Discover Performance

HP Software's community for IT leaders // July 2012
Subscribe

Overview

Speed and security? Just add automation

Secure software without sacrificing the gains of agile development. Follow DevOps’ drive toward automation.

Start automating

Trend watch

6 steps to prevent app attacks

Exploiting weakness at the app layer is the new black for black hats. Find out how to keep your risk low.

Stay a step ahead

In depth

Cooking with DevOps

Author, entrepreneur and DevOps guru Gene Kim explains the key ingredients of the movement and how it can help an enterprise move “from good to great.”

Get cooking

CIO insight

New threats, old defenses?

HP Enterprise Security’s Jay Huff talks about the changing face of cyber crime—and the ways enterprises are failing to adapt.

Watch now

x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Most read articles

Discover Performance

Archive

Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

Events

Ponemon’s 2014 Cost of Cyber Crime study

Security analyst Larry Ponemon discusses his 2014 findings in a series of region-specific webinars covering Europe, the Americas and Asia.

HP Discover 2014

Join thousands of IT execs, engineers, and solution experts to explore IT trends, strategies, and best practices. (Barcelona,
Dec. 2–4)

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.

Security index

87

Percentage of attacks against enterprise IT in 2011 that were not web-based.1

51

Percentage of companies who cited concerns about defects in the vendor's technology as a chief cloud concern (the most-frequently cited fear).2

18

Percentage of survey respondents that admitted to not being PCI-compliant, even though the survey data suggested that they should be.3

1 "The 2011 Top Cyber Security Risks Report," HP DVLabs, April 2012
2 "2012 State of Cloud Computing Survey," Information Week, March 2012
3 "User Survey Analysis: 2012 Security Buying Behaviors and Budget Trends", Gartner Inc., December

One question

Q: Does DevOps need a distinct security “flavor”?

A: I've seen “SecDevOps” discussed, “Rugged DevOps” and on and on ... The only reason to explicitly call out whether we're adding security function into a movement like DevOps is if there are use-cases where security is absent. I can't think of one such case, so why would we want to have a “SecDevOps” vs. “DevOps,” where one implies the absence of security principles? … It perpetuates the notion that security principles are something that is apart from the development and deployment cycles—that security is an add-on. — Rafal Los, chief security evangelist, HP Software, on the Following the Wh1t3 Rabbit blog

HP Security Research blog

Tweets @ HPSecurity