Discover Performance

HP Software's community for IT leaders // April 2013


Boost your security with big data

Somewhere in all your data is your next security coup—or failure. Find out how to mine big data for high-def security.

Power up

In depth

Take your IT team mobile—for real

Succeeding at mobile is about more than IT. It’s about people, culture, and LOB collaboration.

Real moves

Trend watch

Hackers target mobile platforms and older avenues

HP 2012 Cyber Risk Report: Critical vulnerabilities dipped slightly, but attackers still exploit familiar vectors, as well as new ones.

A risky read

CIO insight

Know your adversary

HP Security Research director John Pirc interviews HP Security VP Art Gilliland at RSA about what CISOs need to know to understand the people behind security threats.

Watch now


IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.

Let's get started

Please select an answer.


Your answer:
Your score:
Average score:
Revenue leaders' score:


Please select an answer.



Your score:
Average score:
Revenue leaders' score:

Get detailed results:


Popular tags

Most read articles

Discover Performance


Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more


Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.

Security index


Percentage of CIOs who viewed security as a major challenge to mobile deployments (versus 41 percent citing cost).1


Percentage of overall IT security enterprise product capabilities that will be delivered in the cloud by 2015.2


Percentage of U.S. workers who would reveal their email address to get a 50% discount on a $100 item (22% would reveal the name of the street they grew up on; 15% would reveal their mother’s maiden name).3

1“Mobility Disruption: A CIO Perspective,” McKinsey & Company, September 2012      
2Predicts 2013: Security Solutions,” Gartner Inc., November 2012
3“2012 IT Risk/Reward Barometer: US Consumer Edition,” ISACA, November 2012 (.pdf)

One question

Q: How do you mitigate the risk from mobile application security vulnerabilities?

A: First, applications need to be manually audited and assessed before the products are launched to determine if any input injection vulnerabilities or information leakage vulnerabilities are present. … It’s much less expensive to address security vulnerabilities during development than once it has been released. Secure data transmission standards should be included as part of any application requirements, especially if those applications are being developed by third-party developers. The same is true for secure data storage and application logging. Reasonable inter-application communication exposure and permissions in application requirements should be stringently defined. These concerns should all be addressed in the requirements phase and tested during development.

From the HP 2012 Cyber Risk Report (reg. req’d)

HP Security Research blog

Tweets @ HPSecurity