HyTrust Blog | HyTrust

Blog

Staying Secure in Our New Normal

The problem:  As a society, we are in uncharted waters.  Who would have thought just a few weeks ago that we would have a halt to the global economy?  It is unclear how long this will last, but we as business and government must persist and find a way forward.  The good news is we have seen traditional environments leverage remote […]

Read More

HyTrust and IBM announce
the Industry’s Highest Level of data protection for
VMware workloads in the Cloud

Enterprise clients on a digital transformation journey are looking to move workloads to the public cloud.  However, recent news reports of data breaches show why customers are still wary of moving sensitive data and associated workloads to the public cloud.  Per a recent report by the Ponemon Institute (The Cost of a Data Breach Report […]

Read More

IBM Cloud solution for highly regulated and business-critical workloads in a new secure and compliant hybrid architecture

Protecting data from unauthorized access and streamlining compliance operations is vital to ensure the integrity of your business and to maintain customer trust.  Guaranteeing data has not been compromised or undergone unsanctioned processing, and delivering continuous compliance audit readiness, can only be achieved with the correct technology and a trusted cloud provider. By working with […]

Read More

Secure Boot and Measured Boot for VMware ESXi with Intel® TXT

As stated in the article, What is the Difference between Secure Boot and Measured Boot, it can be nearly impossible to remove “‘Persistent threats’, where malware is inserted into a system in a way that the platform always boots in a compromised state, even after legitimate software is re-installed.” But how can you tell if […]

Read More

Your Keys are the Key to Success!

In today’s world of corporate data security, your keys are the key to your success.  Encryption keys, that is!  With the continued and growing challenges of protecting highly sensitive and critical data of your customers, students, employees, or any other demographic that entrusts data to you; enterprises are looking to the widespread use of encryption […]

Read More

HyTrust and Intel Ease Integration of Trusted Compute

Hardware-based cloud security solutions provide a higher level of protection as compared to software only security measures. Unfortunately the industry has found adopting and deploying hardware based security technologies on a broad scale challenging due to the lack of solution integration and deployment tools available. To overcome these challenges, Intel created the Intel® Security Libraries […]

Read More

Security as Code

There is a digital transformation underway in how applications are being built and released/delivered to production. This is primarily propelled by the success of the DevOps paradigm and the cloud native technologies such as Containers & Microservices. Many organizations are now able to release software more frequently and efficiently and there are many that deliver […]

Read More

Securing the Control Plane

Infrastructure Security is primarily comprised of the following: Control Plane Security Endpoint Security Network Security Control Plane Security: The focus of this blog post is around securing the management platforms used for provisioning the compute/network/storage infrastructure. The various business applications/services run on the infrastructure provisioned using management platforms. As customers adopt a multi-cloud strategy they […]

Read More

Rich Deployment Control Policies For Kubernetes

In our previous blog, we outlined the following three categories of container security: Image assurance Infrastructure security Runtime security In this article we dive deeper into the rich capabilities in our HyTrust Cloud Control (HTCC) product version 6.0 for securing the deployment of containers in a Kubernetes environment. Deployment Control is all about securing ‘what’ […]

Read More

The Three Categories of Container Security

Overview When it comes to securing containers one has to consider a holistic approach. Besides the security and integrity of the images one needs to ensure the container infrastructure i.e the container management system such as Kubernetes orchestrator and the virtual machines or hosts where the orchestrator is running are properly secured. Even though the […]

Read More
We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.