- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- Cybersecurity: What does it take to tackle the rea...
-
- Forums
-
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
- HPE Blog, Austria, Germany & Switzerland
- Blog HPE, France
- HPE Blog, Italy
- HPE Blog, Japan
- HPE Blog, Middle East
- HPE Blog, Russia
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
-
Blogs
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Blog, Latin America
- HPE Blog, Middle East
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
-
Information
- Community
- Welcome
- Getting Started
- FAQ
- Ranking Overview
- Rules of Participation
- Tips and Tricks
- Resources
- Announcements
- Email us
- Feedback
- Information Libraries
- Integrated Systems
- Networking
- Servers
- Storage
- Other HPE Sites
- Support Center
- Aruba Airheads Community
- Enterprise.nxt
- HPE Dev Community
- Cloud28+ Community
- Marketplace
-
Forums
-
Blogs
-
Information
-
English
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
Cybersecurity: What does it take to tackle the real, pervasive and growing threat?
According to the FBI, there are two kinds of companies: those whoโve experienced a cybersecurity hit and know it, and those that have had a penetration and donโt know it. In other words, the threat is real, pervasive, and growing, costing the global economy billions of dollars every year. Identifying the vulnerabilities at your site is key because it illustrates how much risk exists for your company. Helping you identify your risks and managing them is part of the DNA makeup in HPEโs security strategy.
Extending security leadership
Today, HPE is extending our security leadership, building on the foundation of the HPE Silicon Root of Trust , across our HPE ProLiant, Apollo, and Synergy lines of servers.
By building on our existing security foundation, we are extending our security capabilities with breakthrough technologies and services to ensure our customers are protected throughout the entire lifecycle of their compute infrastructure. One key area of focus is to identify potential risks. This is an incredibly important first step because it lays the foundation to support and effectively manage cybersecurity-related vulnerabilities.
To enable improvements in cyber risk identification, HPE is delivering the following:
- Security Dashboard: This dashboard gives you the ability to monitor the security condition of your servers with several new features that include inspecting and ensuring correct password strength, determining if the Intelligent Platform Management Interface (IPMI) is active, and if the last security scan of server firmware was successful.
- Aruba ClearPass Device Insight: This platform delivers machine learning and crowdsourcing to automate the discovery and fingerprinting of all IP-enabled managed or unmanaged devices, along with IoT devices, on any wired or Wi-Fi network.
- Security risk management and digital protection services: These critical services are designed to help you understand the risks that your business assets and applications are exposed to. HPE Pointnext can conduct a vulnerability scan, penetration testing, threat modeling, and phishing assessment on your critical assets to help you to proactively protect physical and virtual assets, as well as your data in the cloud.
Beyond providing invaluable risk assessments and ensuring that your server infrastructure is protected from cradle to grave, weโve introduced a variety of features that will help harden the security throughout a serverโs lifecycle:
- Server Configuration Lock: Everyone is familiar with tamper-proof packaging that ensures that no one has meddled with a product before it reaches the consumer. HPE Server Configuration Lock does just that by โsecuringโ your servers from the time they leave the HPE warehouse until the time you deploy them, ensuring that your server is fully protected from malicious intent while in transit.
- Firmware Downgrade Prevention: This attribute locks-in the most recent version of server firmware to prevent a hacker from potentially downgrading to an older version of firmware that might have known vulnerabilities which could be exploited.
- One-Button Secure Erase: This feature allows you to easily and securely erase all user data on a server, its secondary storage, as well as NVRAM to NIST-800-88r1 standards, with a click of a button, allowing your servers to be securely retired or redeployed.
Building on HPE leadership and unique security foundation
All of these new products and features build upon HPEโs existing server infrastructure security foundation, with features like the HPE Silicon Root of Trust, HPE Firmware Runtime Verification, HPE Firmware Recover, and HPE Server System Restore.
Your server infrastructure should be your strongest defense, armed with the latest innovations to guard against and recover from security attacks. In todayโs world, where cyber crime threats are accelerating, limiting security to firewalls is no longer enough. You need to protect your enterprise and valuable data assets with innovations in firmware protection, malware detection, and firmware recovery โ right down to the silicon.
Why not get out ahead of cyber threats?
Contact your HPE sales rep or HPE Authorized Partner to find out what you should be thinking about when it comes to cybersecurity for your business.
Bob Moore
Hewlett Packard Enterprise
twitter.com/HPE_Servers
linkedin.com/showcase/hpe-servers-and-systems/
hpe.com/servers
- Back to Blog
- Newer Article
- Older Article
- L_Engebretson on: Just announced: HPE OneView 5.2. Whatโs new? Plent...
- RobertChecketts on: How virtual server security and compliance procedu...
- ryaneharris1 on: Achieve a global view into your IT Infrastructure ...
- ryaneharris1 on: What's New with HPE OneView 5.0?
- ColeHumphreys1 on: What are RAID levels, and which are best for you?
- EzmeralExperts on: Whatโs New with HPE OneView? Bring more composabil...
- hpdave on: HPE InfoSight: Playing in a league of its own and ...
- sansan_strozier on: Let the sun shine in with HPE Hybrid Cloud Small B...
- ComputeExperts on: HPE InfoSight for servers: how weโre expanding the...
- sansan_strozier on: Introducing the HPE ProLiant DL20 Gen10 and HPE Pr...
-
Composable
102 -
Core and Edge Compute
153 -
Data Analytics and DataOps
1 -
IT Automation and AIOps
22 -
Mission Critical
52 -
SMB
124
Hewlett Packard Enterprise International
- Communities
- HPE Blogs and Forum
© Copyright 2021 Hewlett Packard Enterprise Development LP