A Data Center That Serves Your Critical Missions Engage Efficiency to Ensure That Your Data Is Secure and Working in Tandem with New Technology

A Data Center That Serves Your Critical Missions Engage Efficiency to Ensure That Your Data Is Secure and Working in Tandem with New Technology

A Data Center that Serves Your Critical Missions Engage efficiency to ensure that your data is secure and working in tandem with new technology Old Technology. Retiring Engineers. For decades, your trusted engineers have held your legacy systems together with the technological equivalent of duct tape and bailing wire. But now they’re starting to retire. To keep your organization moving forward, your hardware and software systems must employ the latest technologies. But perhaps even more important, those technologies must be based on the skillsets possessed by the new generation of engineers. It has never been efficient or cost-effective to prolong the life of your obsolete data center. The right time to make changes for the future is now. Make a strategic move toward seamless, innovative, and secure technology to maintain data integrity in the 21st century. No Time Like the Present… • Increase Efficiency: Major advances in both hardware and software will enable you to continue using your legacy data and systems within a fully modern environment. • Migrate Archaic Software: Repackage your old but critical software so the new hardware can supercharge its performance. • Let Someone Else do the Work: Use the cloud to relieve space constraints, save money, simplify maintenance, and access the latest gear. High Performance Computing Containerization Cloud Computing (HPC) Containerizing your legacy With a FedRAMP-certified HPE Today’s HPC solutions let even software dramatically improves ProLiant cloud solution, all modestly sized organizations system performance and firmware is certified and updated benefit from the latest Big Data, security while freeing you up automatically, relieving your AI, and Data Center advances. from obsolete hardware and team of that expensive and time- associated maintenance costs. consuming chore. Contact 866-345-4720 | www.westwindcomputerproducts.com | [email protected] Speed: Organizations like the National Renewable Energy Laboratory (NREL) and Sandia National Laboratories use lightning-fast HPCs to model complex systems more efficiently. These systems have become increasingly affordable thanks to innovations such as the use of networked Arm processors. Innovation: The new containerization paradigm creates multiple isolated OS user-space instances. Each one looks like a separate computer from the point of view of programs running in it. However, programs running in a container can only see the contents and devices assigned to that container. This improves security and efficiency, particularly through the containerization of legacy apps. Scalability: The hybrid cloud solution (with on and off premise components) will allow you to minimize maintenance costs, increase efficiency, while still following government security rules. The cloud simplifies operations and gives agencies freedom to grow unencumbered, in accordance with their missions. Data Center Technology in Motion Westwind and HPE partnered with Sandia National Laboratories to deploy the Astra platform, the fastest Arm-based supercomputer in the world. Arm processors previously had been used exclusively for low-power mobile computers, including cell phones and tablets. A single Astra node is roughly one hundred times faster than a modern Arm-based cell phone, and Astra has 2,592 nodes. Ready for a data center? Connect with us at [email protected]. Put Your Technology in motion — 866-345-4720 Contact 866-345-4720 | www.westwindcomputerproducts.com | [email protected] Contact 866-345-4720 | www.westwindcomputerproducts.com | [email protected] 505-345-4720 l WWCPINC.COM [email protected] Automate security compliance management HPE Workload Aware Security for Linux Accidental or unintentional breaches constitutes over 50% of insider attacks through user carelessness or negligence as they are from deliberate malicious insiders. Over What is HPE Workload Aware Security for Linux (WASL)? 50% of employees or IT privileged users with access to databases and file servers HPE WASL, the foundation for a secure pose the biggest risk to organizations. The cost of a successful breach can range from data center, is an intuitive one-click security $100–500K.1 Deterrence methods employed to configure the organization-defined compliance tool to secure the HPE and Linux guidelines can offer to protect the digital assets. systems (RHEL and SLES), as well as HPE and SAP HANA appliances/TDI. It provides a security policy framework to meet evolving security needs, based on industry standard, The Center Save cost Reduce complexity Eliminate risk for Internet Security® (CIS) benchmarks and • Eliminate need for specialized • Secure multiple SAP HANA® • Automate server hardening, application security guides. It is the industry’s security professionals and operating system eliminate error-prone manual instances in minutes not steps first software compliance tool to secure both • Avert heavy fines and legal in weeks SAP HANA and Linux infrastructure, that too cost of non-compliance • New policy alerting feature in minutes. • Always comply to changing • Avoid costly third-party • Single dashboard to measure application security guidelines managed security services cybersecurity posture and • Eliminate multiple tools to threat exposure Why is HPE WASL important? secure OS and application HPE WASL brings a wealth of new capabilities and delivers a wide range of benefits for both business users and IT departments. HPE WASL helps Mitigating risk of internal threats business users in preventing any unauthorized or unintentional use. For IT, HPE WASL helps in monitoring the security posture of systems deployed and take corrective actions. Continuous One-click security Secure in minutes compliance What’s new in HPE WASL 1.3? • Ease of migration 1.2 to 1.3 Comprehensive Faster security • Policy update and alerts audit and Complete audit trail ramp to production • SMS as virtual appliance actionable reports • Migrate to production version from 30-day evaluation version Figure 1. HPE WASL value proposition Industry-standard support • CIS Benchmarks for RHEL 7, SLES 12 Automated security compliance for SAP HANA and Linux® OS Operating System Purpose-built for Easy deployment Shorten time to • SAP HANA Security Guide SAP HANA • Push-button security for operating production • Unique solution to secure system and SAP HANA workloads • Security compliance in minutes 2 SAP HANA database and the • Ability to customize default security instead of days underlying operating system profiles shipped with the product • ~90% out-of-box compliance for • Comprehensive audit reports • Integrate existing hardening scripts SAP HANA and operating system with default profiles3 • No separate training required for and into custom security profiles system administrators 1 Insider threat report, Crowd Research Partners, 2018 Superior ROI Modern 2, 3 HPE internal lab test, June 2019 • Single-click evaluation and remediation operation • Automatic security compliance with periodic scans on workloads to bring back into stated • Continuous compliance to organization guidelines compliance level • Automated guidelines eliminates need for specialized • Provides a rollback option to reinstate to previous knowledge compliance state Fact sheet How to order Order HPE Workload Aware Security for Linux (WASL) through HPE sales distributor. Supported workloads in physical or your virtualized environment • SAP HANA 1.0 SPS11 • HPE Workload Aware Security for Linux (Basic) license is a low-cost offering for customers who want to assure security compliance for a Linux operating system instance only: • SAP HANA 1.0 SPS12 – Q8K91AAE HPE WASL x86 Basic Instance E-LTU • SAP HANA 2.0 SPS00 – Q8K91A HPE WASL x86 Basic Instance LTU • SAP HANA 2.0 SPS01 – Q8K93A HPE WASL x86 Basic Media • SAP HANA 2.0 SPS02 • HPE Workload Aware Security for Linux (Advanced) license for SAP HANA appliance and TDI customers seeking • SAP HANA 2.0 SPS03 application security compliance along with operating system security: • RHEL 7.2, 7.3, 7.4, 7.5, 7.6 – Q8K92AAE HPE WASL x86 Advanced Instance E-LTU • SLES 12 SP1, SP2, SP3, SP4 – Q8K92A HPE WASL x86 Advanced LTU • SLES for SAP® Applications 12 SP1, SP2, – Q8K94A HPE WASL x86 Advanced Media SP3, SP4 For SAP HANA scale-out implementation, an advanced license is required for the master node and basic • SLES 15* Note: license for each of the other nodes. • SLES for SAP HANA Applications 15* HPE WASL components Supported hardware platforms HPE WASL includes security management station (SMS) and node packages. SMS is a graphical user interface to • Any HPE x86-64 server centrally register, track compliance, and manage all the instances of servers and applications (called workloads) in the environment. SMS also provides role-based access control (RBAC) to meet a wide variety of security policies and procedures. HPE WASL SMS requirements • 16 GB lockable memory The node packages run on end-workload instance, performing operations such as evaluation and remediation by SMS. They are installed automatically on the target workload instance either during the workload registration or • 30 GB disk space manually by the administrator. • 4 cores minimum HPE WASL can be ordered with a new system purchases or separately for existing server running Red Hat® • VMware ESXi™ 6.0, 6.5, 6.7 Enterprise Linux 7 or SUSE Enterprise Linux 12. Physical delivery requires the software media to be ordered separately whereas electronic delivery includes a software download. A license purchase includes one year 24x7 technical support

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    19 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us