AI Insights
cancel
Showing results for 
Search instead for 
Did you mean: 

New FedTech report: HPE ProLiant DL380 Gen10 can secure any federal IT environment

Bob_Moore

Insights from FedTech report: Deploying technology innovations increases the likelihood and the cost of cybercrime, but you can offset the risk by implementing a high-security profile supported by HPE ProLiant DL380 Gen10 servers.  

FedTech report_Gen10_blog.jpgThe government sector is taking notice of HPE ProLiant Gen10 servers. A recent review by FedTech shows how HPE ProLiant DL380 servers can secure nearly any federal IT environment. By providing a range of flexible configurations, the servers can function as part of a private cloud, anchor the core of virtual machines, facilitate deployment of containers, store database applications, and process Big Data transactions.

Here’s a sampling of the computing firepower generated by HPE ProLiant DL380 Gen10 servers:

  • Intel® Xeon® processors with up to a 71% performance gain and a 27% increase in cores.
  • HPE 2666 MT/s DDR4 SmartMemory—supporting 3.0 TB and up to 11% faster than 2400 MT/s.
  • Support for 12 Gb/s SAS and up to 20 NVMe drive.
  • HPE Scalable Persistent Memory—offering unprecedented levels of performance for databases and analytic workloads.

Eliminating gaps hackers like to exploit

FedTech also emphasizes the IT security measures offered by HPE ProLiant DL380 servers. A Silicon Root of Trust leverages an HPE silicon-validated boot process to ensure the servers can only be started using code from an immutable source. An anchor for the boot process that’s rooted into the HPE silicon cannot be updated or modified in any way. By combining this foundation with a cryptographically secured signature, the ProLiant DL380 servers eliminate the gaps that hackers like to exploit.

Because the Silicon Root of Trust is hardwired into the HPE iLO5 silicon in the fabrication facility, it’s virtually hack proof against firmware threats like rootkits, malware, and denial of service attacks—especially when combined with intrusion detection devices that can provide an audit log alert if someone tries to get into the server chassis and implant compromised code.  

HPE ProLiant DL380 servers also run a series of validation checks between the various system components and the firmware each time the systems power up. This allows the HPE ProLiant servers to test and verify that no modifications have been made to the server’s essential firmware during boot up.

It’s a little known fact that ProLiant DL380 servers, like all servers, run millions of lines of firmware code before the operating system (OS) even starts.  Making sure all those lines of firmware code are free from any malware or compromised code is the differentiated value the silicon root of trust provides.  

Beating the high cost of cybercrime

A report by the Ponemon Institute found that cybercrime costs every company an average of $17 million in the U.S. each year. The report also found that companies with a high enterprise IT security profile can improve their data protection measures and decrease the cost of cybercrime.

For example, as part of its review, FedTech attempted an advanced malware attack, which normally would alter boot-level instructions. As soon as the ProLiant DL380 executed the daily security sweep, the compromised code was easily detected because it didn’t match the firmware-based immutable hash in the HPE silicon. That triggered the secure HPE recovery mode, which rolled the server firmware code back to factory defaults, and restarted the server with validated good firmware code.

Deploying servers that provide this level of IT infrastructure security is becoming more critical as federal agencies and businesses deploy technology innovations.

For more information on the cost of cybercrime to the global economy, download the 2016 Cost of Cyber Crime Study & the Risk of Business Innovation report by the Ponemon Institute. And be sure and read the FedTech review: HPE's ProLiant DL380 Gen10 Server Lets Feds Handle Any Computing Task.

0 Kudos
About the Author

Bob_Moore

Bob leads the partner software organization for the server division. His team is also responsible for productizing the new HPE security technologies and delivering a comprehensive approach to security across all solutions.

Labels