140 likes | 357 Views
Security Research at HP Labs. Bill Horne, Project Manager, HP Labs. Roles of HP labs. HP strategy creation Strategically aligned technologies New opportunities for HP Fundamental science. HP Labs worldwide. http://www.hpl.hp.com. St. Petersburg. Bristol. Princeton. Palo Alto.
E N D
Security Research at HP Labs Bill Horne, Project Manager, HP Labs
Roles of HP labs • HP strategy creation • Strategically aligned technologies • New opportunities for HP • Fundamental science
HP Labs worldwide http://www.hpl.hp.com St. Petersburg Bristol Princeton Palo Alto Beijing Tokyo Haifa Bangalore ~600 employees worldwide
HP research and development $3.6B spent on R&D in FY07 Business unit focus – current and next generation products Next-generation products 1 – 2 years Current products Current
HP Labs 5% of R&D Disruptive/Emerging technologies Technology advancements Breakthrough technologies 3 – 15 years Next-generation products 1 – 2 years Current products Current
HP’s first computer: the HP 2116a Visualization HP Indigo Digital Press “SHREK-2” – Flexible Computing Thermal Inkjet Printing HP first laser printer Memory Spot Chip HP-35, the first scientific handheld calculator Deterrence methods that could be used in printing currency Data Mining/Clustering HALO Life Size Collaboration Product Tracking Utility Computing Social Networking Email Spectroscopy RISC Architecture Dynamic Smart Cooling Adaptive Infrastructure – Model Based Automation
Security context Research Challenges Develop quantitative information-systems risk management that is at least as good as quantitative financial risk management Narrow the policy and assurance gaps with automated, optimizable technology Transform operations from ad hoc point solutions to unified, coordinated technologies policygap understandrisk mechanism TRENDSOpen/Service-Centric ITRise of CybercrimeBusiness/IT alignment infrastructureoperations monitoring compliance assurancegap
Trust EconomicsFeasibility Study For UK Government Seek to develop analytical tools to advise CEO/CIO/CISOs on information security investments in people, process, and technology Take account of human vulnerabilities and system vulnerabilities Integrate system models, human behaviour models, and economic models Initial studies have included empirical work on user’s attitudes to USB memory stick security policies Empirical study Conceptual Models Predictive, Executable Math Models
Trusted infrastructure HP is a founding member of the Trusted Computing Group 160+ members Developing, defining, and promoting open, vendor-neutral industry specifications for trusted computing Hardware building blocks Software interface specifications Multiple platforms, peripherals, and devices Benefits More secure storage of data Lower cost, more secure user authentication Secure platform authentication Multiple anonymous trusted identities Network access control
Role discovery Problem Controlling access to myriad systems and applications in large enterprises is complex and labor-intensive. Role Based Access Control (RBAC) simplifies the problem. Converting a conventional access control system into an RBAC system is a major challenge. Solution Graph theoretic approach to finding inherent roles in traditional access control systems. Assists top-down role development. Application Helping HP IT simplify management of limited network access for external business partners. Developing network Access Control Lists (ACLs) is one of the most resource-intensive parts of this process Role discovery in conjunction with top-down role development will enable network engineers to create role-based ACLs in 43% less time than conventional ACLs, resulting in a significant annual savings. entitlements users users roles entitlements conventional access control role-based access control
Model based assurance Technology to allow enterprises to model their control architecture Focused on automating the testing and reporting of controls Integration with security analytics and correlations more traditionally used for security monitoring How to use the modeling framework to orchestrate and integrate the different assurance reporting requirements of auditors, security officers, application owners, risk officers and compliance officers Working internally with HP Audit to develop models
HP Labs and the customer value chain Customer HP Labs R&D Service R&D in business units Sales Businessunitmanage-ment