HPE Trusted Supply Chain for ProLiant

SKU
P36394-B21
£1,640.32 £1,366.93
In stock
Trusted Supply Chain for ProLiant
More Information
Built-in processor No
SKU P36394-B21
EAN 0190017480732
Manufacturer HPE
Availability Y

iLO Security State: High Security

Configuring iLO to use High Security mode reduces the attack surface for cyber attackers, making it more difficult to insert compromised code or malware into the server firmware.
Security state locks down the host and requires specific authentication through encryption before a user can log into the server.

UEFI Secure Boot feature: Enabled

For customers who ask Hewlett Packard Enterprise to load an OS at the factory, enabling UEFI Secure Boot connects the Silicon Root of Trust to the OS.
An industry-recognized feature, affixing the UEFI firmware to the boot loader ensures that the genuine and authenticated OS is initialized.
Any antivirus software actually runs in the OS, but cannot detect hackers or an intrusion until the OS is fully running. Some astute bad actors try to compromise the OS before its antivirus tools have a chance to start.
The UEFI Secure Boot feature provides protection against this scenario. If a customer chooses to load the OS on their own, they can configure this feature when the HPE Trusted Supply Chain server is delivered to the end-user location.

HPE Server Configuration Lock: Enabled

This feature takes cryptographic measurements, or images, of the supported HPE Trusted Supply Chain server firmware, hardware components, and options. It creates a digital fingerprint of the server configuration. If any firmware, hardware, or options are altered, an alert is displayed at startup.
Enabling this feature at the factory essentially prevents all tampering or compromise to the server composition, no matter how slight.
This feature uses a password, created by Hewlett Packard Enterprise, to lock down the server configuration at the factory. The password is securely transmitted to the customer, who unlocks the server when it arrives.

HPE chassis intrusion detection switch: Enabled

This mechanism protects the HPE Trusted Supply Chain server from physical intrusion.
Complementing and reinforcing the protection from the Server Configuration Lock, the chassis intrusion detection switch registers an alert if the top of the server chassis is removed.
It logs an event in the iLO firmware, even if the server is powered off. If any cyber attacker or unauthorized personnel open the server chassis, the customer will know that someone might have tampered with the server.

Do you want to defend applications and data before your server is built? HPE Trusted Supply Chain services provide a new first line of defense against cyber-attackers with select servers built to the world’s toughest security standards in secured facilities globally. HPE trusted supply chain and server security optimization services brings together enterprise security, processes and people to deliver protection for your most sensitive applications and data even before your server is built.

What is new supporting point:
Support for HPE ProLiant Compute Gen12
Build Trusted Supply Chain Solutions globally
Hard drive
RAID levels0, 1, 5, 10
Processor
Built-in processorNo
Processor socketLGA 3647 (Socket P)
Processor familyIntel® Xeon® Scalable
Number of processors supported2
Motherboard chipsetIntel® C621
Processor manufacturerIntel
Processor generation2nd Generation Intel® Xeon® Scalable
Memory
Supported RDIMM clock speeds2933 MHz
Supported memory typesDDR4-SDRAM
Number of DIMM slots24
Maximum RDIMM memory1.54 TB
ECCYes
Storage
Number of storage drives supported4
Supported storage drive interfacesSerial ATA
RAID levels0, 1, 5, 10
Storage drive sizes supported3.5"
Ports & interfaces
USB 3.2 Gen 1 (3.1 Gen 1) Type-A ports quantity3
USB 2.0 ports quantity0
Ethernet LAN (RJ-45) ports0
Internal USB 3.2 Gen 1 (3.1 Gen 1) ports quantity2
Technical details
Number of storage drives supported4
Chassis typeRack (1U)
Design
Chassis typeRack (1U)
Power
Power supply0 W
Weight & dimensions
Width434.6 mm
Height42.9 mm
Depth707 mm

You may also be interested in

Compare Products
Product HPE Trusted Supply Chain for ProLiant HPE Trusted Supply Chain for ProLiant
£1,640.32 £1,366.93
Intel Server System M50CYP1UR212 Intel C621A LGA 4189 Rack (1U) Intel Server System M50CYP1UR212 Intel...
£2,350.97 £1,959.14
Intel Server System M50CYP2UR208 Intel C621A LGA 4189 Rack (2U) Intel Server System M50CYP2UR208 Intel...
£2,018.92 £1,682.43
Intel Server System M50CYP2UR312 Intel C621A Rack (2U) Intel Server System M50CYP2UR312 Intel...
£2,294.66 £1,912.22
SKU
P36394-B21
M50CYP1UR212
M50CYP2UR208
M50CYP2UR312
Description
Do you want to defend applications and data before your server is built? HPE Trusted Supply Chain services provide a new first line of defense against cyber-attackers with select servers built to the world’s toughest security standards in secured facilities globally. HPE trusted supply chain and server security optimization services brings together enterprise security, processes and people to deliver protection for your most sensitive applications and data even before your server is built.

What is new supporting point:
Support for HPE ProLiant Compute Gen12
Build Trusted Supply Chain Solutions globally
The Intel® Server System M50CYP Family is designed to be your primary workhorse server for all your mainstream needs, including collaboration, storage, database, web server, ecommerce, analytics, and more.
The Intel® Server System M50CYP Family is designed to be your primary workhorse server for all your mainstream needs, including collaboration, storage, database, web server, ecommerce, analytics, and more.
The Intel® Server System M50CYP Family is designed to be your primary workhorse server for all your mainstream needs, including collaboration, storage, database, web server, ecommerce, analytics, and more.
Short Description
Trusted Supply Chain for ProLiant
Intel Server System M50CYP1UR212, Single
Intel Server System M50CYP2UR208, Single
Intel Server System M50CYP2UR312, Single
Manufacturer
HPE
Intel
Intel
Intel