Other software works on ways to transform applications while minimizing risks like compliance or dependence on the software by a remote department, then put it in a cloud environment, untied to any particular server if that is appropriate. (This stage is where the Microsoft part comes in.) Afterward, there is a security assessment, checking software for security attacks in real time.
FORBES: HP's Push To Higher-Value Applications