Security makes one big HP family

Powered by SC Magazine
 

Tipping Point, ArcSight and Fortify made suite.

Hewlett Packard (HP) has melded its enterprise security solutions into new products and services.

The products and solutions combine technologies acquired last year from Tipping Point, ArcSight and Fortify Software into suites that HP said are "designed to help enterprises establish and execute a comprehensive security strategy".

Former ArcSight chief Tom Reilly will head the security department.

The solutions, dubbed the "HP Security Intelligence and Risk Management platform'", included version 3 of HP ArcSight Express, the HP Reputation Security Monitor – which provided HP ArcSight users with a real-time list of known bad IP and DNS addresses – and the HP Fortify Software Security Center, which was available on-premise or on-demand to identify vulnerabilities in applications.

It also included version 2 of HP TippingPoint Web Application Digital Vaccine (WebAppDV) service that extended protection to online applications with real-time identification of vulnerabilities and delivery of virtual patches until fixes could be developed.

According to HP, WebAppDV 2.0 filters with adaptive web application firewall technology to help discriminate between normal network activity and malicious traffic.

HP also offered simplified migration from open-source-based IPS solutions with the Digital Vaccine Toolkit (DVToolkit) 2.0 for Snort, as well as improved transparency of a security environment with HP TippingPoint reporting and archiving powered by Logger software.

HP said the combination of technologies gave the capability to collect up to 100,000 events per second.

The company also launched an Information Security Management service using ArcSight to drive the Security Information and Event Management service and Fortify technology powers the Application Security Testing-as-a-Service.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, US edition


Security makes one big HP family
 
 
 
Top Stories
Time management tips for CIOs
[Blog post] How to get to the genba.
 
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1109

Vote