AI Insights
Showing results for 
Search instead for 
Did you mean: 

Enhancing Infrastructure Security Throughout the Entire IT Lifecycle


Emerging technologies help businesses capitalize on new opportunities but they also introduce IT risks. HPE ProLiant Gen10 takes away that risk by delivering the world’s most secure industry-standard servers.

Blog_IT_Lifecycle.jpgJust how much does cybercrime cost? According to the Ponemon Institute 2016 report, the cyberthreat environment continues to escalate with companies losing $9M, on average, each year due to cybercrime.

Why you need the latest IT security innovations

Your business faces an enigmatic problem in light of this information: Deploying emerging technologies is mandatory to capitalize on new opportunities and to streamline workflow processes; but they also introduce new data protection risks.

IT teams are also exasperated by the security threat landscape, which is increasing, and attacks are now more sophisticated. Ransomware attacks, which hold data hostage, are particularly hard to avoid.

Because most defense mechanism focus on protecting software, cybercriminals now target the IT infrastructure itself—specifically server firmware. It’s no longer adequate to limit defenses to just a firewall. Today’s cyber environment requires defense in depth with full capabilities in not only protection, but also detection and recovery.  Businesses must turn to the latest enterprise IT security innovations to prevent, detect, and recover from cyberattacks.

The world’s most secure industry-standard servers to the rescue

With the announcement of HPE Gen10 solutions, we have unveiled a strategy to protect and recover  server infrastructure. HPE ProLiant servers offer unique server firmware security that prevents denial of service situations, detects malware attacks and recovers from cyberattacks. With HPE Gen10 ProLiant Servers, business can preserve their data and run their day-to-day operations without the risk of interrupted workflows.

HPE delivers this comprehensive security vison, from cradle to grave on our ProLiant servers through HPE Secure Compute Lifecycle Thanks to this focus on security, HPE is now shipping Gen10 ProLiant servers designated as the world’s most secure industry-standard servers. Yes, it’s a bold claim, but we back it up based on several key attributes as verified by an external security firm:

  • We design our own custom HPE iLO silicon chipset, which provides the anchor for firmware manageability. We physically change the configuration of the iLO silicon by opening gates and embedding a cryptographic algorithm that is used as the anchor to secure the rest of the server firmware. The firmware is then built into the silicon, using the connecting to the silicon as verification that the firmware is free of any malware or compromised code. This all happens at the start of the production process, which makes it possible for HPE to secure the entire supply chain and maintain integrity throughout the server’s development, production, and distribution lifecycle.
  • Throughout the production lifecycle, the firmware is continuously monitored to determine if any compromises occur. The servers also alert customers immediately—it no longer takes a long time to detect an attack in the firmware.
  • If a compromise should occur, the servers immediately roll back the firmware to either the last know good state, or the original factory settings. We can do this because we created a secure “lock-box” secondary location inside the server where firmware is stored that cannot be accessed, unless a server needs to be recovered.

HPE is also the first server manufacturer to announce support for the new Commercial National Security Algorithms, as established by the National Security Agency, which provides the strongest level of protection and security cyphers in the world today.

Leaving no security stone unturned

These attributes are supported by other key components of the HPE Secure Compute Lifecycle. Our Supply Chain Risk Management Framework is based on recognized international standards and best practices that are fully compliant with the Contractor Counterfeit Electronic Part Detection and Avoidance System. We are also members of the U.S. Government Industry Data Exchange Program for suspect counterfeit monitoring, investigation and reporting.  

As recommended by the SAE International Aerospace Standard, we diligently monitor and investigate multiple credible sources for reports of suspect and confirmed counterfeit parts. To further enhance the security of Gen10 solutions, we adhere to the standards of a host of other independent programs designed to ensure server firmware protection:

  • The NIST Cybersecurity Framework and Security & Privacy Controls
  • ISO 27001/27002
  • Safeguarding Covered Defense Information and Cyber Incident Reporting requirements
  • ISACA Cobit 5
  • The International Society of Automation
  • The Centers for Internet Security—Critical Security Controls 

Our participation in these programs illustrates how we take security very seriously for our customers. To find out more about how HPE Gen10 solutions create a secure IT infrastructure that enables your business to defend against cyberattacks and win the battle against ransomware, visit the HPE website.

Related links

0 Kudos
About the Author


Bob leads the partner software organization for the server division. His team is also responsible for productizing the new HPE security technologies and delivering a comprehensive approach to security across all solutions.

Online Expert Days - 2020
Visit this forum and get the schedules for online Expert Days where you can talk to HPE product experts, R&D and support team members and get answers...
Read more
HPE at 2020 Technology Events
Learn about the technology events where Hewlett Packard Enterprise will have a presence in 2020
Read more
View all