HP announced HP WebInspect 10.0, a unique application-security solution that replicates real-world attacks through a guided testing process, enabling organizations to develop and deliver secure web applications and web services.
Web applications remain a substantial source of security vulnerabilities. From 2000 to 2012, four of the six most reported vulnerabilities were exploitable via the web. Thorough application security testing is proven to prevent attacks before they occur, but many organizations lack the resources, tools and time to implement secure testing processes. Without proper testing, these web applications may contain vulnerabilities that can be easily exploited by attackers.
HP WebInspect 10.0 is an automated, configurable application security solution that dynamically tests web applications and web services to quickly and accurately identify exploitable security vulnerabilities.
With HP WebInspect 10.0, security teams can efficiently manage test results and distribute actionable security intelligence and remediation guidance early in the development process.
HP WebInspect 10.0 also improves secure application development by enabling security teams to share best practices to protect key entry points from attack.
“To effectively build safe and secure web applications, organizations need to be thinking about and testing for critical threats from the onset of development,” said Mike Armistead, vice president and general manager, Enterprise Security Products, Fortify, HP. “HP WebInspect 10.0 empowers clients to become proactive in their security efforts, rather than reacting to attacks after they happen, by simulating attacks to identify vulnerabilities early on and preventing breaches long before they occur.”
HP WebInspect 10.0 includes the new Guided Scan, a unique interactive testing process based on a patent-pending Adaptive Component Recognition technique for analyzing modern complex web applications and JavaScript. Guided Scan leads novice users and professional security testers alike in adapting tests to specific scenarios in custom environments where test configuration is difficult to troubleshoot. This provides better handling of complex scenarios like detecting proxy misconfiguration or network authentication.
HP WebInspect 10.0 also includes enhancements to workflow recording that allow the logging of application interactions by users and the tracking of business processes tied to the application being tested, making the latest version more intuitive and thorough.
HP WebInspect 10.0 includes integration with leading web application firewalls and with HP TippingPoint intrusion prevention system to streamline application-layer protections against vulnerabilities found in production or in third-party applications.
The Latest
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...
In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...
In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...