HP has unveiled a set of new security solutions to help protect interactions between users, apps and data.

The HP DNS Malware Analytics (DMA) solution will help organisations to automate threat data analysis.

The solution will find malware-infected hosts like servers, desktops and mobile devices by inspecting an enterprise’s DNS traffic without endpoint agents.

It helps customers to rapidly identify high-risk threats, lower data breach impact and improve overall security.

The clientless, algorithmic-driven service will analyse the high volume of DNS records, allowing customers to find new, unknown malware and reduce false positives by a factor of 20 when compared to other malware detection systems.

The solution integrates with the HP ArcSight SIEM platform, allowing customers to tackle the power of SIEM and use their HP ArcSight Enterprise Security Management (ESM) deployments for correlating with other contextual information, issue alerts and signal appropriate remediation.

HP senior vice president and general manager of enterprise security products Sue Barsamian said: "Organisations today are faced with growing volumes of security data and without the ability to separate the signal from the noise they can fall victim to undetected malware attacks, which can have serious financial and operational impact.

"The new HP DNS Malware Analytics solution effectively puts the data science necessary to derive malware detection from voluminous DNS server events into a simple, highly efficient package for customers large and small, and when combined with the powerful HP ArcSight SIEM platform, provides next-generation SIEM capabilities to better protect the enterprise."

The company has also unveiled HP Fortify scan analytics to further support its focus on data-driven security.

The machine-learning technology will harness the power of an organisation’s application security data to enhance accuracy and efficiency of application security solutions, HP said.

HP User Behavior Analytics (UBA) offers customers visibility into user behavior to identify malicious or negligent users, or external attacks that compromise user accounts throughout the organisation.