Demystifying Server Root of Trust

  • Analyst White Paper
  • PDF 219 KB

Overview

Secure data begins with secure infrastructure and protecting infrastructure begins with making sure it will operate as expected and that the necessary firmware remains secure. 

Read this analyst paper to learn about HPE Root of Trust process and the various technologies and approaches that can achieve complete protection when the anchor is in the silicon.

Secure data begins with secure infrastructure and protecting infrastructure begins with making sure it will operate as expected and that the necessary firmware remains secure. Download this analyst paper and learn about HPE Root of Trust.

Moor White Paper

RESUMEN EJECUTIVO – 1

SECURING THE DATACENTRE IS MORE COMPLEX THAN EVER – 1

YOUR SECURITY STRATEGY IS LACKING – 2

YOUR SECURITY STRATEGY IS LACKING – 2

ROOT KIT ATTACKS TAKE MANY FORMS – 3

UEFI SECURE BOOT – 4

TRUSTED PLATFORM MODULE – 5

INTEL TRUSTED EXECUTION TECHNOLOGY (INTEL TXT) & BOOTGUARD – 5

AMD SECURE ROOT-OF-TRUST TECHNOLOGY – 7

HPE SILICON ROOT OF TRUST – 7

ROOT OF TRUST IS THE FOUNDATIONAL BUILDING BLOCK TO A SECURE DATACENTRE – 9

ORCHESTRATION CLOSES GAPS – 9

TRUST THE EXPERTS – 9

MI&S PERSPECTIVE – 10

CALL TO ACTION – 11

Loading information, please wait