HPE Compute Security

Safeguard against digital and physical threats with next-level security.

View the explainer
Bearded IT specialist setting servers in data center.
Technicians using computer in server room.

Protect against attack with multi-layer server lifecycle security

HPE Silicon Root of Trust protects servers from manufacturing to end-of-life and provides compliance readiness for future quantum-computing attacks.

Learn more about server security best practices

Trusted Supply Chain

HPE meticulously encodes each server unit to prevent tampering or manipulation, ensuring nothing is altered during transit and secure decommissioning for end of life.

Multi-layered protection with secure enclave

HPE iLO 7 Silicon Root of Trust, a robust security foundation, ensures that every layer of firmware and software loads securely and is verified from the moment the server is powered, providing an unbreakable chain of trust.

Be future ready with top tier security

HPE ProLiant Compute Gen12 are the first servers to support NIST and CNSA 2.0 quantum resistance requirement and the first industry standard servers to meet the requirements for FIPS 140-3 Level 3.

Protect against attack with HPE iLO 7

Next-level security delivered with built-in, industry-leading HPE iLO Silicon Root of Trust, to safeguard every phase of the server lifecycle now and for the future—from manufacturing to end-of-life.

HPE iLO
Multi-layered protection with secure enclave to prevent tampering

An embedded vault within HPE iLO 7 provides secure storage of server component encryption keys.

First industry standard servers to meet the requirements for FIPS 140-3 Level 3

Ensures a higher standard of cryptographic security and meets strict government and industry regulations for protecting sensitive data.

First server to support NIST and CNSA 2.0 quantum resistance requirement

Secure firmware signing against future quantum computing attacks embedded into HPE iLO 7 Silicon Root of Trust.

Trusted supply chain at rack level

Speed deployment, reduce vulnerabilities and ensure full rack-level integrity during transit through our secure supply chain facilities.

HPE Compute security portfolio

HPE Integrated Lights-Out (iLO)

HPE iLO enables you to securely configure, monitor, and update your HPE servers seamlessly, from anywhere in the world.

 

HPE Compute Ops Management

A secure, scalable web-based application that delivers unified compute operations from data center to edge and ensures comprehensive user and data security compliance.

HPE Data Protection solutions

Unleash the true power of your data with suite of industry-leading on-premises and cloud-based data protection solutions and services.

Security and Digital Protection Services

Services for enterprise security and adaptive protection that fortify your data’s confidentiality, integrity, and availability in hybrid IT and at the edge.

HPE Security solutions

HPE silicon-to-cloud infrastructure security solutions enable you to manage, monitor and protect your IT security systems and data.

Explore technical resources

HPE Compute Security reference guide

Guide to security features of HPE ProLiant servers.

HPE iLO documentation

Access product support documents, manuals, software, and drivers.

HPE Security bulletins

View security bulletins and subscribe to alerts of disclosed security vulnerabilities of HPE products.

Portrait of influencer having a break between meetings.

Take the next steps

Ready to get started? Explore purchasing options or engage with HPE experts to determine the best solution for your business needs.


HPE Compute security resources