The Gorilla Guide to... How HPE ProLiant Gen11 servers deliver trusted security
How systems, software, and connections are protected


This book explains how organizations can and should make security a primary consideration when choosing and deploying servers within any IT infrastructure.
We start our journey with a discussion of today’s threat landscape, where an ever-increasing number of startlingly dangerous hacks and attacks can interfere with an organization’s ability to meet its objectives, make a profit, or—in a worst-case scenario—conduct any business at all.
Download now
Provided by HPE | Intel
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
"I LOVE this company!" Looking back on 50 years of tech giant Microsoft
Opinion There have been highs, lows, laughs and lots of success in the past 5 decades for the Redmond-headquartered firm
By Maggie Holland Published
-
Verizon Call Filter API flaw could’ve exposed millions of Americans’ call records
News A security flaw in Verizon's Call Filter app could’ve allowed threat actors to access details of incoming calls for another user, a security researcher has found.
By Ross Kelly Published
-
Developer security best practices in a fast growing tech company
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
-
HPE alerts affected staff after Midnight Blizzard breach
News HPE has notified staff affected in a data breach that sensitive personal information, including credit card details, may have been exposed.
By Emma Woollacott Published
-
Zero to hero: A blueprint for establishing a security champions program
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
-
DevSecOps is dead...or is it?:
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro Published
-
Password management startup Passbolt secures $8 million to shake up credential security
News Password management startup Passbolt has secured $8 million in funding as part of a Series A investment round.
By Ross Kelly Published
-
HPE confirms data breach probe after IntelBroker claims
News IntelBroker claims to have stolen HPE source code in the breach
By Nicole Kobie Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published
-
Futurum Group endpoint security trends 2023
whitepaper Protection across AI attack vectors
By ITPro Published