Discover Performance

HP Software's community for IT leaders // May 2013


How to make security intelligence actionable

Jacob West, head of the new HP Security Research, discusses the need to share intelligence and act fast.

Act wisely

Trend watch

Pit big data against big threats

You’ve got more data than ever to track and protect—but you’ve also got more information to keep you abreast of risks. Are you mastering your data?

Dig in

In depth

4 keys to delivering true IT value

Understanding IT’s core “value streams” lets you focus less on tasks, more on achieving excellence in strategic planning, design and operations—and security from beginning to end.

Special delivery

CIO insight

Human figures on the security landscape

HP Security Research leader Jacob West discusses security for mobile apps, and why people and process are critical to any security initiative.

Watch now


IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.

Let's get started

Please select an answer.


Your answer:
Your score:
Average score:
Revenue leaders' score:


Please select an answer.



Your score:
Average score:
Revenue leaders' score:

Get detailed results:

Popular tags

Most read articles

Discover Performance



Discover Las Vegas 2014

Register for HP’s premier event for inspiration from industry leaders, the HP inside scoop, and a deep dive into tomorrow’s enterprise IT trends.

Security index


Percentage of U.S. consumers who feel their online privacy is threatened and use a computer, tablet PC or smartphone for work activities.1


Percentage of applications found vulnerable to cross-site scripting.2

1"2012 IT Risk/Reward Barometer: US Consumer Edition” (.pdf), ISACA, November 2012  
2"HP 2012 Cyber Risk Report," HP Enterprise Security, February 2013

One question

Q:  How do you stop security itself from becoming a weakness?

A: More than once I’ve discovered the source of a breach to be a “security device.” Or, just as bad, it turns out that a security device the organization counted on, which should have prevented the attack, was not kept up and simply missed something obvious. If you don’t have an upkeep strategy for each and every one of your security devices, you’re in trouble. At the very best you’ll end up with a false sense of security. At the worst your security widget may actually be the attacker’s way in.

—Rafal Los, principal, strategic security services, HP ESS, on his Wh1t3 Rabbit security blog

HP Security Research Blog

Tweets @ HPSecurity