Read all the latest articles about HyTrust. Meet us at an event. Check out are recent press releases. You can also subscribe to this section via RSS here. Need a media contact? Send a note to firstname.lastname@example.org.
Checkout our upcoming events
Join HyTrust at Cisco Live, where you get the practical, hands-on knowledge that can advance your career, get compelling insight into the ideas, concepts, and emerging trends that are setting the stage for a more connected and collaborative future.
HyTrust and Intel are collaborating on a live demo of Root of Trust leveraging Intel Trusted Execution Technology (TXT) with a sneak preview of soon-to-be-releaseed HyTrust 3.5.
Black Hat USA is the show that sets the benchmark for all other security conferences. As Black Hat returns for its 16th year to Las Vegas, we bring together the brightest in the world for six days of learning, networking, and skill building. Join us for four intense days of Training and two jam-packed filled days of Briefings.
Visit HyTrust on the Expo Floor and for after hours executive happy hours, dinners, and outings to hear the latest about maintaining continuous compliance while expanding your virtual infrastructure.
Analyst coverage, Solutions overviews, Datasheets, Whitepapers, Case Studies
Try our full feature trial product and secure your cloud infrastructure today!
Awards & Recognition
The Virtualization Practice
Aug 01, 2011, Media
by Eric Siebert
Companies that handle credit cardholder data should pay close attention to the new PCI DSS 2.0 guidelines, which outline 12 virtual infrastructure components that need protection. The new guidelines aren’t mandatory, but they do provide a solid framework for VMware security.
Any organization that accepts credit cards is subject to the Payment Card Industry Data Security Standards...
Jul 26, 2011, Media
How do you protect your cloud infrastructure? You don't just slap a lock on your server racks and hope the bad guys stay out. Learn how to create trusted compute pools using VMware vSphere*, HyTrust* Appliance, and Intel® Xeon® processor-based hardware with Intel® TXT. Protect your cloud, calm your CIO's fears, and realize the efficiency and cost savings of a cloud infrastructure.
Jul 22, 2011, Media
HyTrust, a provider of policy management and access control for virtualization and cloud infrastructure, announced programs to educate and create awareness on issues involving the use of virtualized infrastructure in environments subject to PCI (News - Alert) compliance.
The main objective of HyTrust is to assist organizations to understand the realities of the virtualized datacenter and the...
Jul 20, 2011, Media
With a security breach fresh in its mind, the State of New Mexico’s Human Services Department used firewalls and role-based access control to batten down the hatches of its virtualized environment.
In 2008, the department suffered a major security breach when hackers gained unauthorized access to personal information through the department’s child support enforcement website. The Human Services...
Jul 20, 2011, Media
By Alan Priestly, 20 July, 2011 15:58
Every day, it seems, I open the paper and there’s a big splash about a security breach. If you’ve ever bought anything online, played a games console, or used an online bank, your data is under attack. Several big companies (whose names you already know) have lost sensitive customer data, and damaged their reputations as a result. Recently, a hacking group...
Jul 19, 2011, Media
How virtualization is shaking up security practices
By Ellen Messmer
Created 2011-07-19 03:09PM
The move to almost fully virtualized computing environments is driving a fresh approach to security  in the enterprise, according to information technology security managers applying controls for VMware and Microsoft  Hyper-V.
"We're very close to being 100 percent virtualized," says Gurusimran...
Jul 14, 2011, Media
uly 14, 2011 By Colin Wood
A security breach almost always motivates a government department to re-examine its overall architecture. In other words, security professionals must decide if the status quo is good enough.
After the New Mexico Human Services Department (HSD) discovered a series of security breaches spanning several years, officials saw that wholesale changes would be of value. The...
Jun 30, 2011, Media
Still worried that the Cloud may not be safe? There are more tools that are out there to keep your data safer than a bank vault. There are many third-party tools available such as Hytrust’s Appliance for VMware, which prohibits some users from specified servers, allow access to only the parties you want.
Jun 28, 2011, Media
HyTrust, Inc., the leader in proactive control, compliance and visibility over virtualized environments and the entire cloud stack, today announced that it has named Mercy Caprara as Chief Financial Officer. Caprara will be responsible for driving and overseeing financial strategy and planning at HyTrust.
Jun 23, 2011, Media
"Virtualization will radically change how you secure and manage your computing environment," Gartner analyst Neil MacDonald said this week at the annual Gartner Security and Risk Management Summit. "Workloads are more mobile, and more difficult to secure. It breaks the security policies tied to physical location. We need security policies independent of network...
on what’s happening