Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Videos / End-to-End Server Security with HPE iLO 7

End-to-End Server Security with HPE iLO 7



Next Gen HPE ProLiant Compute Deep Dive


This video is part of the appearance, “End-to-End Server Security with HPE iLO 7“. It was recorded as part of Next Gen HPE ProLiant Compute Deep Dive at 10:30-11:30 on April 8, 2025.


Watch on YouTube
Watch on Vimeo

From chip to cloud, HPE ProLiant iLO 7 features many security innovations. Presented by Cole Humphreys, Server Security Product Manager, and Luis Luciano, Distinguished Technologist.

During this deep dive session, HPE outlined its comprehensive security approach to server infrastructure, emphasizing that cybersecurity threats are pervasive and increasingly targeting hardware vulnerabilities. HPE identified rising ransomware threats, the growing potential impact of AI in cyberattacks, and the huge financial losses associated with data breaches—especially profound for small and mid-sized businesses. As part of HPE’s Secure by Design strategy, ProLiant servers are architected to provide end-to-end security beginning in the supply chain, through server production, and into operational environments. This includes adherence to a secure development lifecycle, global operational support, and ongoing collaboration with industry standard and compliance frameworks like NIST, FIPS, PCI DSS, and HIPAA.

A central component of this security framework is the iLO 7 management chip, which introduces advanced capabilities such as Silicon Root of Trust (SROT) and a new secure enclave. The iLO 7 chip validates server components before booting, ensuring only authenticated firmware and hardware are allowed to operate. By embedding immutable firmware directly bound to silicon and incorporating new standards like post-quantum cryptography (PQC) compliance, HPE asserts its systems remain secure even against future quantum computing threats. The secure enclave also provides on-chip, level 3 FIPS-compliant key management with support for Safe Erase and backup to external HSMs like those from Talos, allowing customers to store encryption keys in a hardened environment without sacrificing accessibility. Moreover, HPE’s use of SPDM (Security Protocol and Data Model) enables attestation and validation of third-party hardware components such as GPUs, enhancing the zero trust model across external devices and integrations.

HPE also highlighted the centralized security dashboards available through Compute Ops Management (COM), enabling organizations to gain real-time visibility into server health and security posture across large fleets. Moreover, HPE discussed compliance best practices involving log sanitization for regulatory regulations like GDPR and HIPAA, and its approach to TLS certificate management in alignment with modern browser requirements. Beyond firmware and component-level concerns, the conversation expanded to the implications of managing security for peripheral systems like liquid cooling in high-performance environments and how security standards must adapt to interconnected dependencies. The session concluded by emphasizing HPE’s differentiation in the market due to its proprietary silicon, holistic secure development lifecycle, and forward-compatible security features, along with anecdotal examples of how their architecture shielded customers from industry-wide vulnerabilities impacting competitors.

Personnel: Cole Humphreys, Luis Luciano


  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • May 28-May 29 — Security Field Day 13
  • Jun 4-Jun 5 — Cloud Field Day 23
  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Jul 16-Jul 17 — Edge Field Day 4
  • Jul 23-Jul 24 — AppDev Field Day 3
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Oct 29-Oct 30 — AI Field Day 7

Latest Links

  • Meraki Campus Gateway: Cloud-Managed Overlay for Complex Networks
  • Exploring the Future of Cybersecurity at Security Field Day 13
  • 5G Neutral Host: Solving Enterprise Cellular Coverage Gaps
  • Qlik Connect 2025: Answers For Agentic AI
  • Scaling Wi-Fi with Arista Networks EVPN using VESPA and MRO

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in