Overview



Do you want to defend applications and data before your server is built? HPE Trusted Supply Chain services provide a new first line of defense against cyber-attackers with select servers built to the world’s toughest security standards in secured facilities globally. HPE trusted supply chain and server security optimization services brings together enterprise security, processes and people to deliver protection for your most sensitive applications and data even before your server is built.

What is new supporting point:
Support for HPE ProLiant Compute Gen12
Build Trusted Supply Chain Solutions globally




At-a-glance



  • Configuring iLO to use High Security mode reduces the attack surface for cyber attackers, making it more difficult to insert compromised code or malware into the server firmware.
    Security state locks down the host and requires specific authentication through encryption before a user can log into the server.

  • For customers who ask Hewlett Packard Enterprise to load an OS at the factory, enabling UEFI Secure Boot connects the Silicon Root of Trust to the OS.
    An industry-recognized feature, affixing the UEFI firmware to the boot loader ensures that the genuine and authenticated OS is initialized.
    Any antivirus software actually runs in the OS, but cannot detect hackers or an intrusion until the OS is fully running. Some astute bad actors try to compromise the OS before its antivirus tools have a chance to start.
    The UEFI Secure Boot feature provides protection against this scenario. If a customer chooses to load the OS on their own, they can configure this feature when the HPE Trusted Supply Chain server is delivered to the end-user location.

  • This feature takes cryptographic measurements, or images, of the supported HPE Trusted Supply Chain server firmware, hardware components, and options. It creates a digital fingerprint of the server configuration. If any firmware, hardware, or options are altered, an alert is displayed at startup.
    Enabling this feature at the factory essentially prevents all tampering or compromise to the server composition, no matter how slight.
    This feature uses a password, created by Hewlett Packard Enterprise, to lock down the server configuration at the factory. The password is securely transmitted to the customer, who unlocks the server when it arrives.

  • This mechanism protects the HPE Trusted Supply Chain server from physical intrusion.
    Complementing and reinforcing the protection from the Server Configuration Lock, the chassis intrusion detection switch registers an alert if the top of the server chassis is removed.
    It logs an event in the iLO firmware, even if the server is powered off. If any cyber attacker or unauthorized personnel open the server chassis, the customer will know that someone might have tampered with the server.




Reasons to buy


  • Configuring iLO to use High Security mode reduces the attack surface for cyber attackers, making it more difficult to insert compromised code or malware into the server firmware.
    Security state locks down the host and requires specific authentication through encryption before a user can log into the server.
  • For customers who ask Hewlett Packard Enterprise to load an OS at the factory, enabling UEFI Secure Boot connects the Silicon Root of Trust to the OS.
    An industry-recognized feature, affixing the UEFI firmware to the boot loader ensures that the genuine and authenticated OS is initialized.
    Any antivirus software actually runs in the OS, but cannot detect hackers or an intrusion until the OS is fully running. Some astute bad actors try to compromise the OS before its antivirus tools have a chance to start.
    The UEFI Secure Boot feature provides protection against this scenario. If a customer chooses to load the OS on their own, they can configure this feature when the HPE Trusted Supply Chain server is delivered to the end-user location.
  • This feature takes cryptographic measurements, or images, of the supported HPE Trusted Supply Chain server firmware, hardware components, and options. It creates a digital fingerprint of the server configuration. If any firmware, hardware, or options are altered, an alert is displayed at startup.
    Enabling this feature at the factory essentially prevents all tampering or compromise to the server composition, no matter how slight.
    This feature uses a password, created by Hewlett Packard Enterprise, to lock down the server configuration at the factory. The password is securely transmitted to the customer, who unlocks the server when it arrives.
  • This mechanism protects the HPE Trusted Supply Chain server from physical intrusion.
    Complementing and reinforcing the protection from the Server Configuration Lock, the chassis intrusion detection switch registers an alert if the top of the server chassis is removed.
    It logs an event in the iLO firmware, even if the server is powered off. If any cyber attacker or unauthorized personnel open the server chassis, the customer will know that someone might have tampered with the server.

Specification


Technical Description: HPE HPE TRUSTED SUPPLY CHAIN FOR HPE PRO

Design
Chassis type:The type of rigid framework onto which is the hosuing for device components.
Rack (1U)

Memory
ECC:ECC means Error Correction Code, and it is memory that is able to detect and correct some memory errors without user intervention.
Yes
Supported RDIMM clock speeds:
2933 MHz
Maximum RDIMM memory:
1.54 TB
Supported memory types:Types of memory which can be used with the product.
DDR4-SDRAM
Number of DIMM slots:The number of places where DIMMs can be connected. A DIMM or dual in-line memory module comprises a series of dynamic random-access memory integrated circuits. These modules are mounted on a printed circuit board and designed for use in personal computers, workstations and servers. DIMMs began to replace SIMMs (single in-line memory modules) as the predominant type of memory module as Intel P5-based Pentium processors began to gain market share.
24

Ports & interfaces
Ethernet LAN (RJ-45) ports:Number of Ethernet LAN (RJ-45) ports (connecting interfaces) in the device. Ethernet LAN (RJ-45) ports allow a computer to connect to the ethernet.
0
Internal USB 3.2 Gen 1 (3.1 Gen 1) ports quantity:
2
USB 3.2 Gen 1 (3.1 Gen 1) Type-A ports quantity:
3
USB 2.0 ports quantity:Number of USB 2.0 ports (connecting interfaces) in the device. USB 2.0 was released in April 2000 (now called "Hi-Speed"), adding higher maximum signaling rate of 480 Mbit/s (effective throughput up to 35 MB/s or 280 Mbit/s), USB 2.0 ports are usually black.
0

Power
Power supply:The way in which the product is powered e.g. rechargeable battery, mains electricity connected via a plug and cable.
0 W

Processor
Number of processors supported:The quantity of processors which can be used by the product.
2
Processor family:A family of processors is a group of processors produced by one company over a short period of time e.g. Intel Pentium processors.
Intel® Xeon® Scalable
Processor generation:
2nd Generation Intel® Xeon® Scalable
Processor manufacturer:The manufacturer that produced the processor.
Intel
Processor socket:Mechanical component(s) that provides mechanical and electrical connections between a microprocessor and a printed circuit board (PCB). This allows the processor to be replaced without soldering.
LGA 3647 (Socket P)
Motherboard chipset:The chipset connects the microprocessor to the rest of the motherboard.
Intel® C621
Built-in processor:
No

Storage
RAID levels:RAID is a storage technology that combines multiple disk drive components into a logical unit for the purposes of data redundancy and performance improvement. Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the specific level of redundancy and performance required.
0, 1, 5, 10
Supported storage drive interfaces:
Serial ATA
Storage drive sizes supported:The sizes of storage drives that can be used with the product.
3.5"
Number of storage drives supported:
4

Weight & dimensions
Depth:The distance from the front to the back of something.
749.3 mm
Height:The measurement of the product from head to foot or from base to top.
88.9 mm
Weight:Weight of the product without packaging (net weight). If possible, the net weight is given including standard accessories and supplies. Please note that sometimes the manufacturer leaves out the weight of accessories and/or supplies.
19.1 kg
Width:The measurement or extent of something from side to side.
444.5 mm


Product details


0190017480732-XEX HP 4549821386376

HPE HPE TRUSTED SUPPLY CHAIN FOR HPE PRO

£1651.00 and In stock

SKU0190017480732-XEX


Parent Product

P36394-B21 HP


MPN: P36394-B21

HPE HPE TRUSTED SUPPLY CHAIN FOR HPE PRO

Quick Code: Q2643737 MPN: 0190017480732-XEX
£1651.00

Quantity:
In Stock