Security Products
Showing results for 
Search instead for 
Do you mean 

What happened after the world's biggest data breach occured?

Sridhar Karnam (Sri_Karnam) ‎08-27-2013 01:56 PM - edited ‎07-07-2015 10:34 AM

breach 1.PNGRecently there was a great infographic that I got from CISSP newsletter on the World's Biggest Data Breaches. This infographic  showed that the world's largest data breaches occurred where over 30,000 records were stolen. This is an interactive inforgraphic, and while I was playing with various filters I hapened  to see a pattern. I went to our internal CRM database and I surprised to see that more than half of all these large companies that were breached, reached out to us right after the breach occured.


In many cases, we were the first responders to these companies. Most CIOs, CSOs, and leaders in the IT team know about HP's security and IT management tools and we have 44,000 customers that we have helped o over the last 25+ years.


Typically when companies get breached, they call us out for help. We have a team that can fly to any part of the world from China to Washington, D.C with our security software and appliances, and most companies have started seeing the sources and data transfers within the first hour. 




If you look at this list of companies, approximately 50 percent of them have called us after they were breached. The picture on the right shows all the data breaches due to hacking and cyber-threats that could have been prevented through simple controls and inexpensive tools.


HP Enterprise security group offers best-of-breed technologies that are all in leaders quadrant of Gartner's magic quadrant. We can help with:

  •  Information security
  • Application security
  • Network security
  • Log management
  • Identity management

This all leads to security with ease.  

 So, now you have a friend when you have a security breach... Feel free to reach us here.



About the Author


Google Tools on ‎02-22-2014 01:03 AM
I feel that you can do with
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
1-3 December 2015
Discover 2015 London
Discover 2015 in London, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
November 2015
Software Online Expert Days
Join us online to talk directly with our Software experts.
Read more
View all