Security: Security Services
Deep Packet Inspection services: Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, DPI SSL
Content Filtering Service (CFS): HTTP URL, HTTPS IP, keyword and content scanning, Comprehensive filtering based on file types such as ActiveX, Java, Cookies for privacy, allow/forbid lists
Comprehensive Anti-Spam Service
Application Visualization
Application Control
Capture Advanced Threat Protection
Security: Deep Packet inspection services: Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, TLS Decryption
Content Filtering Service (CFS): Reputation-based URL filtering, HTTP URL, HTTPS IP, keyword and content scanning, Comprehensive filtering based on file types such as ActiveX, Java, Cookies for privacy, allow/forbid lists
Comprehensive Anti-Spam Service
Application Visualization
Application Control
Capture Advanced Threat Protection
Advanced DNS Filtering
Security: Security Services
Deep Packet Inspection services: Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, DPI SSL
Content Filtering Service (CFS): HTTP URL, HTTPS IP, keyword and content scanning, Comprehensive filtering based on file types such as ActiveX, Java, Cookies for privacy, allow/forbid lists
Comprehensive Anti-Spam Service
Application Visualization
Application Control
Capture Advanced Threat Protection
Features: ADJUSTABLE DEPTH: Allows for easy installation depth adjustments for server racks that are too long or short ensuring optimal equipment fit.^^HIGHLY COMPATIBLE: Works with square threaded and round holes in most 4-post racks providing versatile installation options.^^SUPPORTS MULTIPLE SIZES: Available in five sizes to cover all common needs with a
Security: UEFI Secure Boot and Secure Start support
Immutable Silicon Root of Trust
FIPS 140-3 validation (iLO 6 certification in progress)
Common Criteria certification (iLO 6 certification in progress)
Configurable for PCI DSS compliance
Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) on browser
Support for Commercial National Security Algorithms (CNSA)
iLO Security Modes
Granular control over iLO interfaces
Smart card (PIV/CAC) and Kerberos based 2-factor Authentication
Tamper-free updates - components digitally signed and verified
Secure Recovery - recover critical firmware to known good state on detection of compromised firmware
Ability to rollback firmware
Secure erase of NAND/User Data
TPM 2.0 (Trusted Platform Module 2.0)