- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- Cybercrime pays, and companies are writing big che...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Cybercrime pays, and companies are writing big checks
Cybercrime is one of the worldโs largest industries and defending against it is one of the largest IT spends companies make these days. HPEโs 360-degree view of security is meeting that challenge.
When we think of large, global industries, there are very few in the massive realm of trillions of dollars. The global healthcare industry, the global education market, the global construction industryโฆ each claiming roughly ten trillion dollars per year.
Thus, it might surprise some people to learn that cybercrime ranks up in that lofty group as one of the worldโs largest industries. It's expected to reach over $10 trillion dollars by 2025. And it's not content with its status either. Cybercrime is one of the fastest growing industries at roughly 15% each year. 1
Two out of three companies expect that their greatest IT spending category will be on fortifying their cyber defenses, with an expected 3.5 million roles in companies dedicated to cyber protection. 1,2
The vast amount of money and armies of people needed to fight cybercrime becomes apparent when looking at all the challenges companies, and individuals, need to address.
- Persistent malware and ransomware attacks
- Social engineering and phishing attacks
- Cyber syndicates and state attacks from organized crime and rogue nations
- Growing use of artificial intelligence and machine learning to supercharge attacks
- Growing financial, regulatory and privacy laws companies have to meet
In the end, roughly two out of three companies indicate that they struggle to protect against complex and dynamically changing attacks. Their lack of integration and the complexity of their security solutions are creating gaps in their cyber defenses. Ultimately, most companies confess they lack confidence that they can detect an inside attack before a breakout occurs. 4
Increasingly complicating things for companies is the fact that attacks can begin both before and after IT infrastructure is actually in the possession of the company. It raises concerns about the security of the IT infrastructure from their suppliers, as well as the safety and integrity of their critical data beyond end of the life of the infrastructure.
Now, more than ever, companies need better assurances of the security of their IT infrastructure across the entire span of its life.
Taking a 360-degree view to security
HPE accepted the challenge when we built the ProLiant Gen10 series of โThe World's Most Secure Industry Standard Serversโ, creating the foundation of what today is a holistic, 360-degree view to security that begins in the manufacturing supply chain, provides industry-leading security throughout the operational life of the servers, and concludes with a safeguarded, end-of-life decommissioning or repurposing of a companyโs servers.
Today, HPEโs 360-degree view to security continues to grow across the entire lifespan of a server.
HPEโs Trusted Supply Chain, which ensures security before a customerโs infrastructure even arrives at their facility, continues to expand with offerings such as new servers that include advanced security features that are built by vetted HPE employees in highly secure U.S. facilities.
For customersโ day-to-day operational security needs, HPE set the standard with our Silicon Root of Trust which creates a digital fingerprint in the silicon of the server itself, protecting against attacks against the very core of a server.
This digital fingerprint protects over 4 million lines of firmware from malware and ransomware and helps defend your infrastructure from malicious code with early detection and automated recovery of a security-compromised server.
Taking security to the next level
But HPE isnโt content with just locking down the core of a server.
Extending the Silicon Root of Trust beyond the core, HPE is taking a โZero Trust Architectureโ approach to the entire system, extending the Silicon Root of Trust concept across the platform.
Using new approaches such as โproduct cryptographic identity,โ or Device Identity Certificates, HPE can extend that root of trust out to other devices in the system. With the expansion of the root of trust across the devices in the server, an additional approach known as โconfiguration validation,โ or Platform Certificate, can be used to ensure the entire server configuration can be securely locked down.
Beyond the physical elements of a server, HPEโs security vision extends into operating systems and applications, working closely with our partners to leverage new technologies that help safeguard application integrity and data privacy as the need for secure, confidential computing grows.
Ultimately, these new security approaches of Device Identity, Platform Certificates, and confidential computing are driving the ability for companies to reach new levels of secure, zero-touch provisioning, helping them to securely accelerate the deployment of their infrastructure.
Bringing โsecurity as a serviceโ to companies
Even with increasing awareness of all these security risks, and an associated increase in security and compliance-related spending, managing IT security still presents an array of challenges for some companies, including skills gaps, siloed tools, complexity, and lack of automation. And these challenges only grow when you consider outsourcing operations to a third-party service provider, because while operations can be outsourced, the organizational risks of security and compliance failure canโt be.
This is where managed security from HPE GreenLake Management services comes inโpart of a complete security, risk, and compliance portfolio.
Managed security enhances the customer environment by offering services that include security monitoring, privileged access management, vulnerability management, and security hardening with the attention and accountability of an account security officer.
This broad portfolio of managed security services delivers security expertise and experience, simplified processes, and a holistic management solutionโall aimed at reducing organizational risk.
HPEโs 360-degree view of security meets the challenge
Trusted supply chains, secure manufacturing, industry-leading operational security, and a broad portfolio of managed security services: It all combines to make HPEโs 360-degree view to security vision squarely aligned on the challenges customers face today.
In the end, beyond ensuring the integrity of both company and customer data and infrastructure, itโs all about telling cyber criminals that their paycheck has been revoked.
Ready for more?
Discover more about HPE's 360-degree view to security and how HPE is transforming compute systems and solutions to become your foundation for digital transformation.
Gary Craze
Hewlett Packard Enterprise
twitter.com/HPE_Servers
linkedin.com/showcase/hpe-servers-and-systems/
hpe.com/servers
[1] Cybersecurity Ventures, Top 5 Cybersecurity Facts, Figures, Predictions, And Statistics For 2020 To 2021
[2] Enterprise Strategy Group, 2021 Technology Trends to watch
[3] Gartner, Rethink the Security and Risk Strategy, Tom Scholtz 2020
[4] HPE and Ponemon Institute Global Study 2020: Closing the IT Security Gaps
Gary_Craze
Meet blogger Gary Craze, a 30-year veteran of the technology industry. Gary has held marketing and product management roles with enterprise technology companies helping them to understand the needs of customers and creating compelling value propositions that meet their business needs. Currently, Gary is the Worldwide Product Marketing Manager for the HPE ProLiant Server team at HPE where he is responsible for evangelizing the worldโs most secure industry-standard servers.
- Back to Blog
- Newer Article
- Older Article
- Dale Brown on: Going beyond large language models with smart appl...
- alimohammadi on: How to choose the right HPE ProLiant Gen11 AMD ser...
- Jams_C_Servers on: If youโre not using Compute Ops Management yet, yo...
- AmitSharmaAPJ on: HPE servers and AMD EPYCโข 9004X CPUs accelerate te...
- AmandaC1 on: HPE Superdome Flex family earns highest availabili...
- ComputeExperts on: New release: What you need to know about HPE OneVi...
- JimLoi on: 5 things to consider before moving mission-critica...
- Jim Loiacono on: Confused with RISE with SAP S/4HANA options? Let m...
- kambizhakimi23 on: HPE extends supply chain security by adding AMD EP...
- pavement on: Tech Tip: Why you really donโt need VLANs and why ...
-
COMPOSABLE
77 -
CORE AND EDGE COMPUTE
146 -
CORE COMPUTE
131 -
HPC & SUPERCOMPUTING
131 -
Mission Critical
86 -
SMB
169