Paid Feature Edge computing has seen enterprise IT infrastructure escape from the confines of the traditional data center and put processing power closer to where the action is, or at least to where the data is generated. Among the reasons for such edge initiatives is to enable organizations to gain real-time actionable insights from the data.
But building out IT infrastructure at the network edge comes with its challenges. For instance, deploying systems outside the protective walls of a centralized data center can leave them exposed to theft and vandalism, not to mention tampering that could lead to the loss of sensitive data or the compromise of the entire corporate network.
The upshot is that systems for edge deployment must be first-class citizens when it comes to security, and should have the same level of security features as you would find in infrastructure inside a traditional data center.
Edge systems also need security to be built-in from the ground up, in other words, not added as an afterthought. Also, organizations need adaptive and flexible compute infrastructure to handle a diverse range of workloads, with enterprise edge cases including environments such as remote office/branch office, hospitality, logistics operations and retail outlets.
These are some of the considerations that Dell Technologies tackles with the latest additions to its Dell EMC PowerEdge server portfolio, designed for small and medium-sized businesses as well as enterprise customers.
These include four entry-level models, and one mid-range to high performance model: the PowerEdge T550 tower server; PowerEdge R250 rack server and PowerEdge R350 rack server; and the PowerEdge T150 tower server and PowerEdge T350 tower server.
The systems are designed as flexible and reliable building blocks for business-critical workloads, cloud infrastructure, and point of sale transactions. According to the firm, the new models incorporate a cyber-resilient architecture, starting at the hardware level with the silicon design and permeating the systems entire lifecycle, from manufacturing through the supply chain, right through to retirement of the hardware.
Perhaps the most notable new model is the PowerEdge T550, a flexible two-socket tower chassis server that, Dell Technologies says, balances expandability and performance. This system is based on the latest 3rd Gen Intel Xeon scalable processors, enabling it to run complex workloads using highly scalable memory, I/O and network options.
With support for up to 16 DDR4 DIMMs and up to 24 drives, the PowerEdge T550 is a substantial general-purpose platform capable of handling demanding workloads and applications, such as data warehousing, ecommerce, databases, and high-performance computing (HPC).
According to Dell Technologies, the PowerEdge T550 supports advanced technologies for enterprise-class workloads such as virtualization, medical imaging, data analytics, and software-defined storage. With 3rd Gen Intel Xeon scalable processors, the PowerEdge T550 can also be used for applications requiring AI acceleration thanks to Intel's Deep Learning Boost technology.
To ensure the security of edge deployments, Dell Technologies employs a multi-layered approach which starts at the hardware with an immutable Root of Trust. In PowerEdge servers, the Root of Trust is based on read-only public keys that at startup attest to the integrity of the system BIOS and the firmware for the Integrated Dell Remote Access Controller (iDRAC).
This enables an end-to-end verified boot, which means that at each stage of the boot cycle, each piece of code is verified by cryptographic signature. If some code fails the verification process, Dell provides the ability to revert to a known good image.
Protecting data is vital for any enterprise, and this goes doubly so in a perhaps vulnerable edge deployment. For this reason, Dell Technologies supports self-encrypting drives (SEDs) in its new PowerEdge servers, with the keys for accessing the drives stored in the PowerEdge Raid Controller (PERC). If a drive is stolen, the data is inaccessible without the key stored in the PERC.
Dell Technologies also provides for a higher-level security management of the keys necessary for accessing the encrypted drives. Secure Enterprise Key Manager (SEKM) implements key management server (KMS) to store keys centrally. It distributes these to the PERC through the iDRAC in each server to unlock access to the servers storage devices at boot time. This arrangement ensures that even if an entire server is removed from an edge data center or enclosure, the data stored on it remains encrypted and inaccessible without access to the central KMS keys.
The latest PowerEdge systems protect against malicious code that attempts to target the memory space of running applications, courtesy of Software Guard Extensions (SGX) found in newer Intel Xeon processors. This capability enables secure enclaves to be created in memory for sensitive processes, which only that process can access. The 3rd Gen Intel Xeon scalable processors in the PowerEdge T550 is Intels first mainstream two-socket processor to feature SGX across all SKUs.
As recent supply chain attacks have shown, it is possible to compromise a system at any point in the chain. For example, a server could be infected with malware for later exploitation before it even reaches the customer. To tackle this issue, Dell has introduced Secured Component Verification (SCV), a supply chain assurance scheme to verify that the system that arrives at the customer site is the same as was built in the factory.
This is achieved by generating a certificate from the unique component IDs during the factory assembly process, which is signed in the Dell factory and stored in the servers iDRAC. The customer can use SCV to validate the system inventory against the SCV certificate, as any swapping or removal of the components from which the certificate was generated at the factory would be identified as a mismatch.
The cyber-resilient architecture of Dell EMC PowerEdge systems supports a secure server lifecycle. This begins with secure provisioning and ensuring that any images loaded on to the server are secure, signed and verified.
In some PowerEdge models, Dell supports live scanning of the system BIOS, which makes it possible to verify the integrity and authenticity of the BIOS image in the primary ROM not just at boot up but also whilst the host is powered on and running. This scan is scheduled through the iDRAC.
The latest generation of PowerEdge servers can also securely control a servers configuration after it is provisioned. System Lockdown mode prevents users without system privileges from making changes to the configuration or firmware so protecting the system from unintentional or malicious changes.
Security is not something that should be tacked on to servers on an as-you-go basis
Dell Technologies has supported digital signatures on firmware updates for several generations of PowerEdge servers. This feature assures that only authentic firmware is running on the server platform. Dell digitally signs all firmware packages, and the iDRAC scans and compares their signatures with what is expected using the silicon-based Root of Trust. Any firmware package that fails validation is aborted and an error message is logged.
At the end of the system life cycle, Dells PowerEdge portfolio includes Secure Erase to remove sensitive data and settings. Customers can wipe storage devices and non-volatile stores such as caches and logs in systems, so that no information is unintentionally exposed after disposal.
The ability to remotely manage systems without an engineer having to physically attend the site is a prerequisite for edge deployments. This is a core capability of the Dell EMC OpenManage Enterprise management platform, which allows IT staff to discover, deploy, update and monitor PowerEdge servers.
For example, OpenManage Enterprise working with iDRAC enables an organization to detect any drift from a user-defined configuration template, and fix the issue.
To conclude, security is not something that should be tacked on to servers on an as-you-go basis. It must be built into server hardware from the outset. This is just as important for edge deployments as the data center. With a secure server infrastructure in place, IT teams can spend less time reacting to security issues, thereby improving their productivity.
Dells latest PowerEdge server systems show the way with security embedded in the hardware and a secure lifecycle that extends from the factory right through to retirement of the hardware by the customer, to ensure that systems and the data they contain stay as secure as possible.
Sponsored by Dell.
- Blackline Safety : What is the cloud and why should businesses care about cloud-connected safety? - marketscreener.com - January 22nd, 2022
- DataHEALTH, Inc. Begins Notification of Cybersecurity Incident - PRNewswire - January 22nd, 2022
- Data Centers Must Rethink Interconnection in Order to Evolve - Data Center Frontier - January 22nd, 2022
- Onlive Server Launched Canada VPS Hosting with Upto 48 CPU CORE and Cloud VPS Control Panel - Digital Journal - January 22nd, 2022
- Gartner: IT spending forecast points to skills rebalance - ComputerWeekly.com - January 22nd, 2022
- IBM is selling off its Watson Health assets - Boston News, Weather, Sports | WHDH 7News - January 22nd, 2022
- Global Cloud Hosting Service Market Focusing on Trends and Innovations during the Period 2021 to 2027 Discovery Sports Media - Discovery Sports Media - January 22nd, 2022
- Why COVIDtests.gov worked where HealthCare.gov stumbled - FedScoop - January 22nd, 2022
- VTEX : 5 benefits of SaaS and a cloud commerce ecosystem - marketscreener.com - January 22nd, 2022
- Ford and ADT team up to prevent theft from vehicles - TechCrunch - January 22nd, 2022
- Patent Awarded to Nanoprecise Sci Corp for its Automated Predictive Maintenance Solution - PR Newswire India - January 22nd, 2022
- Recent Analysis on Cloud Hosting Service Market 2022-2028 Top Trends, Business Opportunity, and Growth Strategy LSMedia - LSMedia - January 22nd, 2022
- Google Project Iris AR Headset in the Works, May Feature In-House Processor: Report - Gadgets 360 - January 22nd, 2022
- Cyber Security in 2022: What Should You Know? - GISuser.com - January 22nd, 2022
- Cellular connectivity: the final piece of the IoT puzzle - ITProPortal - January 22nd, 2022
- The opportunities and challenges of data center industry in 2022 - Analytics India Magazine - January 16th, 2022
- The rising threat of cyber criminals targeting cloud infrastructure in 2022 - Help Net Security - January 16th, 2022
- Strata Identity Hosts Complimentary Webinar Featuring ESG Analyst on Identity and Policy Management for Multi-Cloud in 2022 - Business Wire - January 16th, 2022
- ISG to Conduct Study on Private and Hybrid Cloud Providers - StreetInsider.com - January 16th, 2022
- Strengthening the availability chain - ITProPortal - January 16th, 2022
- NordVPN launches open source VPN speed testing tool - IT PRO - January 16th, 2022
- Emby vs Plex: Which media server is right for you? - nation.lk - The Nation Newspaper - January 16th, 2022
- Nutanix Rajiv Ramaswami On His First Year As CEO - Forbes - January 16th, 2022
- ThycoticCentrify adds new security controls and automation to Secret Server - SecurityBrief Asia - January 16th, 2022
- PCIe 6.0 is here with double the bandwidth at 128Gbps - comments - GSMArena.com - January 16th, 2022
- 'Our servers are secure' -- NIMC responds as hacker claims he gained access to NIN database - TheCable - January 16th, 2022
- How this Mumbai startup is carving a niche for itself in the crowded ecommerce delivery space - YourStory - January 16th, 2022
- What begins with a 'B' and is having problems at tsoHost? Hopefully not your website - The Register - January 12th, 2022
- Sensory Extends Voice and Visual AI Platform to the Cloud - Voicebot.ai - January 12th, 2022
- How these 3 Companies Leverage the Hybrid Cloud - TechGenix - January 12th, 2022
- Multi-cloud security doesn't have to be complicated, just consistent - IT-Online - January 12th, 2022
- Podcast: why the future of data management sits in the cloud - Central Banking - January 12th, 2022
- Streaming Analytics Market worth $50.1 billion by 2026 - Exclusive Report by MarketsandMarkets - Yahoo Finance - January 12th, 2022
- Growing Technical Advancements in DevOps Technologies and Their Rising Demand for Optimizing Business Operations to Drive the Global DevOps Market by... - January 12th, 2022
- Data Center Market to Grow by USD 519.34 Bn | Adoption of Multi-cloud and Network Upgrades to Support 5G will Drive Growth | Technavio - PRNewswire - January 12th, 2022
- From 1920s to 2020s: Get ready for a new Roaring Twenties - Big Think - January 12th, 2022
- Post Pandemic: Cloud Adoption Needs to Be Accelerated - APN News - January 12th, 2022
- 2 Growth Stocks That Could Double Your Money in 5 Years - Motley Fool - January 12th, 2022
- Dispelling the top five myths of modern infrastructure - ComputerWeekly.com - January 12th, 2022
- The Future of Records & Compliance With Optimere CEO ICYMI - Government Technology - January 12th, 2022
- Why Banks Are Slow to Embrace Cloud Computing - The New York Times - January 4th, 2022
- How I fell into the self-hosting rabbit hole in 2021 - Windows Central - January 4th, 2022
- The future of web hosting: 5 things to look out for in 2022 - TechRadar - January 4th, 2022
- New Connectivity Is Bringing Roads Up to Speed - Wired.co.uk - January 4th, 2022
- Healthcare for the new normal world reimagined with digital analytics at the core - ETHealthworld.com - January 4th, 2022
- Opinion: White Renegade of the Year 2021 Gregory Hood - Prescott eNews - January 4th, 2022
- Best of 2021 Why Kubernetes is the King of Containerized Tools - Container Journal - December 27th, 2021
- Cloud and Edge Computing Will Be Key for Government Agencies in 2022 - StateTech Magazine - December 27th, 2021
- Cloud Security Market 2021: Industry Size, Regions, Emerging Trends, Growth Insights, Opportunities, and Forecast By 2027 mainlander.nz -... - December 27th, 2021
- iOS 15.2 Makes it Easier to Replace the Screen on the iPhone 13 - iDrop News - December 27th, 2021
- 4-Year-Old Bug in Azure App Service Exposed Hundreds of Source Code Repositories - The Hacker News - December 27th, 2021
- Top 5 Best Free Linux Cloud Servers  - December 22nd, 2021
- phoenixNAP and MemVerge to Enable Memory Virtualization in Bare Metal Cloud - HPCwire - December 22nd, 2021
- AWS outages and cloud computing, explained - Popular Science - December 22nd, 2021
- How the Cloud Helps With Medical Research and Remote Medicine - Business Insider - December 22nd, 2021
- Contributed | The role of the Cloud in digital transformation - DIGIT.FYI - December 22nd, 2021
- Cloud Security Market 2021 is Expected to be on Course to Achieve Considerable Growth to 2027 mainlander.nz - mainlander.nz - December 22nd, 2021
- How Tripwire Can Be a Partner on Your Zero Trust Journey - tripwire.com - December 22nd, 2021
- Top Cloud Computing Trends Shaping Our IT Landscape in 2022 - CRN - India - CRN.in - December 22nd, 2021
- Medelln Campus writes the future of worldwide industrial automation - Intelligent CIO ME - December 22nd, 2021
- How Kubernetes lowers costs and automates IT department work - The Register - December 22nd, 2021
- 3 Top Trends to Invest in for 2022 (and Beyond) - Motley Fool - December 22nd, 2021
- What Agencies Need to Do to Combat Shadow IT Driven by Cloud Sprawl - Nextgov - December 12th, 2021
- Nvidia CEO Huang jointly files patent for software tech in the metaverse - The Register - December 12th, 2021
- Truly thrifty cloud hosting - Hetzner Online GmbH - December 5th, 2021
- These researchers wanted to test cloud security. They were shocked by what they found - ZDNet - December 5th, 2021
- What Is The Cloud And Where Is It Used? - Fossbytes - December 5th, 2021
- JetBrains starts adding remote dev functionality on IDEs and introduces Fleet - ZDNet - December 5th, 2021
- Your iPhones best trick is tucked away inside Photos app do you know it?... - The Sun - December 5th, 2021
- Tech Investment Alert: Check Out Top Five Tech Stocks Today - Analytics Insight - December 5th, 2021
- Tencent Cloud and AMD Join Forces to Launch StarLake Servers in Southeast Asia - HPCwire - December 3rd, 2021
- A Climate Dystopia Displayed at the UMOCA with 'the weight of a cloud' - Daily Utah Chronicle - December 3rd, 2021
- AWS Announced General Availability of Elastic Disaster Recovery - InfoQ.com - December 3rd, 2021
- The Benefits of Using a Share File Server in Education - eLearningInside News - eLearningInside News - December 3rd, 2021
- 5 questions for Mark Mills on the cloud revolution - Washington Examiner - December 3rd, 2021
- Inspur Information Impresses in AI Performance with 7 Titles in MLPerf Training v1.1 - Business Wire - December 3rd, 2021
- How Secure Is iMessage? | Leaked FBI Document Reveals the Truth - iDrop News - December 3rd, 2021
- Netweb Technologies Bags Award from MeitY in Contribution to the Manufacturing Sector - News Nation - December 3rd, 2021
- FTC is Suing NVIDIA to Stop Its $40B Acquisition of Arm Amidst Concerns of Potential Reliance from Rival Firms Should Deal Push Through - Tech Times - December 3rd, 2021
- VPS Hosting | Free SSD VPS Server Trial | Windows VPS ... - November 22nd, 2021