3 Ways HCI Helps Improve Your Data Center Security

3 Ways HCI Helps Improve Your Data Center Security
            Como todos sabemos, nada es 100% seguro, tal vez no más que cuando se trata de una infraestructura de servidor heredada.  Los equipos viejos y vulnerables son una bendición para los piratas informáticos.  Los ataques cada vez más sofisticados atacan la infraestructura obsoleta.
€ 4 million per data breach
According to figures from the IBM Cost of a Data Breach report1, the average financial cost of a security breach in 2020 was €3.86 million. The cost to reputation (both corporate and personal) can be long lasting and even more brutal. It is clear that regulations like the EU's GDPR carry heavy penalties for data breaches. As a CIO or senior IT specialist, you are increasingly being asked to do more with less. Budgets shrink as expectations rise, but new security threats still require time and focused resources. It's a tough position to hold - you don't have to be a wizard to work in IT, but it helps. So how do you balance the cycle of adding stronger and stronger security measures to reduce the risk of a data breach while cutting costs and managing resources wisely? Say hello to HCI
Hyperconverged infrastructure, or HCI, provides much of the answer. HCI combines the elements of a traditional data center—compute, storage, and networking—into a single system. Instead of a hardware-defined infrastructure, HCI creates a virtualized, software-defined environment that is often easier to maintain and easier to scale. This helps reduce operating costs and improve performance. Digital transformation is pushing enterprise data centers toward hyper-converged infrastructure (HCI) and away from traditional RAID infrastructures and computer storage networks. It's not hard to see why: HMI makes sense when agility, total cost of ownership, and security are your top priorities. But HCI is not secure by default To reduce the risk of security breaches, you should choose secure components in your HCI solution. AMD EPYCä processors are designed with a sophisticated set of security features that help minimize security risks. How AMD EPYC™ Processors Bring Security Capabilities to Your HCI Solution

  • AMD's focus on security. AMD Infinity Guard2 is a set of security features embedded at the silicon level that provides a modern, multifaceted approach to data center security. AMD Infinity Guard helps minimize potential attack surfaces during startup and while processing your critical data.
  • Virtual machine (VM) isolation. AMD EPYC™ processors have a capability called Secure Encrypted Virtualization (SEV) to cryptographically isolate virtual machines. Each virtual machine is encrypted with a unique key, owned and managed by the AMD Secure processor. By encrypting the memory of each VM, they are cryptographically isolated from each other and from the hypervisor. Your virtual machines are protected by one of 509 unique encryption keys known only to the processor.
  • Check for unauthorized software and malware at startup. This feature provides authentication checks to make sure the firmware has not been changed. Boot-level hardware security protections, such as AMD Secure Boot, provide secure root of trust and can prevent a server from booting if the firmware has been changed. This can also be extended to virtualized environments by capturing a virtual machine image fingerprint. When starting virtual machines, if the image has been changed, the virtual machine cannot start.
  • You can find AMD EPYC processor-based solutions from our leading OEM and ISV partners. Learn more about AMD EPYC-powered HCI solutions here.
    1. IBM Security Report, Cost of a Data Breach, page 5. Report © Copyright IBM Corporation 2020
    2. AMD Infinity Guard security features on EPYC™ processors must be enabled by server OEMs and/or cloud service providers to work. Check with your OEM or carrier to confirm support for these features. Learn more about Infinity Guard at https://www.amd.com/en/technologies/infinity-guard. GD-177 AMD, AMD Arrow, EPYC, and combinations thereof are trademarks of Advanced Micro Devices, Inc.
    <p>Copyright © 2021 IDG Communications, Inc.</p>