Feeds

Team HP: Cloud Police

Globocorp wants to plug backdoors

HP ProLiant Gen8: Integrated lifecycle automation

When HP announced it was exploring options for its PC business, the company said it'd move into the more profitable arena of enterprise solutions. From a speech given at HP's yearly Security conference yesterday, the titan is eyeing up cloud security as a big growth area.

Policing the cloud and monitoring employee mobiles are two of the big challenges faced by businesses in the next few years, said Tom Reilly, HP VP and general manager for Enterprise Security Products. HP wants to be there, selling them ways to help them fix it.

Business will need help storing information safely in the cloud and the increasing numbers of staff bringing smartphones and tablets into work makes for another security headache, Reilly said, according to a report of the speech on AllThingsD.

This is the seventh year of HP's annual cybersecurity symposium Protect 2011 and the largest to date, according to their press release. Reilly himself is a buy-in from cyber-security firm ArcSight which HP acquired in 2009.

HP has signalled its interest in the cloud before: CEO Leo Apotheker talked cloud in March this year at the HP Summit in San Francisco. Though some of their efforts to become a cloud-computing business have come under criticism - as The Reg explores here, this is the area the company is propelling itself into after deciding - probably - to drop the personal-system hardware side of its business in August.

A recent spate of press releases by Hewlett Packard emphasise its focus on cloud services - particularly cloud security services: "Government leaders talk cloud, cost savings with HP"; "Innovating today for the network demands of tomorrow"; and "HP Research Reveals 56 Percent Rise in Cost of Cybercrime".

Looks like that's where they see the money. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.