Enhancing Enterprise Security for Artificial Intelligence and Distributed Environments
Hewlett Packard Enterprise (HPE) Expands Security Offerings to Accelerate Adoption of Artificial Intelligence (AI)
HPE introduces new security innovations to help organizations securely adopt AI and turn resilience into a core business capability.
Main Features:
- HPE Juniper Networking SRX400 Series Firewalls: Carrier-grade security efficacy in smaller sites and space-constrained environments
- Hybrid mesh security architecture: Provides enterprise-grade governance to AI usage, improving visibility and policy control across distributed environments
- Key features:
- Visibility and access management for AI websites and applications
- Prompt-level inspection to proactively block access to unauthorized or high-risk AI websites
- Centralized identity-based protection, providing a unified security fabric across all environments
- Ai-native operations, simplifying security operations by automating complex security workflows
- Sovereign-ready security and resilience-centered enhancements across HPE’s product portfolio: Protects critical workloads, recovers faster, and sustains operations under escalating threat conditions
According to HPE, “Our mission is to help our customers securely adopt AI and turn resilience into a core business capability.”
Additional Features:
- Workload and recovery resilience through enhanced cyber and disaster recovery for virtualized and cloud workloads in HPE Zerto Software
- Secure direct access to immutable HPE StoreOnce data for malware scanning and cyber forensics
- Confidential computing integrated into HPE Morpheus Software, using hardware-based trusted execution environments from AMD and Intel and centralized key management with Thales CipherTrust
Research and Development:
- HPE expands its research-driven threat intelligence group, HPE Threat Labs, by incorporating additional networking telemetry and expertise to deliver real-time, AI-native threat insights, converting threat intelligence into actionable recommendations to support the industry’s shift toward self-driving, zero-trust security architectures