Discover Performance

HP Software's community for IT leaders // June 2012
Subscribe

Overview

Keep SaaS secure from the start

When you're not sure of your SaaS providers' risk management, be sure of your own.

Take action

Trend watch

Evolving threats: Changing attack vectors, new infrastructures

The HP DVLabs Cyber Security Risks Report details new threats and the rise of "hacktivism."

Get the report

In depth

The future of IT: No borders

HP Software CTO Mark Potts scouts the mobile, cloud-driven, highly mobile future.

The future is now

CIO insight

RSA report: Security in a cash crunch

Hugh Njemanze, CTO and VP of worldwide R&D at HP Enterprise Security, talks about budget constraints, the value of multilayer security and more.

Watch now

x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Most read articles

Discover Performance

Archive

Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

Events

Big Data changes everything

HP CEO Meg Whitman discusses how connected intelligence will drive IT operations, application development, IT security, marketing, compliance—and the bottom line. Register now.

HP Protect 2014

Connect with nearly 1,500 security pros to learn how to better disrupt or mitigate threats. Learn to think like a bad guy. (Washington, D.C., Sept. 8 – 11)

Closing the book on Heartbleed

The Heartbleed vulnerability set users and enterprises scrambling. How can we avoid or mitigate the next Heartbleed?

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.

Security index

24

Percentage of reported security vulnerabilities in 2011 classified as high-severity (CVSS 8-10).1

36

Percentage of reported vulnerabilities to the IT enterprise that were web-app centric.1

13

Percentage who said privileged access was "determined by well-defined policies that are controlled by business or application owners."2

1 "The 2011 Top Cyber Security Risks Report," HP DVLabs, April 2012
2 "Insecurity of Privileged Users: Global Survey of IT Practitioners," Ponemon Institute, December 2011

One question

Q: How do you secure IT in a DevOps/NoOps world?

A: Leverage cloud computing environments and pre-defined, pre-secured "template" ("cloud mapped") PaaS environments where the developer is presented with a pre-configured virtual system every time, which has been set up for minimal risk and exposure through the build process and the security team's involvement.

— Rafal Los, HP Chief Security Evangelist, on his security blog, "Follow the White Rabbit"

HP Security Research blog

Tweets @ HPSecurity