Feeds

HP launches security service for after the horse has bolted

Security is dead, get over it

Secure remote control for conventional and virtual desktops

HP is getting into the lucrative security remediation sector with a consultancy service designed to minimize the effects of a successful attack, collect evidence for prosecution, and help recover what has been stolen or corrupted.

"It's nearly impossible for organizations to prevent a breach, but they can take control of how they respond," said Andrzej Kawalec, CTO of enterprise security services at HP in a statement.

"Combining HP's portfolio of services and software, the HP Breach Management Solution arms clients with the tools and resources to monitor, manage and respond to breaches head on, minimizing their impact while readying for the next attack."

As part of the package, HP is offering a 24/7 multilingual breach-response service that will seek to mitigate the effects of a successful attack. Meanwhile, forensic consultants can advise on the procedures companies need to have in place before an attack, and will pore over the aftereffects and try to collect evidence if the case comes to court.

Naturally, HP is keen to add its ArcLight service to the package, and there's a data recovery squad that can pick over the pieces and try and find any bits that were either lost of corrupted in the attack.

Pricing for the service is on a per-hour basis and companies can pick and choose the components they want. More details will be announced at the HP Discover conference in June. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.