Home' The Source : Third Quarter 2018 Contents Are you aware of all the potential threats to your organization’s
servers? Are you confident that you’ve invested in the best possible
protection for all the data contained on them?
New risks and threats to server security continue to emerge, as
technologies like cloud infrastructure deliver more opportunities for
risks as well as benefits. Or as a recent whitepaper by Moor Insights
& Strategy put it, “the threat landscape is increasing, and attacks are
becoming more sophisticated.”
“The threats are endless if your information is compromised,
making security measures a critical component
of any server deployment,” says Kevin Noreen,
senior director of product management for
Dell EMC PowerEdge software.
In response to the growing need for
stronger security, Dell (Contract No.
7593) recently released the 14th gen-
eration of its PowerEdge servers, and
Hewlett Packard Enterprises (HPE)
(Contract No. 7591) recently unveiled its
10th generation server, the HPE ProLiant
Both organizations promise that their products will provide health-
care systems with more comprehensive protection and vital security,
ultimately saving money and time. Their latest server platforms incor-
porate a “silicon root of trust,” an enhanced security methodology
that makes them virtually impossible to compromise. They constantly
monitor for cyberattacks and then take action when necessary.
In the past, cybersecurity’s emphasis tended to be centered around
software. And for a long time, that was the right tactic. But today, orga-
nizations need to be sure they don’t also forget hardware-level security
issues. The newest generation servers are tackling that problem.
“We believe security should be built into the hardware layer versus
added later,” Noreen explains.
He refers to it as the technology’s “immune system”—a built-
in and critical component for detecting and thwarting an attack.
An important component of these next-generation servers is how
they’re positioned to address the threat of ransomware attacks, which
continue to grow exponentially. Ransomware is a type of malicious
software that locks up a system and demands payment before it will
unlock the system and allow users to regain access. Some ransom-
ware even encrypts files and scrambles the information contained
within before demanding a ransom and releasing a decoding key for
the user to un-encrypt their files.
An organization that’s vulnerable to ransomware attacks could be
looking at a demand for huge amounts of money—and no guarantee
that they’ll actually get back all their data from the individual or group
holding it hostage. That’s why the latest generation of servers were
specifically designed to thwart that problem.
Bob Moore, director of software and product security at HPE,
noted that with the HPE Silicon Root of Trust, an industry-first
silicon-based security solution, the HPE ProLiant Gen10 servers
improve security by ensuring they do not execute compromised
firmware code. “If any ransomware or malware is somehow inserted
in the server, it will be detected because it doesn’t
match the fingerprinting that we’ve put into
the silicon,” he explains.
Moore noted that rapid recov-
ery is another key feature of HPE’s
latest generation servers. If an attack
occurs, the server can quickly go into
recover-and-restore mode so the system
doesn’t remain down for long.
“We can facilitate a restoration of the
operating system, applications and data,”
Moore says, adding that each piece of firmware will be carefully
checked to make sure they’re completely free of malware during
Dell has a similar approach, which Noreen calls “health insurance
for your motherboard.” This intrinsic feature, called Easy Restore,
enables an organization to easily retrieve information stored off
the motherboard from another part of the system. That way, if the
motherboard has to be replaced, the internal service processor
simply asks the user if missing information should be restored
and then initiates the process to get the system functioning again.
“This allows you to easily engage with the new motherboard,”
Imagine the repercussions of a security event: What would hap-
pen in your hospital or healthcare organization if the servers were
compromised and went down? At best, it might be inconvenient.
At worst, it could be terribly expensive and harmful to countless
individuals whose information was compromised.
Ultimately, you want to be confident that your technology invest-
ments will protect your organization financially and also protect the
health and safety of your patients.
“We can preclude lengthy outages,” Moore says. “We can prevent
the need to pay ransom. And we can prevent the costly nature of
downtime, planned and unplanned, which is especially critical in
healthcare because you are literally dealing with life and death.”
Both Dell and HPE pledge to continue seeking ways to stay one
step ahead of anyone who might try to undermine the safety and
security of an organization’s data. •
SOURCEBOOK PRODUCT LAB
What’s New in
in the ser
in the se
Dell 14th generation
HPE ProLiant Gen10 family
36 The Source | Third Quarter 2018
6/27/18 1:04 PM
6/27/18 1:04 PM
Links Archive Second Quarter 2018 Fourth Quarter 2018 NEW Navigation Previous Page Next Page