- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- Fortify your server storage with controller-based ...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Fortify your server storage with controller-based encryption
Cybercriminals are adapting quickly, crafting more sophisticated, long-term attacks. To meet these challenges, HPE has developed a striking solution to data security: Controller-Based Encryption.
I donโt mess around with home security. If I could have six English Mastiffs and a guard tower on my property, I would. Unfortunately, I donโt think my wife wants six more snarling, drooling mouths to feed. Plus, Iโve been told by the experts that these areโฆmedieval techniques for preventing home intruders. In fact, ever-evolving technologies have made guard dogs obsolete. (Tell that to the kids from โThe Sandlotโ.)
Now you can rig up your home with as many motion capture and video streaming devices as your heart desires. You can see live in HD whoโs ringing your doorbell from two states away. Some services even detect floods or freezing temperatures, feature remote monitoring systems, and automatically recognize authorized home visitors.โNotably, I havenโt granted my daughterโs new boyfriend access yet.
HPE has made equal strides in securing our clientsโ server storage environments. New tech requires new security measures. And the adoption of hybrid IT, the Internet of Things, and mobile networks has opened businesses up to whole new categories of threats. Cybercriminals are adapting at a rapid clip, crafting more sophisticated, long-term attacks, and penetrating server firmware at the code level. Thatโs not to mention new government regulations and mounting pressure to improve Service Level Agreements. โ And the best SLAs require security at the hardware level. To meet these challenges, HPE has developed a striking solution to enterprisesโ data security woes: Controller Based Encryption (CBE).
The new standard for secure data storage
The latest (10th) generation of Smart Array Controllers secures data before itโs ever even stored on a drive. Itโs called HPE Secure Encryption, and itโs quite the breakthrough in an industry that has, for too long, depended on self-encrypting drives (SEDs) for data security.
SEDs are a great product if you only have one drive, but the costs add up when you add this technology to every drive in an enterpriseโs data center. They also have some notable security flaws. For instance, SEDs only encrypt data once it reaches the drive.
Controller based encryption, on the other hand, encrypts all data as soon as it hits the controller, protecting your data from the PCIe bus all the way to the drive, including cables and the flash-backed write cache. Think of it as an extra level of protection for your most sensitive data.
And believe it or not, CBE is friendly to your wallet. HPE Secure Encryption is the lowest overall operational overhead solution because of its ease of deployment and management. You donโt need special training for common storage operational tasks like drive replacements and logical device configurations, and CBE requires fewer individuals to control, lowering the technical overhead and reducing the circle of trust.
Controller based encryption is compatible with every drive in the HPE portfolio, and weโre the only company that has it. Itโs compliant with FIPS at various levels, as well as HIPAA, Sarbanes-Oxley, and even the EUโs GDPR.
If you want to dive deeper into the technical features that keep your server storage interface secure, download our quick spec with information on Enterprise Secure Key Management, dynamic encryption, Flash-Backed Write Cache, and more.
Beyond the controller
HPE is leading the industry in server storage security. We make strides to protect your data from the server factory to your first boot and setup, and beyond.
Integrated Lights Out (iLO): Controllers work with this server tool to provide you with the ability to configure, monitor, and update your servers seamlessly, from anywhere in the world. iLO even uses machine learning to identify malicious behavior, which is crucial in detecting those long-term cyberattacks that lie dormant in firmware indefinitely.
Silicon Root of Trust: By binding essential firmware into HPE-manufactured silicon, weโve prevented our servers from being booted without recognizing a unique fingerprint in the silicon itself. During the boot process, the firmware scans itself to identify any malicious code that may have been written into it.
Supply Chain Fortification: Achieve peace of mind knowing HPE servers havenโt been tampered with on their way to your data center. We only source from Trade Agreements Act designated countries, and highly vet our component vendors against anti-counterfeiting laws. By securing our supply chain, we secure the firmware code built into our servers.
Security Certifications and Compliance: You name it, weโve got it. Commercial National Security Algorithms (CNSA) certificationโcheck; US FIPS validation at multiple levelsโcheck; Common Criteria for Information Technology Security Evaluationโcheck. HIPAAโcheck. Sarbanes-Oxleyโcheck. And even the EUโs GDPR.
Fortify your server storage
Meeting todayโs most complex threats doesnโt require an army of guard dogs or a big stone fortress. It requires the ingenuity found in HPE Secure Encryptionโthe only controller-based encryption method on the market.
Cole Humphreys
Hewlett Packard Enterprise
twitter.com/HPE_Servers
linkedin.com/showcase/hpe-servers-and-systems/
hpe.com/servers
- Back to Blog
- Newer Article
- Older Article
- Dale Brown on: Going beyond large language models with smart appl...
- alimohammadi on: How to choose the right HPE ProLiant Gen11 AMD ser...
- Jams_C_Servers on: If youโre not using Compute Ops Management yet, yo...
- AmitSharmaAPJ on: HPE servers and AMD EPYCโข 9004X CPUs accelerate te...
- AmandaC1 on: HPE Superdome Flex family earns highest availabili...
- ComputeExperts on: New release: What you need to know about HPE OneVi...
- JimLoi on: 5 things to consider before moving mission-critica...
- Jim Loiacono on: Confused with RISE with SAP S/4HANA options? Let m...
- kambizhakimi23 on: HPE extends supply chain security by adding AMD EP...
- pavement on: Tech Tip: Why you really donโt need VLANs and why ...
-
COMPOSABLE
77 -
CORE AND EDGE COMPUTE
146 -
CORE COMPUTE
130 -
HPC & SUPERCOMPUTING
131 -
Mission Critical
86 -
SMB
169