{"id":39820,"date":"2021-03-02T14:00:19","date_gmt":"2021-03-02T14:00:19","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92889"},"modified":"2021-03-02T14:00:19","modified_gmt":"2021-03-02T14:00:19","slug":"microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/","title":{"rendered":"Microsoft brings advanced hardware security to Server and Edge with Secured-core"},"content":{"rendered":"<p>A cursory look at recent headlines reveals two clear trends. First, organizations around the world are embracing digital transformation using technologies across cloud and edge computing to better serve their customers and thrive in fast-paced environments. Second, attackers are constantly innovating new attacks as technology changes and targeting these organizations\u2019 high-value infrastructure with advanced technical capabilities connected to both cybercrime and espionage.<\/p>\n<p>The <a href=\"https:\/\/www.zdnet.com\/article\/a-cybercrime-store-is-selling-access-to-more-than-43000-hacked-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">MagBo marketplace<\/a>, which sells access to more than 43,000 hacked servers, exemplifies the ever-expanding cybercrime threat. Compromised servers are being exploited to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/coinminer-campaigns-target-redis-apache-solr-and-windows-servers\/\" target=\"_blank\" rel=\"noopener noreferrer\">mine cryptocurrency<\/a> and are being hit with <a href=\"https:\/\/www.zdnet.com\/article\/hackers-target-unpatched-citrix-servers-to-deploy-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware attacks<\/a>. Meanwhile, <a href=\"https:\/\/www.nokia.com\/about-us\/news\/releases\/2020\/10\/22\/nokia-threat-intelligence-report-warns-of-rising-cyberattacks-on-internet-connected-devices\/\" target=\"_blank\" rel=\"noopener noreferrer\">IoT vulnerabilities are on the rise<\/a>, with <a href=\"https:\/\/threatpost.com\/half-iot-devices-vulnerable-severe-attacks\/153609\/\" target=\"_blank\" rel=\"noopener noreferrer\">more than half of IoT devices deemed susceptible to attack<\/a>. In addition to these risks, companies often struggle with a lack of expertise and familiarity with security standards as well as complex regulations like the <a href=\"https:\/\/www.congress.gov\/bill\/116th-congress\/house-bill\/1668\/text?q=%7B%22search%22%3A%5B%22HR+1668%22%5D%7D&amp;r=1&amp;s=1\" target=\"_blank\" rel=\"noopener noreferrer\">IoT Cybersecurity Improvement Act of 2020<\/a>.<\/p>\n<p>Given these factors, continuing to raise the security bar for critical infrastructure against attackers and also make it easy for organizations to hit that higher bar is a clear priority for both customers and Microsoft. As systems like the <a href=\"https:\/\/www.platformsecuritysummit.com\/2019\/speaker\/chen\/\" target=\"_blank\" rel=\"noopener noreferrer\">Xbox show<\/a>, successfully protecting systems requires a holistic approach that builds security from the chip to the cloud across hardware, firmware, and the operating system. Using our learnings from the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/design\/device-experiences\/oem-highly-secure\" target=\"_blank\" rel=\"noopener noreferrer\">Secured-core PC<\/a> initiative, Microsoft is collaborating with partners to expand Secured-core to Windows Server, Azure Stack HCI, and Azure-certified IoT devices, as well as bring the Secured-core values of advanced hardware-based protection and simpler security enablement to the server and IoT ecosystem.<\/p>\n<h2>Powerful protection with Secured-core Server and Edge Secured-core<\/h2>\n<p>Following Secured-core PC, we are introducing Secured-core Server which is built on three key pillars: simplified security, advanced protection, and preventative defense. Secured-core Servers come with the assurance that manufacturing partners have built hardware and firmware that satisfy the requirements of the operating system (OS) security features. Like Secured-core PC and Secured-core Server, Edge Secured-core advances built-in security for IoT devices running a full OS. Edge Secured-core also expands Secured-core coverage to Linux, in addition to Windows platforms.<\/p>\n<h3>Simplified security<\/h3>\n<p>New functionality in the Windows Admin Center makes it easy for customers to configure the OS security features of Secured-core for Windows Server and Azure Stack HCI systems. The new Windows Admin Center security functionality will allow enabling advanced security with a <a href=\"https:\/\/myignite.microsoft.com\/sessions\/8c615c6a-64ef-4c40-8ede-7eed49bc92bc?source=sessions\" target=\"_blank\" rel=\"noopener noreferrer\">click of the button<\/a> from a web browser anywhere in the world. With integrated Azure Stack HCI systems, manufacturing partners can also enable OS features, further simplifying the configuration experience for customers so that Microsoft\u2019s best server security is available right out of the box. For Windows Server and validated Azure Stack HCI solutions, customers can look for Secured-core certified systems to simplify acquiring secure hardware platforms.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92982 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/XXX.png\" alt=\"The Windows Admin Center will allow easy management of Secured-core functionality from any browser \" width=\"1059\" height=\"593\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/XXX.png 1059w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/XXX-300x168.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/XXX-1024x573.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/XXX-768x430.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/XXX-687x385.png 687w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/XXX-539x303.png 539w\" sizes=\"auto, (max-width: 1059px) 100vw, 1059px\"><\/p>\n<p>The <a href=\"https:\/\/www.microsoft.com\/azure\/partners\/azure-certified\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Certified Device program<\/a> already helps customers find the right edge and IoT solutions for their needs. We are adding the Edge Secured-core public preview to the Azure Certified Device program. Edge Secured-core devices meet extra security requirements around device identity, secure boot, OS hardening, device updates, data protection, and vulnerability disclosures, which will be uniquely identifiable on the Azure Certified Device catalog.<\/p>\n<h3>Advanced protection<\/h3>\n<p>Secured-core Servers maximize hardware, firmware, and OS capabilities to help protect against current and future threats. These safeguards create a platform with added security for critical applications and data used on the server. Secured-core functionality spans the following areas:<\/p>\n<ul>\n<li><strong>Hardware root-of-trust<\/strong>: Trusted Platform Module 2.0 (TPM 2.0) comes standard with Secured-core Servers, providing a protected store for sensitive keys and data, such as measurements of the components loaded during boot. Being able to verify that firmware that runs during boot is validly signed by the expected author and not tampered with helps improve supply chain security. This hardware root-of-trust elevates the protection provided by capabilities like BitLocker, which uses the TPM 2.0 and facilitates the creation of attestation-based workflows that can be incorporated into zero-trust security strategies.<\/li>\n<li><strong>Firmware protection<\/strong>: In the last few years, there has been a significant <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/21\/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">uptick in firmware vulnerabilities<\/a>, in large part due to the higher level of privileges that firmware runs combined with limited visibility into firmware by traditional anti-virus solutions. Using processor support for Dynamic Root of Trust of Measurement (DRTM) technology, Secured-core systems put firmware in a hardware-based sandbox helping to limit the impact of vulnerabilities in millions of lines of highly privileged firmware code.<\/li>\n<li><strong>Virtualization-based security (VBS)<\/strong>: Secured-core Servers support VBS and hypervisor-based code integrity (HVCI). The cryptocurrency mining attack mentioned earlier leveraged the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2017\/06\/30\/exploring-the-crypt-analysis-of-the-wannacrypt-ransomware-smb-exploit-propagation\/\" target=\"_blank\" rel=\"noopener noreferrer\">EternalBlue exploit<\/a>. VBS and HVCI help protect against this entire class of vulnerabilities by isolating privileged parts of the OS, like the kernel, from the rest of the system. This helps to ensure that servers remain devoted to running critical workloads and helps protect related applications and data from attack and exfiltration.<\/li>\n<\/ul>\n<p>Edge Secured-core devices come with a built-in security agent, a zero-trust attestation model, and security by default, delivering on the following security features:<\/p>\n<ul>\n<li>Hardware-based device identity.<\/li>\n<li>Capable of enforcing system integrity.<\/li>\n<li>Stays up to date and is remotely manageable.<\/li>\n<li>Provides protection for data at rest and data in transit.<\/li>\n<li>Built-in security agent and hardening.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-92977\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Edge-SC-image-1024x576.jpg\" alt=\"Edge secured-core brings security from the edge to the cloud by leveraging devices, platforms and services\" width=\"1024\" height=\"576\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Edge-SC-image-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Edge-SC-image-300x169.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Edge-SC-image-768x432.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Edge-SC-image-687x385.jpg 687w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Edge-SC-image-1083x609.jpg 1083w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Edge-SC-image-767x431.jpg 767w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Edge-SC-image-539x303.jpg 539w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/03\/Edge-SC-image.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<h3>Preventative defense<\/h3>\n<p>Secured-core Servers and Edge Secured-core have security mitigations built into the hardware and OS platform to help thwart common attack vectors. Secured-core functionality helps proactively close the door on the many paths that attackers may try to exploit, and it allows IT and SecOps teams to optimize their time across other priorities.<\/p>\n<h2>Coming soon, with the support of the ecosystem<\/h2>\n<p>Secured-core Servers across Windows Server 2022 and Azure Stack HCI will help customers stay ahead of attackers and help protect their infrastructure across hardware, firmware, and operating systems. Supported hardware will be available in future product generations from Intel, AMD, and our vibrant OEM ecosystem.<\/p>\n<blockquote>\n<p>\u201cContinuing the rich tradition of innovation in hardware security, <a href=\"https:\/\/community.amd.com\/t5\/amd-business-blog\/amd-and-microsoft-secured-core-server\/ba-p\/454055\" target=\"_blank\" rel=\"noopener noreferrer\">AMD is excited to partner with Microsoft<\/a> to enable Secured-core Server with its future EPYC processors\u201d, said<strong> Akash Malhotra, AMD director, security product management<\/strong>. \u201cWith attacks on firmware increasing, a tight integration between AMD hardware security features and the Windows Server operating system will benefit users across the ecosystem.\u201d<\/p>\n<\/blockquote>\n<blockquote>\n<p>\u201cToday\u2019s distributed world demands a new era of security. Intel and Microsoft are working together to provide innovative levels of security controls that provide customers with unified, integrated protection,\u201d said <strong>Jeremy Rader, General Manager, Intel Cloud and Enterprise Group<\/strong>. \u201cWe\u2019re combining the power of Secured core server with our 3rd Gen Intel Xeon Scalable processors (code-named Ice Lake) that creates a chain of trust across all layers of compute, from the hardware, to the firmware to the OS. Customers get a seamless root of trust that combines the most advanced security with management ease.\u201d<\/p>\n<\/blockquote>\n<p>You can learn more about Secured-core Servers and Windows Server 2022 security in the <a href=\"https:\/\/aka.ms\/Secured-core_Server\" target=\"_blank\" rel=\"noopener noreferrer\">related blog<\/a>.<\/p>\n<p>To get started with Edge Secured-core certification, browse the following resources:<\/p>\n<p>To learn more about Secured-core Servers and Edge Secured-core, be sure to join us during <a href=\"https:\/\/myignite.microsoft.com\/home\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Ignite<\/a> from March 2-4, 2021.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/02\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is collaborating with partners to expand Secured-core to Windows Server, Azure Stack HCI, and Azure-certified IoT devices.<br \/>\nThe post Microsoft brings advanced hardware security to Server and Edge with Secured-core appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39821,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,9177,6578],"class_list":["post-39820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-integrated-threat-protection","tag-threat-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft brings advanced hardware security to Server and Edge with Secured-core 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft brings advanced hardware security to Server and Edge with Secured-core 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-02T14:00:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1059\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft brings advanced hardware security to Server and Edge with Secured-core\",\"datePublished\":\"2021-03-02T14:00:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/\"},\"wordCount\":1161,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png\",\"keywords\":[\"Cybersecurity\",\"Integrated Threat Protection\",\"Threat protection\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/\",\"name\":\"Microsoft brings advanced hardware security to Server and Edge with Secured-core 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png\",\"datePublished\":\"2021-03-02T14:00:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png\",\"width\":1059,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft brings advanced hardware security to Server and Edge with Secured-core\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft brings advanced hardware security to Server and Edge with Secured-core 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft brings advanced hardware security to Server and Edge with Secured-core 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-02T14:00:19+00:00","og_image":[{"width":1059,"height":593,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft brings advanced hardware security to Server and Edge with Secured-core","datePublished":"2021-03-02T14:00:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/"},"wordCount":1161,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png","keywords":["Cybersecurity","Integrated Threat Protection","Threat protection"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/","name":"Microsoft brings advanced hardware security to Server and Edge with Secured-core 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png","datePublished":"2021-03-02T14:00:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core.png","width":1059,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-brings-advanced-hardware-security-to-server-and-edge-with-secured-core\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Microsoft brings advanced hardware security to Server and Edge with Secured-core"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39820"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39820\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39821"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}