Discover Performance

HP Software's community for IT leaders // May 2013


How to make security intelligence actionable

Jacob West, head of the new HP Security Research, discusses the need to share intelligence and act fast.

Act wisely

Trend watch

Pit big data against big threats

You’ve got more data than ever to track and protect—but you’ve also got more information to keep you abreast of risks. Are you mastering your data?

Dig in

In depth

4 keys to delivering true IT value

Understanding IT’s core “value streams” lets you focus less on tasks, more on achieving excellence in strategic planning, design and operations—and security from beginning to end.

Special delivery

CIO insight

Human figures on the security landscape

HP Security Research leader Jacob West discusses security for mobile apps, and why people and process are critical to any security initiative.

Watch now


IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.

Let's get started

Please select an answer.


Your answer:
Your score:
Average score:
Revenue leaders' score:


Please select an answer.



Your score:
Average score:
Revenue leaders' score:

Get detailed results:


Popular tags

Most read articles

Discover Performance


Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more


Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.

Security index


Percentage of U.S. consumers who feel their online privacy is threatened and use a computer, tablet PC or smartphone for work activities.1


Percentage of applications found vulnerable to cross-site scripting.2

1"2012 IT Risk/Reward Barometer: US Consumer Edition” (.pdf), ISACA, November 2012  
2"HP 2012 Cyber Risk Report," HP Enterprise Security, February 2013

One question

Q:  How do you stop security itself from becoming a weakness?

A: More than once I’ve discovered the source of a breach to be a “security device.” Or, just as bad, it turns out that a security device the organization counted on, which should have prevented the attack, was not kept up and simply missed something obvious. If you don’t have an upkeep strategy for each and every one of your security devices, you’re in trouble. At the very best you’ll end up with a false sense of security. At the worst your security widget may actually be the attacker’s way in.

—Rafal Los, principal, strategic security services, HP ESS, on his Wh1t3 Rabbit security blog

HP Security Research blog

Tweets @ HPSecurity