Encryption Archives - HyTrust
https://www.hytrust.com/uploads/cont_comp_header.png

Encryption

Four Data Crimes You Don’t Need to Commit

Picture a crime scene after a break-in. The images in your mind might include broken windows, shattered glass and signs of a struggle. Does that vision change if you learn the break-in took place virtually, affecting the contents of a data center – instead of a home? When a data breach occurs, there’s no physical […]

Analyzing, Auto-Encrypting and Tagging Sensitive VMs

Last week HyTrust announced the launch of HyTrust CloudAdvisor Version 2.2.1 (HTCA 2.2.1) which provides further integration with HyTrust DataControl (HTDC) and HyTrust CloudControl (HTCC). More specifically, the new version supports the ability to: Automatically encrypt VMs using HyTrust DataControl when sensitive data is detected Analyze and monitor VMs encrypted by HyTrust DataControl Label VMs in […]

Improve Security with Proactive Support: HyTrust KeyControl and Vitals

Deploying systems to improve the security of virtual infrastructure is not an option; it is a must. Protecting business-critical data and systems in a world of data leaks, infiltration, malware and more requires taking proactive measures before there is a problem. However, as more systems are deployed in a virtual infrastructure, complexity increases, along with […]

Encryption and Deduplication – Have Your Cake and Eat it!

The question of how encryption and deduplication work together is a question that comes up often. The concern is that if you encrypt data, every block will be different, deduplication won’t work and now you need more storage than you did before. And often a lot more storage. But this isn’t always the case. In […]

Cloud First, Encryption Second?

Many do not consider the government an early adopter of technology or an operator of data centers at the bleeding edge of innovation. The Cloud First initiative was meant to drive greater adoption of cloud computing amongst government organizations to help achieve cost savings and all the other wonderful advantages that are driving commercial enterprises […]

Key Management, KMIP and VMware VM Encryption

At VMworld in Barcelona VMware announced VMware VM Encryption as part of a larger vSphere 6.5 announcement. As a VMware partner (VMware is also a HyTrust investor) we are of course excited to see security being highlighted by VMware. I founded HyTrust in 2007 with the vision of enhancing security for VMware , which was […]

Encryption – like Seat Belts

Back in the day macho types, often wearing t-shirts and smoking Marlboros Reds, would tell you that they don’t wear seat belts because this lack of seat belts makes it more likely that they would be “thrown clear” in the event of an accident. Sounds pretty reasonable until you ponder where you might be “thrown […]

To a Better Cloud – With IBM, HyTrust, Intel, and VMware

Today is an exciting day in the world of the hybrid cloud and we are excited to be an integral part of it. IBM, with the earlier adoption of Intel TXT in their SoftLayer bare metal cloud offering, showed clearly that they were looking toward the future by enabling an unbroken line of trust all […]

How often should you rekey encrypted data?

The initial downtime taken to encrypt data is often one of the main stumbling blocks to deploying an encryption solution. As data sets move into the terabytes, the downtime associated with initial encryption can often exceed available maintenance windows. Solutions such as HyTrust DataControl alleviate these issues by allowing the applications to continue running while […]

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.