HP Unveils Breach Management Solution Designed To Help Clients Define Security Strategy, Lower Risk and Impact From Breaches
HP on Monday announced new services designed to help organizations respond to, remediate and mitigate the impact of security breaches.
HP’s Security Breach Management Solution combines its consultancy services with security intelligence to help clients more quickly identify a breach and respond to it, as well as minimize its impact and reduce ongoing exposure from vulnerabilities, the company said.
The offering features the company’s new HP Forensic Readiness Service, which helps organizations proactively establish policies and procedures surrounding forensic investigations. As a result, the company said, clients have the resources to quickly gather digital evidence in the event of an attack and can apply the policies and procedures to gather and document evidence when the next attack occurs.
The HP Security Breach Management Solution offers clients 24/7 monitoring to detect and respond to intrusions, and if breach is detected, HP can dispatch security professionals on site at a client’s location to assess and investigate the breach.
“It’s nearly impossible for organizations to prevent a breach, but they can take control of how they respond,” said Andrzej Kawalec, chief technology officer, Enterprise Security Services, HP. “Combining HP’s portfolio of services and software, the HP Breach Management Solution arms clients with the tools and resources to monitor, manage and respond to breaches head on, minimizing their impact while readying for the next attack.”
The Breach Management Solution is priced based on consultancy hours, the company said. More information is available here.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- ‘No Evidence’ of Cyberattack Related to FAA Outage, White House Says
- SecurityWeek to Host 2022 ICS Cybersecurity Conference October 24-27 in Atlanta
- Google Completes $5.4 Billion Acquisition of Mandiant
- Cybersecurity Firm ZeroFox Begins Trading on Nasdaq via SPAC Deal
- HUMAN Security and PerimeterX Merge on Mission to Combat Bots
- Last Call: CFP for ICS Cybersecurity Conference Closes July 15th
- Johnson Controls Acquires Tempered Networks to Shield Buildings From Cyberattacks
- Snowflake Launches Cybersecurity Workload to Find Threats Across Massive Data Sets
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
