Blog Archives - HyTrust
https://www.hytrust.com/uploads/cont_comp_header.png

Blog

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Do You Know Where Your Sensitive Data Lives?

One of the biggest challenges organizations face today in trying to secure their IT environments is a lack of data awareness. Despite all the recent high-profile hacker attacks against well-known enterprises, many companies simply don’t know where much of their critical business information exists at any given time. Think about the files lying around that […]

Analyzing, Auto-Encrypting and Tagging Sensitive VMs

Last week HyTrust announced the launch of HyTrust CloudAdvisor Version 2.2.1 (HTCA 2.2.1) which provides further integration with HyTrust DataControl (HTDC) and HyTrust CloudControl (HTCC). More specifically, the new version supports the ability to: Automatically encrypt VMs using HyTrust DataControl when sensitive data is detected Analyze and monitor VMs encrypted by HyTrust DataControl Label VMs in […]

Improve Security with Proactive Support: HyTrust KeyControl and Vitals

Deploying systems to improve the security of virtual infrastructure is not an option; it is a must. Protecting business-critical data and systems in a world of data leaks, infiltration, malware and more requires taking proactive measures before there is a problem. However, as more systems are deployed in a virtual infrastructure, complexity increases, along with […]

Encryption and Deduplication – Have Your Cake and Eat it!

The question of how encryption and deduplication work together is a question that comes up often. The concern is that if you encrypt data, every block will be different, deduplication won’t work and now you need more storage than you did before. And often a lot more storage. But this isn’t always the case. In […]

Unlocking the use of BitLocker Encryption with vTPM Support

Unlocking the use of BitLocker Encryption with vTPM Support In this article we will be showing how HyTrust KeyControl works in conjunction with VMware support for vTPM and explores the difference between BitLocker and HyTrust DataControl. What is a TPM vs vTPM? A TPM (Trusted Platform Module) is a hardware device that provides mini-HSM-like capabilities […]

vTPM Support in vSphere 6.7

In April, VMware introduced support for vTPM for Windows 10 and Windows Server 2016 in vSphere 6.7. This follows on from Microsoft adding vTPM support in Hyper-V in Windows Server 2016. Why add vTPM support? The main driver is to allow customers to use BitLocker for encryption. BitLocker relies on a TPM for storing its […]

G is for Global, Except for GDPR

What is GDPR? For organizations holding information on individuals that must consider data privacy requirements, the G stands for “General” as the General Data Protection Regulation. Is G not for Global? Occasionally I hear someone incorrectly refer to “Global” regarding the G in GDPR. Beyond the G, there seems to be some confusion  about GDPR […]

The Motivations of Those with #Privilege

Recent events with the Twitter handle @realDonaldTrump serve as a reminder of the power of privilege and the potential risk when that power is misused. In this case it appears that a Twitter employee (insider, who was supposedly on the way out the door), perhaps felt motivated based on tweets that they found objectionable or […]

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.