The ArcSight Security Intelligence platform helps safeguard your business by giving you complete visibility into activity across the IT infrastructure-including external threats such as malware and hackers, internal threats such as data breaches and fraud, risks from application flaws and configuration changes, and compliance pressures from failed audits. This industry-leading security information and event management (SIEM) solution enables you to collect, analyze, and assess IT security, enterprise security and non-security events for rapid identification, prioritization and response.
ArcSight Key Features
- Automate pattern analysis, protect application transactions and secure information
- Integrate correlation and log management, automate operations and search terabytes of data in seconds
- Store and manage all your log data, automate compliance reporting and gain business intelligence
- Solve the Big Data security problem with Big Security intelligence for the increasing volume, velocity and variety of data
ArcSight ESM
Powerful enterprise security management software for analyzing and correlating every event that occurs across your organization
- Automate pattern analysis
- Protect critical application transactions
- Secure sensitive data
ArcSight Logger
Universal log management solution for collecting machine data from any log generating source that unify searching, storing, and analysis
- Store and manage all enterprise log data
- Automate compliance reporting
- Gain business intelligence for logs
ArcSight Express
A security management software solution for collecting log activity, consolidating information for storage efficiency and correlating events
- Deploy all-in-one correlation and log management
- Automate security operations
- Search terabytes of log data in seconds
ArcSight Connectors
Out-of-the box connectors to collect, consolidate and normalize data to unify searching, reporting and analysis
- Collect data from 275+ pre-built connectors
- Create new connectors with a simple toolkit
- Retain consistent monitoring
ArcSight Compliance
ArcSight Compliance Insight Packages help customers get moving quickly with regulatory compliance projects or to automate manual oversight processes.
- Build regulation-specific dashboards
- Create auditor-friendly reports
- Automate continuous monitoring
ArcSight IdentityView
An application built on HP's SIEM platform for monitoring user activity across accounts, applications and systems
- Monitor privileged users
- Attribute shared account usage
- Detect activity by terminated users
ArcSight Resources
2018 GARTNER SIEM MAGIC QUADRANT
Read the Gartner Magic Quadrant report to learn what real SIEM customers say about HP ArcSight and the strengths that put us in the leaders' quadrant.
Download Analyst Report
Download Analyst Report
State Of Security Operations
Organizations around the globe are investing heavily in information technology (IT) cyber defense capabilities to protect their critical assets.
Download White Paper
Download White Paper
10 Ways To Build a Better Big Data Security Strategy
Enterprises of all sizes are awash in data ranging from mundane databases to unstructured data such as social media streams, streaming media, and clickstreams.
Download Analyst Report
Download Analyst Report
How to Better Guard Against a Security Breach
While making progress in setting strategies and policies to anticipate security breaches, many organizations are unable to fully utilize security and event data.
Download Analyst Report
Download Analyst Report
HPE Security Research: Cyber Risk Report 2015
In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things.
Download Analyst Report
Download Analyst Report
Ponemon Institute 2015 Cost of Cyber Crime Study
We are pleased to present the 2015 Cost of Cyber Crime Study: Global, sponsored by Hewlett Packard Enterprise. This year’s study is based upon a representative sample of 252 organizations in seven countries.
Download Analyst Report
Download Analyst Report
Growing the Security Analyst
In this paper, we will explore the aspects of recruiting, training, and retaining security analysts. A blueprint will be provided for how to find and assess candidates, how to nurture analysts during employment, and what sorts of opportunities should be granted to security analysts to help with job satisfaction and ultimately effectiveness and retention.
Download White Paper
Download White Paper
Protecting Your Mid-Size Business from Today's Security Threats
If you were one of millions of customers who used a credit or debit card at Target between Thanksgiving and Dec. 19, 2013, you’re well aware that your card number and even your PIN are likely for sale on some dark corner of the Internet.
Download White Paper
Download White Paper
Protecting Your Business With A More Mature IT Security Strategy
The chances are good that, within the previous week, the successful hack of a major brand was in the news—and that’s going to be true no matter when you happen to be reading this. In fact, these exploits are so common that they hardly qualify as news anymore.
Download White Paper
Download White Paper
Additional Documents
Scalability in Log Management
Demonstrate ROI for SIEM
Combating Fraud & Data theft in the Financial Services Industry
Building a Successful Security Operations Center
ArcSight Express: World-Class Protection for the Mid-Size Organization
ArcSight Logger: The Universal Log Management Solution
ArcSight Logger: Unify the enterprise IT data through log management solution
ArcSight IdentityView: Adding User Context to Security Monitoring
ArcSight ESM: Powered by CORR-Engine
ArcSight Express: Security and compliance monitoring for complex cyber attacks
Arcsight PCI Logger: Turnkey and Automated PCI Compliance
ArcSight Connectors: Scalable Log Collection
Enterprise Security Brochure: Advanced Protection Against Advanced Threats