Discover Performance

HP Software's community for IT leaders // October 2013

Security strategy

Improve security through shared intelligence

Hackers and cyber-criminals don’t work alone, and neither should you.

Shared responsibility

Tech trends

3 reasons to evolve your security firewall

The traditional firewall is not enough to meet today’s security needs. Here’s why.

A better barrier

Business insight

Your business is your software

See why enterprises are increasingly defined by software—and learn four keys to mastering a new paradigm.

Get with the program

CIO insight

Risk in the balance

At HP Protect, HP Security SVP Art Gilliland discusses shared security intelligence as a tool against a rapidly evolving adversary, and the need to balance risk management with business ambition.

Watch now


IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.

Let's get started

Please select an answer.


Your answer:
Your score:
Average score:
Revenue leaders' score:


Please select an answer.



Your score:
Average score:
Revenue leaders' score:

Get detailed results:


Popular tags

Most read articles

Discover Performance


Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more


Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.

Security index


Percentage of U.S. IT security professionals who rate themselves as “not effective” in communicating all relevant facts about the state of security risk to senior executives (47% in the UK).1

$67.2 billion

Worldwide security technology and services market forecast for 2013, up 8.7 percent from $61.8 billion in 2012 (the market is expected to grow to more than $86 billion in 2016).2

Nearly 2/3

Data breaches caused by human error and systems glitches in 2012 (malicious or criminal attacks are the most costly, at an average of $157 per compromised record).3

1"The State of Risk-based Security Management: US & UK," Ponemon Institute, 2013
2"Gartner Says Worldwide Security Market to Grow 8.7 Percent in 2013," Gartner Inc., June 2013   
3"2013 Cost of a Data Breach: Global Analysis," Ponemon Institute, June 2013

One question

Q: What should Nasdaq do to avoid another “Flash Freeze”?

A: Hopefully, we will not get another Ford vs. Firestone fiasco; the only way to solve the problem is to conduct an objective review of people, processes, and technology involved. At this point, managers should focus their attention internally rather than in asserting blame externally—otherwise, a better system cannot be built. … Catch your breath. Stop blaming. Evaluate your people, processes, and technology—then make the necessary changes.

—Myles Suer, Senior Manager, ITPM Field and Partner Evangelism, on the Discover Performance blog

HP Security Research blog

Tweets @ HPSecurity