Tech brief security bundle
By Hewlett Packard Enterprise
Putting trusted security to work
HPE provides IT operations with operational peace of mind with the Intel-powered HPE ProLiant Gen11 server family. This comes from ground-up security protection via a silicon root of trust, a trusted supply chain, startup and runtime validation for components, assemblies and add-ons, and runtime attestation and access controls for applications and services.
Highlights include:
- Surviving the scary security landscape with HPE Integrated Lights Out (iLO) management
- HPE’s silicon root of trust defines a continuous, non-stop zero-trust architecture
- Protection from a trusted supply chain
The basics and business of trusted security
HPE offers a trusted supply chain, silicon-level protection and validation, and unmatched security protection and coverage in its HPE ProLiant Gen11 Server family.
Highlights include:
- HPE delivers trusted security by design
- Security is fundamental, from the edge to the cloud
- HPE GreenLake for compute operations management
Trusted security from the edge to the cloud
The HPE Proliant Gen11 Server family offers serious, baked-in security—including a silicon root of trust, a trusted supply chain, and full-stack protection—so that businesses can focus on building and using solutions to meet their goals and objectives.
Highlights include:
- HPE GreenLake for Compute Ops Management provides protection at the OS, platform, and application layers
- A secure supply chain ensures use and validation of secure components, protected across the entire lifecycle
- End-to-end security and zero trust design means architects can deploy HPE servers with confidence
Download now
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Provided by HPE
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
More transparency needed on sprawling data center projects, activists claimNews Activists call for governments to be held accountable when data centers are pushed through without proper consultation
-
Red Hat eyes tighter data controls with sovereign support for EU customersNews The company's new offering will see support delivered entirely by EU citizens in the region
-
When cyber professionals go rogue: A former ‘ransomware negotiator’ has been charged amid claims they attacked and extorted businessesNews The attackers are alleged to have demanded ransoms of up to $10 million
-
CISA just published crucial new guidance on keeping Microsoft Exchange servers secureNews With a spate of attacks against Microsoft Exchange in recent years, CISA and the NSA have published crucial new guidance for organizations to shore up defenses.
-
US telco confirms hackers breached systems in stealthy state-backed cyber campaign – and remained undetected for nearly a yearNews The hackers remained undetected in the Ribbon Communications’ systems for months
-
Google says reports of a 'huge' Gmail breach affecting millions of users are false, againNews Reports of a major Gmail affecting millions of users have been flooding the web this week – Google says they're "false" and you've nothing to worry about.
-
Enterprises can’t keep a lid on surging cyber incident costsNews With increasing threats and continuing skills shortages, AI tools are becoming a necessity for some
-
Cyber researchers have already identified several big security vulnerabilities on OpenAI’s Atlas browserNews Security researchers have uncovered a Cross-Site Request Forgery (CSRF) attack and a prompt injection technique
-
CISA issues alert after botched Windows Server patch exposes critical flawNews A critical remote code execution flaw in Windows Server is being exploited in the wild, despite a previous 'fix'
-
Former NCSC head says the Jaguar Land Rover attack was the 'single most financially damaging cyber event ever to hit the UK' as impact laid bareNews Researchers said they place the UK financial impact of the attack on Jaguar Land Rover at around £1.9 billion.
