Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Ignite your security strategy growth engine at HP Discover

discover13_banner_300x250.pngTechnological drivers like cloud, bring-your-own-device (BYOD) mobility, and Big Data have become deeply embedded into all operational aspects of the 21st century enterprise. This presents both peril and opportunity for the security of your operations as the old command-and-control strategies become increasingly ineffective.


Increasingly, the more perceptive security strategies understand that basic breach prevention is not the end game for securing the enterprise. Instead, security operations must fully integrate into the profit and growth driven process of the business as a whole. An enterprise that is resilient and focused on ensuring business continuity with minimal disruption of operations is more agile and at a competitive advantage. Security must be a business enabler and the strategy for security must move beyond mere incident prevention and mitigation and perform as a driver for growth.

Ring Fencing to trigger growth of Cloud Computing in the Financial Industry

Recently, I identified the top 5 triggers for the emergence of industry-specific clouds -- all of them generic across industries even though some may be more applicable than the others to certain industries.  Since writing this post, various phenomena and business events have come to my attention that are acting as triggers for the emergence and adoption of cloud computing within specific industries.


Ring-fencing is one such trigger within the Financial Industry.  Let us see why.

Don’t miss these great discussions on enterprise security

Enterprise Security RoundupCyber threats are getting more sophisticated and unpredictable than ever, making security a front-and-center concern for enterprises and CIOs. HP’s Enterprise Security experts have been discussing the hottest security topics on the Enterprise Security Trends blog – don’t miss these great posts and feel free to add your own comment to join the discussion

Showing results for 
Search instead for 
Do you mean 
Follow Us

About the Author(s)
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.