Converged Data Center Infrastructure
Showing results for 
Search instead for 
Do you mean 

Today your converged infrastructure security depends on APIs. How secure are yours?

KristenReyes on ‎11-18-2013 12:12 PM

Guest blog by Bryan Jacquot, Chief Technologist, HP Converged Systems


Data center managers have to always be on guard against the loss of intellectual property and sensitive proprietary data, a task complicated by the limitations of traditional infrastructure management tools. To maintain the integrity of your converged infrastructure, you need a management platform with security built in from the ground up. A key part of establishing this security is making sure that your platform’s is not letting in threats.


Why does the security of your platform matter so much? As the BYOD trend grows and the data center expands into to the cloud, the number of access points for intrusions grows. In addition to overseeing the safety of data in public, private, and hybrid clouds, data center managers must now provide security for devices they do not control. Although most workers are aware that using their own devices for work can make them more productive, few may realize that their smartphone or laptop could compromise data security. The user interface and RESTful APIs provided by HP OneView converged infrastructure management platform can help you maintain a secure defense against such threats.


Keep credentials out of the hands of hackers


According to a recent study commissioned by HP Enterprise Security[1], the average cost of cyber crime to a business last year was $11.6 million. In the event of a breach, your business stands to take a hit to its revenue, its productivity and, perhaps most damaging, its reputation.


What does it take to thwart would-be data thieves? Without fail, your converged infrastructure management platform should be built with interfaces that use the cryptographic SSL protocols, to preserve data confidentiality and message integrity. SSL protocols have long been considered standard in applications such as web browsing, email and voice over IP (VoIP). They’re absolutely essential for the interfaces in your data center.


To prevent hackers from eavesdropping and hijacking credentials from users, your interfaces should also support the HTTPS communications protocol. Relying only on HTTP leaves your system vulnerable to intruders and opens the door to crimes such as identity theft and the loss of credit card or other proprietary data.


Secure by design


HP OneView incorporates security into its foundation. Designed with a uniform RESTful API interface and an HTML5 user interface, HP OneView uses SSL and HTTPS to safeguard your entire infrastructure.

In addition, HP OneView went through the rigorous HP comprehensive applications threat analysis (CATA) to deliver an optimal level of security. HP CATA combines HP’s security and software quality management expertise to develop highly secure solutions. By analyzing all of the platform components early in the development lifecycle to identify vulnerabilities and implement changes prior to coding, HP CATA guards against the chance of introducing possible security holes for hackers to exploit. No matter what method workers use to access your data center, HP OneView helps keep your business’s most valuable assets secure.


Finally, HP OneView is delivered as a secure appliance that is locked down tightly with any unnecessary attack surface removed.  This hardened appliance is secure by design to protect your infrastructure.


Was your converged infrastructure management platform designed to give you peace of mind? See one that is. Download HP OneView software free for 60 days.

[1] 2013 4th Annual Cost of Cyber Crime Study Results: Americas. Sponsored by HP Enterprise Security, independently conducted by Ponemon Institute LLC.


About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
January 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during the online Expert Days - see details below. Software experts do not monitor this foru...
Read more
See board event postings
Vivit Events - 2016
Learn about upcoming Vivit webinars and live events in 2016.
Read more
View all