Technology Magazine February 2018 | Page 44

CLOUD COMPUTING

the massive needs of hyper-scale data centres . “ We will need to make them safe and secure , providing power consumption to push solutions closer to the edge ,” adds Aylor .
With new data , hopefully comes new insight . However , in the process businesses leave themselves open with each IoT sensor a potential access point for hackers . How will Dell EMC keep up with the security demands of IoT as the trend ramps ? “ There are three main tenets we build our servers on ,” assures Pendekanti . “ One is a scalable business architecture , which ensures we have to scale on any vector . Not just a CPU , we go to scale on memory , on your required drive capacities , on your I / O ... Secondly , we use intelligent automations to differentiate between known and unknown elements to allow preemptive preventive action . We still might need manual intervention but , more importantly , we have integrated security built into every server , which directly addresses threats coming in to any organisation , not just external sources , because around 30 % of hacks are caused by internal issues .”
To combat such threats , Dell EMC is offering new integrated security features like server lockdown , which means no-one but the authorised user can make changes to a server ’ s configuration . “ There is an epidemic in the industry today called configuration drifts ,” explains Pendekanti . “ We have the ability to do server lockdowns within our portfolio , which ensures you ’ re still able to allow access to a select few who can make those necessary changes . And this is where our partner , in this case AMD , is also working on bringing new technologies integral to security because it cannot be an afterthought and must be taught at the conception phase , all the way to design and implementation .”
It ’ s a belief echoed by Aylor , who sees AMD as a fundamental technology partner to enable innovations like Dell EMC ’ s PowerEdge products to find a place in the market . “ We are building in hardware based security into our products ,” he confirms . “ We ’ ve added technologies like Secure Encrypted Virtualisation and Secure Memory Transcription which mean , even if you physically have access to the server itself , we can make the memory in the virtual machines that
44 February 2018