HyTrust Blog | HyTrust

Blog

Do You Know Where Your Sensitive Data Lives?

One of the biggest challenges organizations face today in trying to secure their IT environments is a lack of data awareness. Despite all the recent high-profile hacker attacks against well-known enterprises, many companies simply don’t know where much of their critical business information exists at any given time. Think about the files lying around that […]

Analyzing, Auto-Encrypting and Tagging Sensitive VMs

Last week HyTrust announced the launch of HyTrust CloudAdvisor Version 2.2.1 (HTCA 2.2.1) which provides further integration with HyTrust DataControl (HTDC) and HyTrust CloudControl (HTCC). More specifically, the new version supports the ability to: Automatically encrypt VMs using HyTrust DataControl when sensitive data is detected Analyze and monitor VMs encrypted by HyTrust DataControl Label VMs in […]

Improve Security with Proactive Support: HyTrust KeyControl and Vitals

Deploying systems to improve the security of virtual infrastructure is not an option; it is a must. Protecting business-critical data and systems in a world of data leaks, infiltration, malware and more requires taking proactive measures before there is a problem. However, as more systems are deployed in a virtual infrastructure, complexity increases, along with […]

Encryption and Deduplication – Have Your Cake and Eat it!

The question of how encryption and deduplication work together is a question that comes up often. The concern is that if you encrypt data, every block will be different, deduplication won’t work and now you need more storage than you did before. And often a lot more storage. But this isn’t always the case. In […]

Unlocking the use of BitLocker Encryption with vTPM Support

Unlocking the use of BitLocker Encryption with vTPM Support In this article we will be showing how HyTrust KeyControl works in conjunction with VMware support for vTPM and explores the difference between BitLocker and HyTrust DataControl. What is a TPM vs vTPM? A TPM (Trusted Platform Module) is a hardware device that provides mini-HSM-like capabilities […]

vTPM Support in vSphere 6.7

In April, VMware introduced support for vTPM for Windows 10 and Windows Server 2016 in vSphere 6.7. This follows on from Microsoft adding vTPM support in Hyper-V in Windows Server 2016. Why add vTPM support? The main driver is to allow customers to use BitLocker for encryption. BitLocker relies on a TPM for storing its […]

G is for Global, Except for GDPR

What is GDPR? For organizations holding information on individuals that must consider data privacy requirements, the G stands for “General” as the General Data Protection Regulation. Is G not for Global? Occasionally I hear someone incorrectly refer to “Global” regarding the G in GDPR. Beyond the G, there seems to be some confusion  about GDPR […]

The Motivations of Those with #Privilege

Recent events with the Twitter handle @realDonaldTrump serve as a reminder of the power of privilege and the potential risk when that power is misused. In this case it appears that a Twitter employee (insider, who was supposedly on the way out the door), perhaps felt motivated based on tweets that they found objectionable or […]

ISACA-LA Presentation “Cybersecurity in Trump Era”

At my recent talk presented at ISACA-LA titled “Cybersecurity in Trump Era” , I shared with the audience the areas that vendors, enterprises, and auditors need to follow to be prepared for anticipated changes in Federal cybersecurity legislation. While the presentation was lengthy, here are some brief highlights: Trump has signed an executive order extending […]

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.