HP

Displaying 11 - 20 of 68 results

  • Re-architect your network for BYOD

    White Papers // Jan 2015 // provided by HP

    This whitepaper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks. Download now and find out how a re-architected network- flexible and scalable- makes BYOD easier to secure and manage, yet ...

    Download Now
  • Magic Quadrant for Deduplication Backup Target Appliances

    White Papers // Jan 2015 // provided by HP

    Deduplication backup target appliances have played an instrumental role in reducing or eliminating tape for backup. This research will help storage professionals shortlist 11 vendors that offer such solutions.

    Download Now
  • The Questions to Consider When Selecting an All-Flash Array

    White Papers // Jan 2015 // provided by HP

    All-flash arrays have become one of the top choices for improving storage, but with so many options out there it can be difficult to choose the right solution to fit your organisational needs. This exclusive whitepaper breaks the process down into four major categories such as performance, resiliency, efficiency, and ...

    Read more
  • 2014 Cost of Cyber Crime Study: Australia

    White Papers // Jan 2015 // provided by HP

    The incidence and cost of cyber crime in Australia is escalating. The headlines show us that. But now the Ponemon Institute provides the numbers you need to plan and manage your investments in cyber security. One of the major findings of the 2014 Cost of Cyber Crime study for Australia ...

    Download Now
  • Improve your Security in 30 days with HP TippingPoint

    White Papers // Jan 2015 // provided by HP

    This white paper shows how you can use HP TippingPoint to materially improve your security posture in 30 days. It offers a day-by-day approach that helps you understand what a Network-Generation Intrusion Prevention System ( NGIPS) can do and includes links to background information to help you better understand the ...

    Download Now
  • Gulf Air Bolsters Network Security with HP Tippingpoint

    Case Studies // Jan 2015 // provided by HP

    Gulf Air is the principal flag carrier of Bahrain. Their challenges are to secure network egress and ingress points and protects against growing cyber threats. They chose HP to overcome these challenges. They have deployed HP TippingPoint next-generation intrusion prevention system, security management system, and threat digital vaccine. The results ...

    Download Now
  • 2014 Global Report on the Cost of Cyber Crime

    White Papers // Dec 2014 // provided by HP

    The incidence and cost of cyber crime is escalating. The headlines show us that. But now the Ponemon Institute provides the numbers you need to plan and manage your investments in cyber security. One of the major findings of the 2014 Global Report on the Cost of Cyber Crime is ...

    Download Now
  • Mobile Risk Report - Forbes list of Global 2000

    White Papers // Dec 2014 // provided by HP

    The Mobile Risk Report presents the major findings of HP Security Research’s comprehensive dive into today’s cyber vulnerability and mobile threat landscape. It provides information you need to effectively plan your cyber security strategy and deploy your defenses. Download this report to know the report findings of more than ...

    Download Now
  • IT Security: Midsize Businesses Face Enterprise-Caliber Threats

    White Papers // Dec 2014 // provided by HP

    The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize organisations often lack the sophisticated defenses of large enterprises, many fail to recognise their vulnerability and are overconfident in their ability ...

    Read more
  • Does Application Security Pay?

    White Papers // Dec 2014 // provided by HP

    Measuring the Business Impact of Software Security Assurance Solutions With the escalating number and increasing sophistication of cyber attacks, perimeter defenses are no longer enough. Enterprises must ensure application vulnerabilities don't open doors for hackers. Mainstay surveyed 12 organisations that implemented application vulnerability testing with HP Fortify. Their ...

    Read more