Sun, Jan 20 2019, 8:34 am

Dell EMC fortifies security in its 14th Gen PowerEdge servers

By Digital Edge Bureau, 14.12.2018, 09:15
 
Dell_EMC_14th_1

Dell EMC’s 14th generation PowerEdge servers carry strong security features for new-age datacentres

As CIOs and IT administrators strive for enhancing the security architecture of their datcentres, this becomes imperative to fortify the security definitions of individual datacentre building blocks themselves. Yes, cognizant of the necessity for strengthening the security mechanisms in datacenre servers, Dell EMC walks extra miles in infusing stronger security features in its compute platforms including the much talked about 14th generation PowerEdge servers.

“In recent times, data centre security as well as server architecture security has become extremely critical. Cyberattacks have the potential to not only delay the system and business downtime, revenue and customer loss, legal damages but also tarnish the corporate reputation. Dell EMC’s 14th generation PowerEdge servers, with their industry leading security, form the trusted bedrock of the modern data center through which customers can securely run their IT operations and workloads. With our cyber-resilient architecture and performance innovations, we are committed to enable our customers to unleash their best business potential”, said Manish Gupta, Senior Director & General Manager, Compute & Networking Group, Dell EMC India.

Dell EMC’s 14th generation of PowerEdge servers delivers this chain of trust and combines it with comprehensive management tools to provide robust layers of security across hardware and firmware. As a result, offering a cyber-resilient architecture that extends across every aspect of the server including the embedded server firmware, the data stored in the system, etc., is the need of the hour.

To protect the data in response to security threats faced in the modern IT environments, Dell EMC’s has established a three step approach while designing 14th generation PowerEdge servers.

The approach revolves around the concept of Protect-Detect-Recover:

  • Protect: The ‘protect’ function is a key component in guarding against cybersecurity attacks. This function consists of several categories including access control, data security, maintenance, and protective technology. The key underlying philosophy is that infrastructure assets must provide robust protection against unauthorized access to resources and data as part of a comprehensive secure installation and computing environment.
  • Detect: This function provides complete visibility into the configuration, health status and change events within a server system. This visibility also detects malicious or other changes to firmware or basic input output system (BIOS).
  • Recover: This function helps in recovering the BIOS, firmware and OS, eventually getting back to the consistent stage. Recovering data in case of a malware attack is exceptionally critical for businesses as they compromise software and hardware products. Hence, timely responses to common vulnerabilities as well as the new ones are important for businesses so that they can swiftly assess their exposure and take appropriate actions.

0 comments

Add your comment

Nickname:
E-mail:
Website:
Comment:


six × = 6

Other articlesgo to homepage

Atos to provide BullSequana supercomputers in India

Atos to provide BullSequana supercomputers in India(0)

Atos, a global leader in digital transformation, has signed a HPC agreement with the C-DAC (Centre for Development of Advanced Computing), an organization within the MeitY (Ministry of Electronics & Information Technology of India), in the presence of the French Minister for External Affairs Mr Jean-Yves Le Drian, and the Secretary of the Minister of

HID reaches out to government agencies with mobile IDs

HID reaches out to government agencies with mobile IDs(0)

HID Global, a world’s leading identity solutions provider, has announced that its HID goID solution has been extended to provide an end-to-end system for deploying and managing a mobile citizen ID program, which governments all across the world have ventured into. From issuance through verification, HID goID is backed by the same high security standards

Damson intros new range of CORSECA Bluetooth speakers

Damson intros new range of CORSECA Bluetooth speakers(0)

Damson Technologies, one of the leading makers of computer peripherals, accessories and lifestyle products, has launched three new portable Bluetooth speakers from CORSECA namely Cookie, Dazzle & MuDisc. Users can now enjoy the classic elegance of CORSECA speaker design and sharp electronics expertise brought to them by the house of Damson, the pioneers of Bluetooth

BenQ’s ZOWIE is Official Monitor Partner of Dreamhack 2018

BenQ’s ZOWIE is Official Monitor Partner of Dreamhack 2018(0)

BenQ, carrying ZOWIE brand of eSports related monitors & IT peripherals, has announced the association with the upcoming Dreamhack 2018 as the Official eSports Monitor Partner. The event will take place from 21st December-24th December at Bombay Exhibition Center, Mumbai (NESCO-Hall 4). BenQ would also showcase its ZOWIE’s XL2546 and RL2455S monitors, which are the official

Kodak Alaris hosts Technology Day for partners in India

Kodak Alaris hosts Technology Day for partners in India(0)

Kodak Alaris, a mighty name in the word of document scanners & document management solutions, has hosted its Technology Day event in Mumbai quite recently, where over 50 premier partners and distributors have took active participation. The event provided partners, coming in from across India, with a better understanding of Kodak Alaris’ comprehensive range of

read more
banner









Contacts and information

New Delhi (India)

Social networks

Most popular categories