X

Learn how businesses like yours can begin to optimize for today and plan for tomorrow with Cloud-Ready IT Infrastructure

Let's Talk About Oracle’s New Two-Socket x86 Servers with Built-in Security

Today's guest post is by Josh Rosen, a Senior Principal Product Strategy Manager for Oracle’s x86 servers, focusing on Oracle’s software and cloud offerings.

Today Oracle announced the new Oracle Server X6-2 (read the white paper: Oracle Server X6-2 System Architecture) and Oracle Server X6-2L (read the white paper: Oracle Server X6-2L System Architecture), based on the latest processors from the Intel® Xeon® E5-2600 v4 processor family, also known as the Intel Broadwell-EP processors.  With support for up to 12.8 TB of high-bandwidth NVM Express (NVMe) flash drives, Oracle’s new x86 servers provide extreme performance and I/O bandwidth.  These are the most powerful two-socket servers we’ve ever made, and we are excited to share our most recent innovations. 

We have optimized the two servers for different Oracle workloads.  Oracle Server X6-2 is ideal for running Oracle Database in a clustered configuration and also for high-density virtualization environments that require an optimal balance between core density, memory footprint, and I/O bandwidth. Oracle Server X6-2L, on the other hand, is the perfect platform for flash-optimized databases and enterprise storage solutions requiring extremely reliability.  Both of these servers have been designed from the ground up for one purpose – to be the most secure two-socket servers for running Oracle software.

They say that a given technology stack is only as secure as its weakest link.  We have taken that to heart as we’ve designed Oracle Server X6-2 and Oracle Server X6-2L.  Your enterprise software or private cloud service may provide robust network and application-level security, but if the underlying infrastructure (firmware, BIOS, and operating systems) are insecure, your entire stack is at risk.  

As the industry leader for building secure software and systems, Oracle believes that security should be built in, not bolted on.  In order to build x86 servers with end-to-end security, Oracle owns 100% of the design and controls 100% of the supply chain and firmware source code.   We provide tight control over the bill of materials, and we source key components ourselves.  Our system firmware images are supplied to manufacturing by Oracle engineers in binary format to ensure that no one can modify source code and compromise security.  Most importantly, Oracle’s x86 systems are assembled in California and subjected to industry-leading validation and testing prior to shipment.

Beyond the hardware design itself, Oracle’s x86 servers enable only secure protocols out of the box to prevent unauthorized access at point of install. For even greater security, customers running Oracle Ksplice on Oracle’s x86 servers will be able to roll out security patches more quickly with zero downtime patching of the Oracle Linux kernel.

Oracle’s layered approach to security extends all the way up the stack from the hardware and firmware to Oracle’s operating systems and kernels and up through the database and application.  By engineering our software and hardware together with security in mind, Oracle provides a unique end-to-end secure architecture. 

To learn more about Oracle Server X6-2 and Oracle Server X6-2L, you can find additional information including data sheets and white papers here.

We're excited to welcome Oracle experts to share their views and perspectives on today's trends on this blog. Josh Rosen previously spent more than a decade as a developer and architect of system management software. Josh has worked on system management for many of Oracle's hardware products ranging from the earliest blade systems to the latest Oracle x86 servers.  

Join the discussion

Comments ( 1 )
  • Santhoshkumar Nair Tuesday, February 14, 2017
    Are these suitable for running high performance Hadoop clusters for specialized workloads (not like traditional white boxes)

    Thanks
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.Captcha