Demystifying Server Root of Trust

  • Analyst White Paper
  • PDF 219 KB

Overview

Secure data begins with secure infrastructure and protecting infrastructure begins with making sure it will operate as expected and that the necessary firmware remains secure. 

Read this analyst paper to learn about HPE Root of Trust process and the various technologies and approaches that can achieve complete protection when the anchor is in the silicon.

Moor White Paper

EXECUTIVE SUMMARY – 1

SECURING THE DATACENTER IS MORE COMPLEX THAN EVER – 1

YOUR SECURITY STRATEGY IS LACKING – 2

YOUR SECURITY STRATEGY IS LACKING – 2

ROOT KIT ATTACKS TAKE MANY FORMS – 3

UEFI SECURE BOOT – 4

TRUSTED PLATFORM MODULE – 5

INTEL TRUSTED EXECUTION TECHNOLOGY (INTEL TXT) & BOOTGUARD – 5

AMD SECURE ROOT-OF-TRUST TECHNOLOGY – 7

HPE SILICON ROOT OF TRUST – 7

ROOT OF TRUST IS THE FOUNDATIONAL BUILDING BLOCK TO A SECURE DATACENTER – 9

ORCHESTRATION CLOSES GAPS – 9

TRUST THE EXPERTS – 9

MI&S PERSPECTIVE – 10

CALL TO ACTION – 11

Loading information, please wait

Tell us about yourself

Its been a while since you last visited. Please update any of your details below if they are not current.

Thank you for returning to learn more about Hewlett Packard Enterprise resources. You have previously provided your information, so this download is available to you now.

May HPE e-mail you with future offers and event news?
+
Is this a mobile phone?
May HPE call you with future offers and event news?

It appears cookies are disabled for your web browser. For easier, automatic form filling, please enable cookies in your browser settings.

No Thanks

By submitting this form you consent to HPE’s collection and use of your personal information in accordance with the HPE Privacy Statement You also agree that HPE may contact you regarding this inquiry.

If providing a mobile number, you consent and acknowledge that additional autodialed and/or pre-recorded telemarketing calls by or on behalf of HPE may be made to the mobile number you provide. Data rates may apply. Consent is not a condition of purchase. Terms and conditions.

Demystifying Server Root of Trust

Your content is now available. If it has not already opened in a new browser tab/window, please use the button below.

Download

You might also be interested in:

Business White Paper : A comprehensive view of IT infrastructure security

Pub-12653-2
Business White Paper

A comprehensive view of IT infrastructure security

Need to talk to an expert?

We have experts ready to help you solve your business problem, so contact us today.