Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Attack cybercrime head-on at RSA 2014

Cindy_Blake ‎02-19-2014 09:22 AM - edited ‎09-16-2015 09:04 AM

HP’s security software products are leaders in each of their respective categories. Together, they deliver what no one else can—multi-dimensional security intelligence to help you fight the bad guys at every step of the attack lifecycle. And when you need a little help, HP Security Services is there to help you achieve your goals.


Here you see the attack lifecycle:


And here’s how HP can help attack, detect and block the adversaries:





Learn how to attack the bad guys in one of these theatre presentations:


  • Attack!  Identify and understand your adversary: The bad guys are collaborating. Now the good guys can, too. HP Security Research discloses how to see threats more broadly and understand how to stop them. Use actionable counterintelligence to prevent attacks before they occur.
    Monday 7:20/Wednesday 12:40

  • Attack!  Stop the bad guys from getting in:  Regain the upper hand! Block and detect the enemy with infrastructure security through HP TippingPoint. Learn about architectural considerations that can help you deploy a simple, reliable and effective solution to stop they bad guys from getting in.
    Tuesday 12:40/Wednesday 3:20

  • Attack! Protect your weakest link—your software:  Applications are the most frequent entry-point for attacks. Learn how HP Fortify can help to quickly and easily protect your software for vulnerabilities—including legacy, open source, third party, mobile, server and web. Keep the bad guys from getting past you! Tuesday 2:20/Wednesday 4:40.

  • Attack!  Find the intruders: Turn your data into actionable intelligence! Get a handle on security by detecting, responding to and resolving threats quickly with HP ArcSight. Learn how to bring it all together to help you find the bad guys within. Tuesday 4:40/Thursday 12:20

  • Attack! Protect Your Sensitive Data:  Stop the bad guys from seeing your data!  Data should be encrypted both at rest and during transmission. Create and manage all of those encryption keys with HP Atalla Enterprise Secure Key Manager. Unify key services across your enterprise while ensuring continuous protection and availability for critical business data.  
    Tuesday 3:20/Wednesday 11:20

  • Attack! Prevent loss of intellectual property: Include context of unstructured data in your security program.  Correlate suspicious activity and negative sentiments along with traditional security events and information.

    Tuesday 5:20/Thursday 2:20


We look forward to seeing you at these sessions at RSA 2014! And the bad guys? They don’t have a fighting chance.

About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
January 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during the online Expert Days - see details below. Software experts do not monitor this foru...
Read more
See board event postings
Vivit Events - 2016
Learn about upcoming Vivit webinars and live events in 2016.
Read more
View all