Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Are you up for the Security Challenge?

Secuirty Challenge Wall smaller2.pngYour company’s security comes down to three big issues: sophisticated threats, complex regulations, and the evolving needs of IT. Do you have the proper strategies, mind-set and tactics to fight oncoming hack attempts and cyber-attacks?


The Security Challenge awaiting you at HP Discover is a don’t-miss experience. Sure, you’re usually aware of your surroundings—any threats lurking out there—but once you enter the Security world at Discover, you’ll emerge with a completely different outlook. Are you ready for the Challenge?

Why Application Security should be architected, designed and built in from the start

CATA.jpg recently talked about cyber security with John Diamant, HP Secure Product Development Strategist and Distinguished Technologist. I learned two very important things:


  1.  Applications security is becoming increasingly important in the overall cyber security landscape and is a growing area of vulnerability.
  2. Security has been traditionally treated as something you can “test for” after the fact, but needs to be treated like quality, which is architected, designed and built right into the IT solution.


We also discussed 4 main types of risk and cost associated with application vulnerabilities. Read the full interview. 

Cybersecurity, Big Data, Public Cloud, SAP, Virtualization: Around Enterprise Services, Nov 4

roundabout.jpgBy PT Umphress, Enterprise Services WW Marketing


Here is a summary of the Enterprise Services blog topics for this past week:


  • Cybersecurity: Does It Take More Than Being Vigilant?
  • Planning for a big data world…
  • HP helps accelerate Detroit Media Partnership’s business performance through virtualization
  • Finance & Administration in a seamless, connected, context aware world
  • The Workday of the Future: 9 to 5 in the office RIP
  • Complexity - the paradox of doing everything right
  • Gartner event shores up hybrid delivery reality
  • More on HP public cloud service beta
  • What Makes It Tick? An Inside Look at HP Enterprise Cloud Services
  • Why most organizations risk a security breach from their imaging and printing environment
  • HP’s internal efforts at in memory processing
  • HP and SAP RDS CRM – Solutions Made Fast, Efficient and In the Cloud!
  • Mission Critical Services for SAP –Live Session at SAP Sapphire Madrid
  • Improve B2B Invoice Processing with Invoice Automation
  • In World Series of Technology, HP Enterprise Services' Michael Donovan Named Rookie of The Year
  • Saving the Life of a Client

Security, Applications, Desktop Outsourcing, Cloud Services: Around Enterprise Services, Sept 30

By Alison Watterson, Enterprise Services WW Marketing


Here is a summary of the Enterprise Services blog topics for this past week:


  • roundabout.jpgHope is not a strategy for managing print security risks
  • October is National Cyber Security Awareness Month (NCSAM)
  • Success Factors of Managing a Hybrid IT Services Delivery Model
  • Cloud Security - Amazon Silk Defaults to Privacy Off
  • Aspects of Managing The Problem Child Applity
  • TIBCO TUCON 2011 - Opening and Day 1 Updates
  • Innovation INSIGHT on Security: 3 ways to safeguard against employee sabotage
  • HP Helps Swansea University with an IT Road Map
  • Is your virtualized environment being orchestrated and managed properly?
  • HP positioned as leader in Gartner Magic Quadrants for desktop outsourcing and help desk services
  • FedEx Receives Award for Advancements in Cloud Printing
  • Anarchy or order? Are outsourced cloud services governable?

Innovation INSIGHT on Security: 3 ways to safeguard against employee sabotage

By John Diamant, Distinguished Technologist, HP Enterprise Services


pinting.JPGEven the best enterprise security can be compromised by employees. In today’s fast-paced IT environment, the risk is no longer just external; it’s shifted to internal. HP Distinguished Technologist John Diamant shares how organizations are vulnerable and provides solutions to safeguarding data in part three of the Innovation INSIGHT series on security.

Showing results for 
Search instead for 
Do you mean 
Follow Us

About the Author(s)
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.