Tech brief security bundle
By Hewlett Packard Enterprise
Putting trusted security to work
HPE provides IT operations with operational peace of mind with the Intel-powered HPE ProLiant Gen11 server family. This comes from ground-up security protection via a silicon root of trust, a trusted supply chain, startup and runtime validation for components, assemblies and add-ons, and runtime attestation and access controls for applications and services.
Highlights include:
- Surviving the scary security landscape with HPE Integrated Lights Out (iLO) management
- HPE’s silicon root of trust defines a continuous, non-stop zero-trust architecture
- Protection from a trusted supply chain
The basics and business of trusted security
HPE offers a trusted supply chain, silicon-level protection and validation, and unmatched security protection and coverage in its HPE ProLiant Gen11 Server family.
Highlights include:
- HPE delivers trusted security by design
- Security is fundamental, from the edge to the cloud
- HPE GreenLake for compute operations management
Trusted security from the edge to the cloud
The HPE Proliant Gen11 Server family offers serious, baked-in security—including a silicon root of trust, a trusted supply chain, and full-stack protection—so that businesses can focus on building and using solutions to meet their goals and objectives.
Highlights include:
- HPE GreenLake for Compute Ops Management provides protection at the OS, platform, and application layers
- A secure supply chain ensures use and validation of secure components, protected across the entire lifecycle
- End-to-end security and zero trust design means architects can deploy HPE servers with confidence
Download now
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Provided by HPE
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Why Dedicated Internet Access (DIA) could be the key to AI performance gainsHigh speed, private internet connections could be a critical enabler for enterprises driving AI adoption
-
Dropbox is adding a range of handy new AI features – here’s what users can expectNews Long-awaited features from Dash AI will be integrated within Dropbox
-
Former NCSC head says the Jaguar Land Rover attack was the 'single most financially damaging cyber event ever to hit the UK' as impact laid bareNews Researchers said they place the UK financial impact of the attack on Jaguar Land Rover at around £1.9 billion.
-
Volkswagen confirms security ‘incident’ amid ransomware breach claimsNews Volkswagen has confirmed a security "incident" has occurred, but insists no IT systems have been compromised.
-
Cyber experts have been warning about AI-powered DDoS attacks – now they’re becoming a realityNews DDoS attackers are flocking to AI tools and solutions to power increasingly devastating attacks
-
Microsoft issues warning over “opportunistic” cyber criminals targeting big businessNews Microsoft has called on governments to do more to support organizations
-
Europol takes down SIM farm network that scammed thousands of victimsNews The sophisticated operation led to crimes from simple phishing to investment fraud
-
Thousands of exposed civil servant passwords are up for grabs onlineNews While the password security failures are concerning, they pale in comparison to other nations
-
77% of security leaders say they'd fire staff who fall for phishing scams, even though they've done the same thingNews A new report uncovers worrying complacency amongst IT and security leaders
-
Hackers stole source code, bug details in disastrous F5 security incident – here’s everything we know and how to protect yourselfNews CISA has warned the F5 security incident presents a serious threat to federal networks
