TechValidate Research on HPE Hybrid IT Solutions


security features in HPE ProLiant Gen10 servers Case Study

Raytheon

Introduction

This case study of Raytheon Company is based on an August 2018 survey of security features in HPE ProLiant Gen10 servers customers by TechValidate, a 3rd-party research service.

“The security features in HPE ProLiant Gen10 servers are a convenience on hardening server without checking against third-party applications for tightening up the security layer.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select security features in HPE ProLiant Gen10 servers:

  • Addressed the following security challenges with the security features in HPE Gen10 ProLiant servers:
    • Check for compromised server firmware at runtime without rebooting

Use Case

The key features and functionalities of security features in HPE ProLiant Gen10 servers that the surveyed company uses:

  • Running the following workloads/applications on their HPE ProLiant Gen10 servers to aid their security concerns:
    • Content applications (content management, enterprise portals)
    • Engineering/technical applications (CAD/CAM/CAE)Structured Data Management (RDBMSs, NDBMSs)
    • Structured data analytics (query, reporting, analysis)

Results

The surveyed company achieved the following results with security features in HPE ProLiant Gen10 servers:

  • Believes that HPE ProLiant Gen10 servers are superior to/better than similar servers in the market because:
    • Their HPE servers can recover quickly back to a safe operational state after a ransomware event
    • They are immediately notified of any malware or compromised code in server essential firmware through my iLO logs
  • Rates the value of the security capabilities offered on HPE ProLiant Gen10 servers:
    • Immutable fingerprint in the HPE silicon that ensures Gen10 servers cannot boot compromised code: valuable
    • Ability to check the integrity of essential firmware before it is executed: valuable
    • Ability to check the integrity of essential firmware while the server is up and running: valuable
    • Support for high-grade Commercial National Security Algorithm (CNSA) for encryption renumber: very valuable
    • Ability to automatically recover essential server firmware: very valuable
    • Ability to recover firmware at scale (up to 10,000 servers in one click): valuable
    • Ability to recover host environment, operating system, applications, and firmware settings: very valuable
    • Assurance that their servers are equipped with National Institute of Standards & Technology (NIST) 800-53 Controls: very valuable
  • Rates their confidence in defending their server against malware attacks with HPE ProLiant Gen10 servers:
    • Protecting their server against a malware attack: confident
    • Detecting a malware attack on their server: confident
    • Recovering from a malware attack on their server: confident
  • Rates the time spent doing the tasks needed to secure their server from firmware attacks:
    • Before /without Proliant Gen10: ~ 1 hour to 1 day
    • After Proliant Gen10: less than an hour
  • Saw improvements in the time required for the following tasks since using HPE ProLiant Gen10 security features:
    • Time needed to conduct daily server firmware validation checks: 1-25%
    • Time needed to recover from a malware attack: 1-25%
    • Time to scale recovery to thousands of servers back to their operational state in a single click: 1-25%
    • Time to ensure compliance with security audits: 1-25%




About This Data

This data was sourced directly from verified users of HPE Hybrid IT Solutions by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on HPE Hybrid IT Solutions