Recommended for you
Moor Insights and Strategy Project Aurora research brief
Moor Insights and Strategy Project Aurora research brief
Download the Moor Insights and Strategy Project Aurora research brief
Get the analyst brief

Full stack security that automatically detects threats in seconds and minimizes risk

Project Aurora extends our silicon root of trust to deliver an embedded security platform that continuously and automatically protects infrastructure, operating systems, software platforms and workloads without signatures, significant performance trade-offs, or lock-in.

Get the fundamental building blocks for a comprehensive zero trust security framework

With Project Aurora, you can prevent and detect compromise in the hardware and software components of a remotely managed HPE system through standardized continual measurement, attestation, and verification of everything. It helps you transform security from a barrier to an innovation accelerator – from silicon to your workloads.

Increase data value through attestation and verification

Rooted in silicon, Project Aurora helps ensure the value and fidelity of your infrastructure, platform and workloads by continuously validating critical components to identify changes caused by malicious code in the operating environment.

Accelerate innovation using strongly attested identities.

Secure rapidly changing hybrid IT investments by assigning secure identities on a platform verified from supply chain to the workload.

Identify attacks and protect investments

Project Aurora security capabilities continuously identify zero-day attacks to thwart loss or corruption of your mission-critical systems. Fortify your existing security strategy, minimize risk, and maximize the effectiveness of existing investments by 

About Project Aurora

Learn how Project Aurora security capabilities are unlike other industry offerings from public cloud service providers or systems providers. Project Aurora provides a complete security architecture with new embedded and integrated security solutions starting at the at the silicon level. Learn how Project Aurora is ignited in the supply chain and establishes an immutable chain of trust up through the infrastructure, operating system (OS), software platform and workloads without requiring signatures, significant performance trade-offs or lock-in.

The initial release of Project Aurora security capabilities will be embedded within the cloud modules to automatically and continuously verify the integrity of the hardware, firmware, operating systems, platforms, and workloads, including workloads from security vendors, too. This continuous attestation will enable HPE to quickly detect advanced threats in seconds1. This can help minimize data loss and unauthorized encryption (and corruption) of valuable data and intellectual property.

In the future, HPE will embed open-source technologies like SPIFFE and SPIRE into Project Aurora to enable our DevOps and security engineers to deliver workload identities rooted in continuously verified HPE hardware. This entire capability will eventually be embedded across HPE GreenLake cloud services and the HPE Ezmeral software portfolio.

Supply Chain Trust

HPE's supply chain security processes prevent tampering, unauthorized activity by authenticating all components - from manufacturing, shipping, customer use and to end of life. Plus, only HPE Trusted Supply Chain provides a new first line of defense against cyber-attackers with select servers built to the world’s toughest security standards in secured facilities.

Infrastructure trust

Project Aurora builds on HPE’s industry-exclusive silicon root of trust technology, which has been recognized by cyber insurers for reducing risk and enabling the world’s most trusted industry-standard servers. By anchoring our security in the silicon HPE prevent tampering of hardware, firmware, and server configuration HPE’s Server security ensures the server boots in a known good state and continues to run in a known good state throughout its lifecycle.

OS and Hypervisor trust

Project Aurora provides a layered set of protection, including the running Operating System. At this layer, Project Aurora allows customers running supported hardware and operating systems to remotely verify that key components in a supported HPE server have not been compromised during maufacture and the supply chain.

Platform trust

Protect against compromised software supply chain and vulnerable software. Prevents tampering of middleware platform (e.g., container); asserts key platform processes have not been modified at start and continuously while running.

Workload trust

Enterprises are increasingly challenged to protect their IP and meet the ever-evolving world of regulatory requirements designed to protect them, their customers, and partners. Meeting these requirements requires them to assert the provenance and integrity of communication between their workloads, which are increasingly distributed across data centers, public cloud providers, and edge devices.

Frequently asked questions about HPE Project Aurora

What is HPE Project Aurora?
HPE Project Aurora is a security platform that extends HPE's silicon root of trust with new embedded and integrated solutions. Project Aurora works automatically and continuously, verifying that all infrastructure, operating systems, platforms, and workloads are trustworthy. This provides the foundation for a zero trust security approach and enables us to detect threats that might otherwise result in data loss or corruption.
Does HPE Project Aurora enable zero trust security?
HPE Project Aurora enables zero trust security by having a zero trust model built into its hardware.
What are HPE Project Aurora's security capabilities?
Project Aurora increases data value through attestation and verification, accelerates innovation by laying a zero trust foundation, and identifies attacks and protects investments.