{"id":8117,"date":"2023-04-07T17:04:16","date_gmt":"2023-04-07T17:04:16","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=8117"},"modified":"2023-04-07T17:04:16","modified_gmt":"2023-04-07T17:04:16","slug":"trusted-security-by-design-hpe-proliant-dl-gen11","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/","title":{"rendered":"Trusted Security by Design &#8211; HPE ProLiant DL Gen11"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/nVoUvBVA8Rc\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    HPE ProLiant Gen11 servers are engineered to have the security you need to defend against increasingly complex threats. Watch this video to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>#HPE ProLiant Gen11 offers you cutting-edge security. \ud83d\udd10 In this video, you&#8217;ll discover how ProLiant is engineered with security that will defend your data against increasingly complex threats. Reach out to Abrahams Consulting LLC to learn more.<\/p>\n","protected":false},"author":2,"featured_media":8116,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1141,1136],"tags":[],"class_list":["post-8117","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hpe","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trusted Security by Design - HPE ProLiant DL Gen11 - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trusted Security by Design - HPE ProLiant DL Gen11 - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"#HPE ProLiant Gen11 offers you cutting-edge security. \ud83d\udd10 In this video, you&#039;ll discover how ProLiant is engineered with security that will defend your data against increasingly complex threats. Reach out to Abrahams Consulting LLC to learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T17:04:16+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Trusted Security by Design &#8211; HPE ProLiant DL Gen11\",\"datePublished\":\"2023-04-07T17:04:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/\"},\"wordCount\":33,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/hqdefault-1.jpg\",\"articleSection\":[\"HPE\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/\",\"name\":\"Trusted Security by Design - HPE ProLiant DL Gen11 - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/hqdefault-1.jpg\",\"datePublished\":\"2023-04-07T17:04:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/hqdefault-1.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/hqdefault-1.jpg\",\"width\":480,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trusted Security by Design &#8211; HPE ProLiant DL Gen11\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trusted Security by Design - HPE ProLiant DL Gen11 - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/","og_locale":"en_US","og_type":"article","og_title":"Trusted Security by Design - HPE ProLiant DL Gen11 - TechTonic Times","og_description":"#HPE ProLiant Gen11 offers you cutting-edge security. \ud83d\udd10 In this video, you'll discover how ProLiant is engineered with security that will defend your data against increasingly complex threats. Reach out to Abrahams Consulting LLC to learn more.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/","og_site_name":"TechTonic Times","article_published_time":"2023-04-07T17:04:16+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Trusted Security by Design &#8211; HPE ProLiant DL Gen11","datePublished":"2023-04-07T17:04:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/"},"wordCount":33,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/hqdefault-1.jpg","articleSection":["HPE","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/","name":"Trusted Security by Design - HPE ProLiant DL Gen11 - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/hqdefault-1.jpg","datePublished":"2023-04-07T17:04:16+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/hqdefault-1.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2023\/04\/hqdefault-1.jpg","width":480,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/trusted-security-by-design-hpe-proliant-dl-gen11\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Trusted Security by Design &#8211; HPE ProLiant DL Gen11"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=8117"}],"version-history":[{"count":1,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8117\/revisions"}],"predecessor-version":[{"id":8118,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/8117\/revisions\/8118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/8116"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=8117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=8117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=8117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}