We use cookies to make your experience better.
To comply with the new e-Privacy directive, you agree to the privacy policy and our use of cookies.
HPE Trusted Supply Chain for ProLiant
Built-in processor | No |
---|---|
SKU | P36394-B21 |
EAN | 0190017480732 |
Manufacturer | HPE |
Availability | Y |
iLO Security State: High Security
Configuring iLO to use High Security mode reduces the attack surface for cyber attackers, making it more difficult to insert compromised code or malware into the server firmware.
Security state locks down the host and requires specific authentication through encryption before a user can log into the server.
UEFI Secure Boot feature: Enabled
For customers who ask Hewlett Packard Enterprise to load an OS at the factory, enabling UEFI Secure Boot connects the Silicon Root of Trust to the OS.
An industry-recognized feature, affixing the UEFI firmware to the boot loader ensures that the genuine and authenticated OS is initialized.
Any antivirus software actually runs in the OS, but cannot detect hackers or an intrusion until the OS is fully running. Some astute bad actors try to compromise the OS before its antivirus tools have a chance to start.
The UEFI Secure Boot feature provides protection against this scenario. If a customer chooses to load the OS on their own, they can configure this feature when the HPE Trusted Supply Chain server is delivered to the end-user location.
HPE Server Configuration Lock: Enabled
This feature takes cryptographic measurements, or images, of the supported HPE Trusted Supply Chain server firmware, hardware components, and options. It creates a digital fingerprint of the server configuration. If any firmware, hardware, or options are altered, an alert is displayed at startup.
Enabling this feature at the factory essentially prevents all tampering or compromise to the server composition, no matter how slight.
This feature uses a password, created by Hewlett Packard Enterprise, to lock down the server configuration at the factory. The password is securely transmitted to the customer, who unlocks the server when it arrives.
HPE chassis intrusion detection switch: Enabled
This mechanism protects the HPE Trusted Supply Chain server from physical intrusion.
Complementing and reinforcing the protection from the Server Configuration Lock, the chassis intrusion detection switch registers an alert if the top of the server chassis is removed.
It logs an event in the iLO firmware, even if the server is powered off. If any cyber attacker or unauthorized personnel open the server chassis, the customer will know that someone might have tampered with the server.
What is new supporting point:
Support for HPE ProLiant Compute Gen12
Build Trusted Supply Chain Solutions globally
Hard drive | |
---|---|
RAID levels | 0, 1, 5, 10 |
Processor | |
Built-in processor | No |
Processor socket | LGA 3647 (Socket P) |
Processor family | Intel® Xeon® Scalable |
Number of processors supported | 2 |
Motherboard chipset | Intel® C621 |
Processor manufacturer | Intel |
Processor generation | 2nd Generation Intel® Xeon® Scalable |
Memory | |
Supported RDIMM clock speeds | 2933 MHz |
Supported memory types | DDR4-SDRAM |
Number of DIMM slots | 24 |
Maximum RDIMM memory | 1.54 TB |
ECC | Yes |
Storage | |
Number of storage drives supported | 4 |
Supported storage drive interfaces | Serial ATA |
RAID levels | 0, 1, 5, 10 |
Storage drive sizes supported | 3.5" |
Ports & interfaces | |
---|---|
USB 3.2 Gen 1 (3.1 Gen 1) Type-A ports quantity | 3 |
USB 2.0 ports quantity | 0 |
Ethernet LAN (RJ-45) ports | 0 |
Internal USB 3.2 Gen 1 (3.1 Gen 1) ports quantity | 2 |
Technical details | |
Number of storage drives supported | 4 |
Chassis type | Rack (1U) |
Design | |
Chassis type | Rack (1U) |
Power | |
Power supply | 0 W |
Weight & dimensions | |
Width | 434.6 mm |
Height | 42.9 mm |
Depth | 707 mm |
You may also be interested in
Product |
![]()
£1,640.32
£1,366.93
|
![]()
£2,350.97
£1,959.14
|
![]()
£2,018.92
£1,682.43
|
![]()
£2,294.66
£1,912.22
|
---|---|---|---|---|
SKU |
P36394-B21
|
M50CYP1UR212
|
M50CYP2UR208
|
M50CYP2UR312
|
Description |
Do you want to defend applications and data before your server is built? HPE Trusted Supply Chain services provide a new first line of defense against cyber-attackers with select servers built to the world’s toughest security standards in secured facilities globally. HPE trusted supply chain and server security optimization services brings together enterprise security, processes and people to deliver protection for your most sensitive applications and data even before your server is built.
What is new supporting point: Support for HPE ProLiant Compute Gen12 Build Trusted Supply Chain Solutions globally |
The Intel® Server System M50CYP Family is designed to be your primary workhorse server for all your mainstream needs, including collaboration, storage, database, web server, ecommerce, analytics, and more.
|
The Intel® Server System M50CYP Family is designed to be your primary workhorse server for all your mainstream needs, including collaboration, storage, database, web server, ecommerce, analytics, and more.
|
The Intel® Server System M50CYP Family is designed to be your primary workhorse server for all your mainstream needs, including collaboration, storage, database, web server, ecommerce, analytics, and more.
|
Short Description |
Trusted Supply Chain for ProLiant
|
Intel Server System M50CYP1UR212, Single
|
Intel Server System M50CYP2UR208, Single
|
Intel Server System M50CYP2UR312, Single
|
Manufacturer |
HPE
|
Intel
|
Intel
|
Intel
|
Please complete your information below to login.
Sign In
Create New Account