HyTrust Blog | HyTrust

Blog

HyTrust and Intel Ease Integration of Trusted Compute

Hardware-based cloud security solutions provide a higher level of protection as compared to software only security measures. Unfortunately the industry has found adopting and deploying hardware based security technologies on a broad scale challenging due to the lack of solution integration and deployment tools available. To overcome these challenges, Intel created the Intel® Security Libraries […]

Read More

Security as Code

There is a digital transformation underway in how applications are being built and released/delivered to production. This is primarily propelled by the success of the DevOps paradigm and the cloud native technologies such as Containers & Microservices. Many organizations are now able to release software more frequently and efficiently and there are many that deliver […]

Read More

Securing the Control Plane

Infrastructure Security is primarily comprised of the following: Control Plane Security Endpoint Security Network Security Control Plane Security: The focus of this blog post is around securing the management platforms used for provisioning the compute/network/storage infrastructure. The various business applications/services run on the infrastructure provisioned using management platforms. As customers adopt a multi-cloud strategy they […]

Read More

Rich Deployment Control Policies For Kubernetes

In our previous blog, we outlined the following three categories of container security: Image assurance Infrastructure security Runtime security In this article we dive deeper into the rich capabilities in our HyTrust Cloud Control (HTCC) product version 6.0 for securing the deployment of containers in a Kubernetes environment. Deployment Control is all about securing ‘what’ […]

Read More

The Three Categories of Container Security

Overview When it comes to securing containers one has to consider a holistic approach. Besides the security and integrity of the images one needs to ensure the container infrastructure i.e the container management system such as Kubernetes orchestrator and the virtual machines or hosts where the orchestrator is running are properly secured. Even though the […]

Read More

HyTrust-powered Encryption Available on Pivot3

Today, Pivot3 announced new policy-based security management capabilities, powered by HyTrust, in its Intelligence Engine.  Pivot3’s expanded Intelligence Engine capabilities allow organizations to automate and simplify the process of protecting sensitive data with comprehensive, standards-based security. The platform also facilitates regulatory compliance as customers acquire and manage data across the edge, core and cloud. As […]

Read More

A Unified Approach to Securing a Multi-Cloud Environment

Overview Over the last few years there has been rapid adoption of the public cloud primarily propelled by the following: Emerging technologies such as Docker containers & Kubernetes Increased appetite for cloud native applications Increased need to modernize monolithic applications using microservices etc. More and more enterprises are embracing a multi-cloud strategy for a variety […]

Read More

Think You Checked the Encryption Box with SEDs? Think Again!

In case you missed it, last week a team of researchers from Radboud University in the Netherlands discovered a serious flaw in self-encrypting drives (SEDs). Luckily, it only affects drives from two manufacturers, Crucial and Samsung.  They accomplished this task spending less than 100 Euros, by reverse engineering the firmware of the drives.  You can […]

Read More

Avoid Becoming the Next Data Breach Victim

In the last year, some of the biggest companies in the world were plagued by equally massive data breaches – making it clear that organizations and IT teams of all sizes are in need of security reform. Only by implementing stronger security measures and policies can organizations prevent devastating security events from continuing to take […]

Read More
We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.