The Gorilla Guide To… How HPE ProLiant Gen11 servers powered by Intel deliver trusted security
How systems, software, and connections are protected


Today, businesses and organizations can’t survive or thrive without strong, trusted security from the hardware level all the way through services and applications.
HPE ProLiant Gen11 servers offer trusted security by design from design to delivery and throughout the IT lifecycle.
Highlights include:
- Trusted supply chain ensures servers are built secure, and stay secure until they’re delivered (now available worldwide)
- Silicon root of trust with hardware protection, processor validation and attestation baked in
- Firmware and start-up checks for UEFI and BIOS, with validation and verification for third-party NICs and storage controllers
- Continual attestation during runtime
- HPE GreenLake security protection ensures protection for operation systems, software frameworks, and platforms, plus apps and services
Download now
Provided by HPE | Intel
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Global cybersecurity spending is set to rise 12% in 2025 – here are the industries ramping up investment
News Global cybersecurity spending is expected to surge this year, fueled by escalating state-sponsored threats and the rise of generative AI, according to new analysis from IDC.
By Ross Kelly
-
‘Insiders don’t need to break in’: A developer crippled company networks with malicious code and a ‘kill switch’ after being sacked – and experts warn it shows the huge danger of insider threats
News Security experts have warned ITPro over the risks of insider threats from disgruntled workers after a software developer deployed a 'kill switch' to sabotage his former employer’s networks.
By Ross Kelly
-
Developer security best practices in a fast growing tech company
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to success
News Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
By Emma Woollacott
-
Cisco claims new smart switches provide next-level perimeter defense
News Cisco’s ‘security everywhere’ mantra has just taken on new meaning with the launch of a series of smart network switches.
By Solomon Klappholz
-
HPE alerts affected staff after Midnight Blizzard breach
News HPE has notified staff affected in a data breach that sensitive personal information, including credit card details, may have been exposed.
By Emma Woollacott
-
Five Eyes cyber agencies issue guidance on edge device vulnerabilities
News Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.
By Emma Woollacott
-
Zero to hero: A blueprint for establishing a security champions program
Whitepaper A buyer's guide for meeting the unprecedented speed and complexity of today's development practices
By ITPro