.2016

Produkte

GDPR: Compliance and capitalization

Confused about the new GDPR regulation? At HPE Discover 2016 London, we'll have several specific sessions dedicated to the GDPR--explaining how organizations can not only prepare to be compliant, but also capitalize on opportunities driven by the new regulation....

lesen