{"id":10678,"date":"2024-03-20T13:15:48","date_gmt":"2024-03-20T13:15:48","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=10678"},"modified":"2024-03-20T13:15:48","modified_gmt":"2024-03-20T13:15:48","slug":"trusted-security-by-design-hpe-proliant-gen11","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/","title":{"rendered":"Trusted Security by Design &#8211; HPE ProLiant Gen11"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/nVoUvBVA8Rc\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    This video emphasizes the importance of choosing the right computing solution to ensure the security of the infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a Chief Security Officer, safeguarding your infrastructure should be your top priority. With increasing threats, the choice of computing system is critical. The @HPE Silicon Root of Trust ensures that your servers remain secure thanks to an uncompromising focus on security. Contact Abrahams Consulting LLC to learn more about how HPE is engineering security for a hybrid world.<\/p>\n","protected":false},"author":2,"featured_media":10677,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1141,1136],"tags":[],"class_list":["post-10678","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hpe","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trusted Security by Design - HPE ProLiant Gen11 - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trusted Security by Design - HPE ProLiant Gen11 - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"As a Chief Security Officer, safeguarding your infrastructure should be your top priority. With increasing threats, the choice of computing system is critical. The @HPE Silicon Root of Trust ensures that your servers remain secure thanks to an uncompromising focus on security. Contact Abrahams Consulting LLC to learn more about how HPE is engineering security for a hybrid world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-20T13:15:48+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Trusted Security by Design &#8211; HPE ProLiant Gen11\",\"datePublished\":\"2024-03-20T13:15:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/\"},\"wordCount\":26,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/03\/hqdefault-1.jpg\",\"articleSection\":[\"HPE\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/\",\"name\":\"Trusted Security by Design - HPE ProLiant Gen11 - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/03\/hqdefault-1.jpg\",\"datePublished\":\"2024-03-20T13:15:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/03\/hqdefault-1.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/03\/hqdefault-1.jpg\",\"width\":480,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trusted Security by Design &#8211; HPE ProLiant Gen11\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trusted Security by Design - HPE ProLiant Gen11 - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/","og_locale":"en_US","og_type":"article","og_title":"Trusted Security by Design - HPE ProLiant Gen11 - TechTonic Times","og_description":"As a Chief Security Officer, safeguarding your infrastructure should be your top priority. With increasing threats, the choice of computing system is critical. The @HPE Silicon Root of Trust ensures that your servers remain secure thanks to an uncompromising focus on security. Contact Abrahams Consulting LLC to learn more about how HPE is engineering security for a hybrid world.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/","og_site_name":"TechTonic Times","article_published_time":"2024-03-20T13:15:48+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Trusted Security by Design &#8211; HPE ProLiant Gen11","datePublished":"2024-03-20T13:15:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/"},"wordCount":26,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/03\/hqdefault-1.jpg","articleSection":["HPE","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/","name":"Trusted Security by Design - HPE ProLiant Gen11 - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/03\/hqdefault-1.jpg","datePublished":"2024-03-20T13:15:48+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/03\/hqdefault-1.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/03\/hqdefault-1.jpg","width":480,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-gen11\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Trusted Security by Design &#8211; HPE ProLiant Gen11"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/10678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=10678"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/10678\/revisions"}],"predecessor-version":[{"id":10679,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/10678\/revisions\/10679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/10677"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=10678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=10678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=10678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}