Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

HP Extends Security Offerings to Virtual Environments

HP today announced a new suite of security products designed to deliver comprehensive data protection across both physical and virtual environments.

HP today announced a new suite of security products designed to deliver comprehensive data protection across both physical and virtual environments. The company is positioning these products as part of its “converged infrastructure,” HP’s term for its data center offering that seeks to provide a total computing solution including processing, storage and networking.HP Security Solutions

One key product in the suite is the Tipping Point Virtual Controller (vCongtroller), which extends TippingPoint security protection from physical to virtual networks by routing it through an Intrusion Prevention System (IPS) appliance. The vController can be deployed and managed using the processes, tools and expertise HP customers are familiar with in their physical environment.

HP also announced a new Reputation Digital Vaccine service that ensures that customer-deployed IPS solutions have the most current list of malicious/suspicious websites, and automatically blocks traffic to and from these sites. The list of sites is updated every two hours.

Other security products in the announcement include an IPS security inspection module on a blade, and an appliance for inspecting encrypted network traffic. HP TippingPoint S-series solutions are now shipping worldwide.

Pricing for the new S-series hardware solution starts at $24,995 with the software solution priced based on deployment.

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...