![](http://welcome.hp-ww.com/img/s.gif) |
» |
|
| ![Content starts here](http://welcome.hp-ww.com/img/s.gif) |
![security safe](images/security.jpg) |
|
Research opportunities |
![](http://welcome.hp-ww.com/img/s.gif) |
![](http://welcome.hp-ww.com/img/s.gif) |
In terms of information security, we live in an ever more dangerous world.
Fresh computer viruses and worms pop up regularly, with each generation potentially creating bigger problems than the last. Hackers keep finding new ways to attack, break into and steal data from enterprise computer systems; businesses worldwide also worry about corporate espionage and cyber terrorism.
Meanwhile, networks have grown larger, more complex and more distributed. Typically, they now serve not only diverse groups of onsite users, but remote and mobile employees, and external partners as well. As a result, those networks are increasingly vulnerable to security breaches.
|
|
Our approach |
![](http://welcome.hp-ww.com/img/s.gif) |
![](http://welcome.hp-ww.com/img/s.gif) |
We are tackling security from a business perspective, as well as a technical one. An enterprise has thousands of components consisting of networking hardware (firewalls, routers, switches), infrastructure components (Web, database, application, and directory servers), and applications (HR, finance, supply chain).
Each of these components has its own concept of security; for each, security is managed by different people, different organizations and different geographies. This process is expensive, error-prone and slow to adapt.
In one key effort, we are exploring techniques to allow enterprises to move away from low-level configuration processes and towards policy-driven, automated approaches to managing the security of devices and applications.
|
|
![](http://welcome.hp-ww.com/img/s.gif) |
|
Security & compliance |
![](http://welcome.hp-ww.com/img/s.gif) |
|
|
|