{"id":6411,"date":"2022-08-25T19:10:36","date_gmt":"2022-08-25T19:10:36","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=6411"},"modified":"2022-08-25T19:10:36","modified_gmt":"2022-08-25T19:10:36","slug":"ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/","title":{"rendered":"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/25zr9dKdJXU\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    This short video explains that the 5 essential firmware components of the ILO chip and the secure start base must be verified\u2014otherwise the server will not power on. Please contact Abrahams Consulting LLC for more information about the HPE ILO chip.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abrahams Consulting LLC suggests watching this short video, which explains how the #HPE ILO 5 chip with silicon root of trust protects servers from attacks by not powering on unless all 5 firmware components and the secure start base are verified.<\/p>\n","protected":false},"author":2,"featured_media":6410,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1141,1136],"tags":[],"class_list":["post-6411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hpe","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Abrahams Consulting LLC suggests watching this short video, which explains how the #HPE ILO 5 chip with silicon root of trust protects servers from attacks by not powering on unless all 5 firmware components and the secure start base are verified.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T19:10:36+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks\",\"datePublished\":\"2022-08-25T19:10:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/\"},\"wordCount\":52,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/08\/hqdefault-1.jpg\",\"articleSection\":[\"HPE\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/\",\"name\":\"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/08\/hqdefault-1.jpg\",\"datePublished\":\"2022-08-25T19:10:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/08\/hqdefault-1.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/08\/hqdefault-1.jpg\",\"width\":480,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/","og_locale":"en_US","og_type":"article","og_title":"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks - TechTonic Times","og_description":"Abrahams Consulting LLC suggests watching this short video, which explains how the #HPE ILO 5 chip with silicon root of trust protects servers from attacks by not powering on unless all 5 firmware components and the secure start base are verified.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/","og_site_name":"TechTonic Times","article_published_time":"2022-08-25T19:10:36+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks","datePublished":"2022-08-25T19:10:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/"},"wordCount":52,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/08\/hqdefault-1.jpg","articleSection":["HPE","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/","name":"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/08\/hqdefault-1.jpg","datePublished":"2022-08-25T19:10:36+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/08\/hqdefault-1.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2022\/08\/hqdefault-1.jpg","width":480,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/ilo-5-chip-with-silicon-root-of-trust-protects-servers-from-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"ILO 5 Chip with Silicon Root of Trust Protects Servers from Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=6411"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6411\/revisions"}],"predecessor-version":[{"id":6412,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/6411\/revisions\/6412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/6410"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=6411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=6411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=6411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}