HPE Community read-only access December 15, 2018
This is a maintenance upgrade. You will be able to read articles and posts, but not post or reply.
Hours:
Dec 15, 4:00 am to 10:00 am UTC
Dec 14, 10:00 pm CST to Dec 15, 4:00 am CST
Dec 14, 8:00 pm PST to Dec 15, 2:00 am PST
Infrastructure Insights
cancel
Showing results for 
Search instead for 
Did you mean: 

Secure servers are key to overcoming ransomware

Bob_Moore

 

While organizations are falling victim to ransomware attacks at an alarming pace, the Silicon Root of Trust inside HPE Gen10 secure servers provides organizations with an alternative.

Server Security Blog.jpgThe crippling effects of ransomware can quickly become a nightmare for data-driven companies. In fact, the FBI identified pervasive ransomware as one of four key factors impacting organizations today, according to a webinar HPE hosted with the FBI's James Morrison.

In 2017 alone, ransomware cost the global economy $5 billion, according to Cybersecurity Ventures—15 times the figure for 2015. Ransomware is so pervasive now that in the next year, a company will be impacted every 14 seconds, reports Cybersecurity Ventures. As ransomware grows exponentially, the need for secure servers also intensifies.

Protecting the enterprise with secure servers

Obviously, the preferred route is always to avoid ransomware situations altogether. Prevention starts with practicing good security hygiene. Far too often, employees will innocently click on the wrong link or fail to have strong enough passwords to thwart attacks. Providing companywide training to make sure everyone understands the enterprises' protocols, processes, and procedures can play a key role in eliminating the effectiveness of a targeted attack.

Specifically, phishing emails can be quite nefarious—such as an urgent message seemingly from the CFO asking for clarification and approval to pay an invoice. This type of message can give recipients a real sense of urgency to act; unfortunately, as soon as an employee clicks on the link, it infects the entire company.

Organizations can have great protection, but the reality is that hackers can attack from various places. Many attacks even come from within the firewall, making it inevitable that companies will have to deal with a cyberattack at some point.

However, this doesn't mean that it's necessary to suffer the full consequences of a breach. With the Silicon Root of Trust, HPE Gen10 servers empower organizations to recover and restore their data without actually paying the ransom.

Embracing the benefits of the Silicon Root of Trust

The HPE Gen10 secure servers provide unparalleled protection through something known as the Silicon Root of Trust. Moor Insights and Strategy describes the technology in a recent white paper: "HPE's Silicon Root of Trust provides protection as soon as the server is powered on and the Integrated Lights Out (iLO) firmware comes alive. As the server initializes, its firmware is compared against an immutable fingerprint stored in iLO 5 to verify that all the firmware code is valid and uncompromised." Unlike other offerings that base protection within firmware code, the Silicon Root of Trust provides an anchor.

When protection is code-based firmware, it doesn't have anything to compare itself against. As such, it cannot accurately detect whether an attacker has inserted malware or infected code. Someone can write compromised code, insert it into the firmware, and trick the server into recognizing it as good code. When the protection is permanently within the hardware—or silicon in HPE's case—it provides an anchor, or fingerprint. Although there are millions of lines of code inside this server control plane, even the slightest change is noticeable, because it compares against a cryptographic fingerprint embedded within the silicon.

Evaluating recovery and restoration services

The manual process to recover and restore a data center after a ransomware attack is quite extensive. According to the Accenture Cost of Cyber Crime Study, the average ransomware attack time to recovery is 23 days, at an average cost of $2.4 million. Because ransomware often results in bricked servers, the recovery process usually includes a costly rip and replace of vital mission-critical equipment.

Rather than going through this laborious process, the new HPE Server System Restore provides companies with a somewhat automated restoration process, starting by recovering the firmware and the settings that go along with it. It also facilitates the restoration of the operating system and helps bring back the applications. Then, it has the ability to restore data from a protected backup copy isolated from the ransomware. Rather than taking weeks or even months to accomplish, this automated approach takes a matter of hours.

Obviously, certain businesses are more susceptible to becoming targets. For instance, organizations that handle sensitive workloads are prime targets. This includes data on economics or financial, national, and industrial security, as well as government research and development. Understandably, these firms are most likely to benefit from the type of protection provided by the HPE Silicon Root of Trust. However, it's crucial to remember that the need for security transcends all workloads. Simply put, organizations today run on data, and losing access to that data is never acceptable.

Learn more about how the HPE Server System Restore provides the type of protection today's organizations need to successfully fight ransomware threats.

0 Kudos
About the Author

Bob_Moore

Bob leads the partner software organization for the server division. His team is also responsible for productizing the new HPE security technologies and delivering a comprehensive approach to security across all solutions.

Events
Nov 27 - 29
Madrid, Spain
HPE Discover 2018 Madrid
Learn about all things HPE Discover 2018 in Madrid, Spain, 27 - 29 November, 2018.
Read more
See posts for
dates/locations
HPE at 2018 Technology Events
Learn about the technology events where Hewlett Packard Enterprise will have a presence in 2018.
Read more
View all