sb-au logo
Story image

HPE's industry-first puts silicon at the forefront of server security

12 Jun 2017

HPE has unveiled a 'silicon root of trust' to strengthen firmware security in servers. The industry-first development features embedded silicon-based security into its next-generation ProLiant servers.

ISACA research found that more than 50% of security professionals reported at least one incident of malware-infected firmware last year. HPE says firmware attacks are currently one of the biggest threats facing enterprises and governments today.

To prevent future attacks, HPE developed what it calls the 'silicon root of trust', which is a link between custom HPE silicon and the HPE Integrated Lights Out (iLO) firmware. The link makes sure servers don't execute compromised firmware code.

According to HPE, building the firmware security directly on HPE silicon provides protection against attacks and also allows organisations to automatically recover the most essential firmware.

Patrick Moorhead, president of Moor Insights and Strategy, says that a firmware breach is difficult to detect and it can also do the most damage.

"Unfortunately, firmware is often overlooked in c-suite conversations about data center security, and cyber criminals are targeting this as a new attack surface,” he says.

HPE designed its silicon root of trust to fit security directly into the iLO chip. This creates an 'immutable' fingerprint in the silicon. Unless the firmware matches the silicon, the server will not boot up.

The silicon root of trust also includes encryption and breach detection technologies, complemented by HPE supply chain security and HPE Pointnext security assessment and protection services.

HPE says that because it has complete control over its own silicon chip and server firmware, it is the only one that can offer that particular type of security.

“While many servers have some level of hardware security already built-in, HPE is creating firmware security inextricably tied with its custom made silicon, to help customers protect against these malicious attacks," Moorhead adds.

The silicon root of trust is part of HPE's next-generation ProLiant Server portfolio, which will be available later this year.

Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More
Link image
Phishing campaigns aren't stopping - but neither are their opponents
COVID-19 is presenting the perfect opportunity to cyber attackers to mount potentially devastating spear-phishing campaigns against organisations via their remote workers. Learn how to fight back.More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More
Story image
Video: 10 Minute IT Jam – Who is Forcepoint?
Forcepoint has built its core mission on three simple words: “human-centric cybersecurity”. More
Story image
Why securing IoT installations will be ‘do or die’ in post-pandemic Australia
Unless IoT technology is visible on the network, organisations will find themselves at risk with an unmanageable high-tech morass, warns ExtraHop A/NZ regional sales manager Glen Maloney.More