|
What's the problem?
- Currently applications are responsible for enforcing data security policy - bad idea!
- We want controls on how data may flow independently of what an application (or attacker in charge of an application) may allow
- We want these controls to fit in naturally with the needs of higher level business policies
- We want controls over ANY application without requiring application modification / specialized applications
What are we doing?
- Capture and tagging of "invisible" data use / flow within a process
- OS policy enforcement framework (Linux/Windows)
- Overall solution combines IBE, tagged OS and TCPA (Trusted Computing Platform Alliance) certification
For more information contact:
Richard Brown, Department Manager richard.brown@hp.com
|
|
|
|