HyTrust Blog | HyTrust

Blog

The Three Categories of Container Security

Overview When it comes to securing containers one has to consider a holistic approach. Besides the security and integrity of the images one needs to ensure the container infrastructure i.e the container management system such as Kubernetes orchestrator and the virtual machines or hosts where the orchestrator is running are properly secured. Even though the […]

HyTrust-powered Encryption Available on Pivot3

Today, Pivot3 announced new policy-based security management capabilities, powered by HyTrust, in its Intelligence Engine.  Pivot3’s expanded Intelligence Engine capabilities allow organizations to automate and simplify the process of protecting sensitive data with comprehensive, standards-based security. The platform also facilitates regulatory compliance as customers acquire and manage data across the edge, core and cloud. As […]

A Unified Approach to Securing a Multi-Cloud Environment

Overview Over the last few years there has been rapid adoption of the public cloud primarily propelled by the following: Emerging technologies such as Docker containers & Kubernetes Increased appetite for cloud native applications Increased need to modernize monolithic applications using microservices etc. More and more enterprises are embracing a multi-cloud strategy for a variety […]

Think You Checked the Encryption Box with SEDs? Think Again!

In case you missed it, last week a team of researchers from Radboud University in the Netherlands discovered a serious flaw in self-encrypting drives (SEDs). Luckily, it only affects drives from two manufacturers, Crucial and Samsung.  They accomplished this task spending less than 100 Euros, by reverse engineering the firmware of the drives.  You can […]

Avoid Becoming the Next Data Breach Victim

In the last year, some of the biggest companies in the world were plagued by equally massive data breaches – making it clear that organizations and IT teams of all sizes are in need of security reform. Only by implementing stronger security measures and policies can organizations prevent devastating security events from continuing to take […]

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Moving to the Cloud? Don’t Forget to Protect Your Data

We often hear about the need to ensure the security of networks and endpoints. And certainly, it’s extremely important for businesses to keep hackers and other bad actors from breaking into end-user devices and enterprise networks to wreak havoc on organizations and their customers. Cloud security is paramount. But the data that’s contained in the […]

Do You Know Where Your Sensitive Data Lives?

One of the biggest challenges organizations face today in trying to secure their IT environments is a lack of data awareness. Despite all the recent high-profile hacker attacks against well-known enterprises, many companies simply don’t know where much of their critical business information exists at any given time. Think about the files lying around that […]

Analyzing, Auto-Encrypting and Tagging Sensitive VMs

Last week HyTrust announced the launch of HyTrust CloudAdvisor Version 2.2.1 (HTCA 2.2.1) which provides further integration with HyTrust DataControl (HTDC) and HyTrust CloudControl (HTCC). More specifically, the new version supports the ability to: Automatically encrypt VMs using HyTrust DataControl when sensitive data is detected Analyze and monitor VMs encrypted by HyTrust DataControl Label VMs in […]

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.