This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

HP updates ArcSight range to thwart APTs

Share this article:

HP has updated its enterprise security portfolio with specific designs to meet the challenge of advanced persistent threats (APTs).

According to the company, the updates to the ArcSight range help with process events at scale, provide deep insights out of the box, correlate user context and provide actionable intelligence to reduce the risk of APTs.

It said that HP ArcSight Threat Detector 2.0 now comes with built-in threat profiles and threat profile intelligence that use heuristic analysis on common areas of threat such as browsing patterns, distributed attack detection, early-stage attack detection and activity profiling.

Secondly, the HP ArcSight Threat Response Manager 5.5 now has cloud-ready, closed-loop capabilities for threat detection and response to mitigate APTs. It said that this enables users to automate the entire threat response process, while providing an end-to-end network security and monitoring solution that addresses accelerated threat detection through proactive response.

Finally, the HP ArcSight IdentityView 2.5 has been enhanced with expanded correlation of user identity, roles and activities across events and security incidents. In a single instance it can now monitor by 10 times, helping organisations correlate security incident and event data across an expansive user base to reduce insider threat risk, HP claimed.

HP said that if a user's activity on the network does not correspond to permitted access controls and baseline behaviour based on historically correlated data, the solution will flag the profile for further investigation. As a result, a company's security operations team can identify intentional versus unintentional activities and mitigate potential threats in real-time.

Haiyan Song, vice president and general manager of ArcSight enterprise security products at HP, said: “With solutions designed to enhance threat detection through improved security analytics for big data, HP enables customers to quickly identify potential attackers and take action proactively to minimise business impact and prevent disruption to critical client services.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Cyber security still a learning curve for most companies

Cyber security still a learning curve for most ...

Poor network visibility, outdated security tools, a skills shortage and a lack of control in the cloud are just some of the reasons companies are struggling with cyber-security, say two ...

WorldPay hacker sentenced to 11 years for role in £6 million scheme

WorldPay hacker sentenced to 11 years for role ...

An Estonian man, who helped hack payment processor RBS WorldPay in 2008, has now been sentenced to 11 years in prison for his involvement in the £5.9 (US$ 9.4 million) ...

'Sophisticated' Chinese hackers launched attacks against 43,000 computer systems

'Sophisticated' Chinese hackers launched attacks against 43,000 computer ...

A new report reveals that a Chinese cyber-espionage group is closely affiliated with government and carried out attacks against the likes of Fortune 500 companies and government agencies.