{"id":11736,"date":"2024-07-30T19:04:44","date_gmt":"2024-07-30T19:04:44","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=11736"},"modified":"2024-07-30T19:04:44","modified_gmt":"2024-07-30T19:04:44","slug":"the-basics-and-business-of-trusted-security","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/","title":{"rendered":"The Basics and Business of Trusted Security"},"content":{"rendered":"<p>Discover how the HPE ProLiant Gen11 server delivers unmatched security protection by providing a trusted supply chain and silicon-level protection and coverage.<\/p>\n<p><a href=\"https:\/\/stuf.in\/beoeo0\" target=\"_blank\" rel=\"noopener\">View: The Basics and Business of Trusted Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you expect trusted security from your servers? @HPE does and delivers it by providing protection from the hardware up through the stack into the OS, platform, and applications. Read this brochure to learn more \u2014and reach out to Abrahams Consulting LLC to configure your HPE ProLiant Gen11 server today.<\/p>\n","protected":false},"author":2,"featured_media":11735,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1141,1136],"tags":[],"class_list":["post-11736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hpe","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Basics and Business of Trusted Security - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Basics and Business of Trusted Security - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Do you expect trusted security from your servers? @HPE does and delivers it by providing protection from the hardware up through the stack into the OS, platform, and applications. Read this brochure to learn more \u2014and reach out to Abrahams Consulting LLC to configure your HPE ProLiant Gen11 server today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-30T19:04:44+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"The Basics and Business of Trusted Security\",\"datePublished\":\"2024-07-30T19:04:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/\"},\"wordCount\":37,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/07\/The_Basics_and_Business_of_Trusted_Security_thumb.jpg\",\"articleSection\":[\"HPE\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/\",\"name\":\"The Basics and Business of Trusted Security - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/07\/The_Basics_and_Business_of_Trusted_Security_thumb.jpg\",\"datePublished\":\"2024-07-30T19:04:44+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/07\/The_Basics_and_Business_of_Trusted_Security_thumb.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/07\/The_Basics_and_Business_of_Trusted_Security_thumb.jpg\",\"width\":600,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Basics and Business of Trusted Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Basics and Business of Trusted Security - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/","og_locale":"en_US","og_type":"article","og_title":"The Basics and Business of Trusted Security - TechTonic Times","og_description":"Do you expect trusted security from your servers? @HPE does and delivers it by providing protection from the hardware up through the stack into the OS, platform, and applications. Read this brochure to learn more \u2014and reach out to Abrahams Consulting LLC to configure your HPE ProLiant Gen11 server today.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/","og_site_name":"TechTonic Times","article_published_time":"2024-07-30T19:04:44+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"The Basics and Business of Trusted Security","datePublished":"2024-07-30T19:04:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/"},"wordCount":37,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/07\/The_Basics_and_Business_of_Trusted_Security_thumb.jpg","articleSection":["HPE","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/","name":"The Basics and Business of Trusted Security - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/07\/The_Basics_and_Business_of_Trusted_Security_thumb.jpg","datePublished":"2024-07-30T19:04:44+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/07\/The_Basics_and_Business_of_Trusted_Security_thumb.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2024\/07\/The_Basics_and_Business_of_Trusted_Security_thumb.jpg","width":600,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/the-basics-and-business-of-trusted-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Basics and Business of Trusted Security"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/11736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=11736"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/11736\/revisions"}],"predecessor-version":[{"id":11737,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/11736\/revisions\/11737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/11735"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=11736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=11736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=11736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}