• Dell EMC PowerEdge UEFI Secure Boot Customization

    • Strengthen your server infrastructure’s resiliency and protect against boot-related exploits today and in the future.

      Dell EMC PowerEdge UEFI Secure Boot Customization enables the most secure IT organizations to secure their server boot process. You select the certificates required to secure elements of the boot process, reducing the dependency on 3rd party certificates which have presented multiple vulnerabilities in the past.

    • Address Emerging Server Hardware Security Threats Head On

      • Reduce your dependency on 3rd party certificate authorities for your most secure workloads
      • Limit the impact of 3rd party certificate compromises or mistakes
      • Limit downtime with faster response to security alerts
    • Secure Your Servers from Hardware-based Cyberattacks

      The threat landscape for IT operations is rapidly changing. While application and operating system compromises often get the most attention, hardware-based intrusion is becoming more widespread. A successful hardware hack, commandeering critical firmware components, avoids basic malware detection and surrenders unrestricted access to system operations, data, and network communications. Dell EMC has a comprehensive approach to securing the server hardware. UEFI Secure Boot with Customization is a recognized part of the solution for the most secure server environments.

    • Secure Your Servers from Cyberattacks

      PowerEdge Server Boot Protection with Customer-Owned Certificates

      Choose which specific boot elements are enabled for your servers while maintaining high standards for secure computing.

      Reduce Risk in Your Critical Workload Environments

      Manage your exposure associated with publicly circulated 3rd party certificates and reduce the boot-process attack surface for emerging threats.

      Align with leading security guidelines

      Leverage up-to-date best practices for securing the server boot process and maintain high security status for server infrastructure.

    • Built to enable comprehensive server security and customer-defined trusted hardware elements

      With UEFI, server security is strengthened by more granular inspection of the credentials for every element employed to boot the server. This covers firmware and the OS bootloader - lynchpin boot elements that can be critical targets for cyberattacks.

      The addition of customized certificates enables boot security to be more closely managed by your server/security teams while limiting the dependency on publicly distributed certificates. While this approach requires some additional planning and work, it provides higher security for environments that cannot depend on generic safeguards.

    • Dell EMC Leads the Way in Delivering Modern Server Security

      Dell EMC provides comprehensive security for IT operations across all products and solutions. For the PowerEdge line of servers, that security begins with product design, through the global Supply Chain Security program, and extends to the data center using technology like UEFI Secure Boot with Customization. All together, these programs and technologies ensure that PowerEdge servers are secure at deployment and throughout their lifecycle.

    • Essential Resources

      Start with these essential security resources

    • decorative

      PowerEdge UEFI Secure Boot Customization Solution Brief

      Review the features in the solution brief.

    • decorative

      Cyber Resilient Security in Dell EMC PowerEdge Servers

      Dell EMC PowerEdge servers deliver a chain of trust and combine it with comprehensive management tools to provide robust layers of security across hardware and firmware.

    • decorative

      Dell Technologies Supply Chain Assurance

      Dell Technologies takes a holistic and comprehensive approach to protect its supply chain and deliver solutions that customers can trust.

    • decorative

      Dell Technologies Security Point of View Paper

      Here’s how you can accelerate innovation with end-to-end intrinsic security from Dell Technologies.

    • Related offerings