HyTrust Blog | HyTrust

Blog

Stop Using Native Encryption in Self-Encrypting SSDs

In case you missed it, last week a team of researchers from Radboud University in the Netherlands discovered a serious flaw in self-encrypting drives (SEDs). Luckily, it only affects drives from two manufacturers, Crucial and Samsung.  They accomplished this task spending less than 100 Euros, by reverse engineering the firmware of the drives.  You can […]

Avoid Becoming the Next Data Breach Victim

In the last year, some of the biggest companies in the world were plagued by equally massive data breaches – making it clear that organizations and IT teams of all sizes are in need of security reform. Only by implementing stronger security measures and policies can organizations prevent devastating security events from continuing to take […]

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Moving to the Cloud? Don’t Forget to Protect Your Data

We often hear about the need to ensure the security of networks and endpoints. And certainly, it’s extremely important for businesses to keep hackers and other bad actors from breaking into end-user devices and enterprise networks to wreak havoc on organizations and their customers. Cloud security is paramount. But the data that’s contained in the […]

Do You Know Where Your Sensitive Data Lives?

One of the biggest challenges organizations face today in trying to secure their IT environments is a lack of data awareness. Despite all the recent high-profile hacker attacks against well-known enterprises, many companies simply don’t know where much of their critical business information exists at any given time. Think about the files lying around that […]

Analyzing, Auto-Encrypting and Tagging Sensitive VMs

Last week HyTrust announced the launch of HyTrust CloudAdvisor Version 2.2.1 (HTCA 2.2.1) which provides further integration with HyTrust DataControl (HTDC) and HyTrust CloudControl (HTCC). More specifically, the new version supports the ability to: Automatically encrypt VMs using HyTrust DataControl when sensitive data is detected Analyze and monitor VMs encrypted by HyTrust DataControl Label VMs in […]

Improve Security with Proactive Support: HyTrust KeyControl and Vitals

Deploying systems to improve the security of virtual infrastructure is not an option; it is a must. Protecting business-critical data and systems in a world of data leaks, infiltration, malware and more requires taking proactive measures before there is a problem. However, as more systems are deployed in a virtual infrastructure, complexity increases, along with […]

Encryption and Deduplication – Have Your Cake and Eat it!

The question of how encryption and deduplication work together is a question that comes up often. The concern is that if you encrypt data, every block will be different, deduplication won’t work and now you need more storage than you did before. And often a lot more storage. But this isn’t always the case. In […]

Unlocking the use of BitLocker Encryption with vTPM Support

Unlocking the use of BitLocker Encryption with vTPM Support In this article we will be showing how HyTrust KeyControl works in conjunction with VMware support for vTPM and explores the difference between BitLocker and HyTrust DataControl. What is a TPM vs vTPM? A TPM (Trusted Platform Module) is a hardware device that provides mini-HSM-like capabilities […]

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.