The ArcSight Security Intelligence platform helps safeguard your business by giving you complete visibility into activity across the IT infrastructure-including external threats such as malware and hackers, internal threats such as data breaches and fraud, risks from application flaws and configuration changes, and compliance pressures from failed audits. This industry-leading security information and event management (SIEM) solution enables you to collect, analyze, and assess IT security, enterprise security and non-security events for rapid identification, prioritization and response.

ArcSight Key Features

  • Automate pattern analysis, protect application transactions and secure information
  • Integrate correlation and log management, automate operations and search terabytes of data in seconds
  • Store and manage all your log data, automate compliance reporting and gain business intelligence
  • Solve the Big Data security problem with Big Security intelligence for the increasing volume, velocity and variety of data

alt


ArcSight ESM

ArcSight ESM

Powerful enterprise security management software for analyzing and correlating every event that occurs across your organization
  • Automate pattern analysis
  • Protect critical application transactions
  • Secure sensitive data

Learn More

ArcSight Logger

ArcSight Logger

Universal log management solution for collecting machine data from any log generating source that unify searching, storing, and analysis
  • Store and manage all enterprise log data
  • Automate compliance reporting
  • Gain business intelligence for logs

Learn More

ArcSight Express

ArcSight Express

A security management software solution for collecting log activity, consolidating information for storage efficiency and correlating events
  • Deploy all-in-one correlation and log management
  • Automate security operations
  • Search terabytes of log data in seconds

Learn More

ArcSight Connectors

ArcSight Connectors

Out-of-the box connectors to collect, consolidate and normalize data to unify searching, reporting and analysis
  • Collect data from 275+ pre-built connectors
  • Create new connectors with a simple toolkit
  • Retain consistent monitoring

Learn More

ArcSight Compliance

ArcSight Compliance

ArcSight Compliance Insight Packages help customers get moving quickly with regulatory compliance projects or to automate manual oversight processes.
  • Build regulation-specific dashboards
  • Create auditor-friendly reports
  • Automate continuous monitoring

Learn More

ArcSight IdentityView

ArcSight IdentityView

An application built on HP's SIEM platform for monitoring user activity across accounts, applications and systems
  • Monitor privileged users
  • Attribute shared account usage
  • Detect activity by terminated users

Learn More


 ArcSight Resources

2018 GARTNER SIEM MAGIC QUADRANT

2018 GARTNER SIEM MAGIC QUADRANT

Read the Gartner Magic Quadrant report to learn what real SIEM customers say about HP ArcSight and the strengths that put us in the leaders' quadrant.

Download Analyst Report

State Of Security Operations

State Of Security Operations

Organizations around the globe are investing heavily in information technology (IT) cyber defense capabilities to protect their critical assets.

Download White Paper

10 Ways To Build a Better Big Data Security Strategy

10 Ways To Build a Better Big Data Security Strategy

Enterprises of all sizes are awash in data ranging from mundane databases to unstructured data such as social media streams, streaming media, and clickstreams.

Download Analyst Report

How to Better Guard Against a Security Breach

How to Better Guard Against a Security Breach

While making progress in setting strategies and policies to anticipate security breaches, many organizations are unable to fully utilize security and event data.

Download Analyst Report

HPE Security Research: Cyber Risk Report 2015

HPE Security Research: Cyber Risk Report 2015

In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things.

Download Analyst Report

Ponemon Institute 2015 Cost of Cyber Crime Study

Ponemon Institute 2015 Cost of Cyber Crime Study

We are pleased to present the 2015 Cost of Cyber Crime Study: Global, sponsored by Hewlett Packard Enterprise. This year’s study is based upon a representative sample of 252 organizations in seven countries.

Download Analyst Report

Growing the Security Analyst

Growing the Security Analyst

In this paper, we will explore the aspects of recruiting, training, and retaining security analysts. A blueprint will be provided for how to find and assess candidates, how to nurture analysts during employment, and what sorts of opportunities should be granted to security analysts to help with job satisfaction and ultimately effectiveness and retention.

Download White Paper

Protecting Your Mid-Size Business from Today's Security Threats

Protecting Your Mid-Size Business from Today's Security Threats

If you were one of millions of customers who used a credit or debit card at Target between Thanksgiving and Dec. 19, 2013, you’re well aware that your card number and even your PIN are likely for sale on some dark corner of the Internet.

Download White Paper

Protecting Your Business With A More Mature IT Security Strategy

Protecting Your Business With A More Mature IT Security Strategy

The chances are good that, within the previous week, the successful hack of a major brand was in the news—and that’s going to be true no matter when you happen to be reading this. In fact, these exploits are so common that they hardly qualify as news anymore.

Download White Paper


Additional Documents