Discover Performance

HP Software's community for IT leaders // June 2012


Keep SaaS secure from the start

When you're not sure of your SaaS providers' risk management, be sure of your own.

Take action

Trend watch

Evolving threats: Changing attack vectors, new infrastructures

The HP DVLabs Cyber Security Risks Report details new threats and the rise of "hacktivism."

Get the report

In depth

The future of IT: No borders

HP Software CTO Mark Potts scouts the mobile, cloud-driven, highly mobile future.

The future is now

CIO insight

RSA report: Security in a cash crunch

Hugh Njemanze, CTO and VP of worldwide R&D at HP Enterprise Security, talks about budget constraints, the value of multilayer security and more.

Watch now


IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.

Let's get started

Please select an answer.


Your answer:
Your score:
Average score:
Revenue leaders' score:


Please select an answer.



Your score:
Average score:
Revenue leaders' score:

Get detailed results:

Popular tags

Most read articles

Discover Performance



Discover Las Vegas 2014

Register for HP’s premier event for inspiration from industry leaders, the HP inside scoop, and a deep dive into tomorrow’s enterprise IT trends.

Security index


Percentage of reported security vulnerabilities in 2011 classified as high-severity (CVSS 8-10).1


Percentage of reported vulnerabilities to the IT enterprise that were web-app centric.1


Percentage who said privileged access was "determined by well-defined policies that are controlled by business or application owners."2

1 "The 2011 Top Cyber Security Risks Report," HP DVLabs, April 2012
2 "Insecurity of Privileged Users: Global Survey of IT Practitioners," Ponemon Institute, December 2011

One question

Q: How do you secure IT in a DevOps/NoOps world?

A: Leverage cloud computing environments and pre-defined, pre-secured "template" ("cloud mapped") PaaS environments where the developer is presented with a pre-configured virtual system every time, which has been set up for minimal risk and exposure through the build process and the security team's involvement.

— Rafal Los, HP Chief Security Evangelist, on his security blog, "Follow the White Rabbit"

HP Security Research Blog

Tweets @ HPSecurity