HP Launches Application Transformation Tools, Services For Cloud Migrations

Printer-friendly version Email this CRN article

Hewlett Packard on Tuesday unveiled new products and services aimed at helping customers deal with the herculean task of whittling down legacy applications and preparing for the IT infrastructure reassessments that come with cloud computing.

HP calls this application transformation, a classification that spans application portfolio management, service automation for private and public clouds, and Web application security. HP says that all address key pain points for CIOs and IT decision makers.

HP's new Application Portfolio Management (APM) software, which is delivered as a service, helps organizations figure out which legacy apps to keep and which to jettison. Paul Evans, worldwide lead for application transformation in HP's Enterprise Business, likens the situations many companies face to the phenomenon of items of dubious usefulness piling up in a home garage over time.

"What happens is that companies develop and acquire new applications but never get rid of the old ones," Evans said in an interview. "CIOs will tell you they have too many apps. Most would agree they have twice the number they need."

Security is another area that companies need to pay attention to as they move to the cloud. HP's new Application Security Center (ASC) includes a collection of technologies that protect Web applications from security threats using scanning and threat intelligence. ACS includes integration of the Fortify 360 source code analyzer, which HP gained from last September's acquisition of Fortify Software,

"The cloud brings enhanced security requirements, and Fortify's role is ensuring security in the application development and testing phases, as opposed to after," Evans said. "You can't build an application and then make it secure."

Application Security Center tests application code at runtime to provide a more in depth sort of analysis that goes beyond "bolted-on" security technologies, according to Evans.

"Security has to be something that’s inherent to software design. ACS gives us that real time monitoring where can see if someone is trying to break in," he said. "It has a level of intelligence -- it's just going to keep people out , it'll also monitor who's coming through the door."

Next: HP Upgrades Its Cloud Service Automation Tool

Printer-friendly version Email this CRN article