HyTrust Blog | HyTrust

Blog

Improve Security with Proactive Support: HyTrust KeyControl and Vitals

Deploying systems to improve the security of virtual infrastructure is not an option; it is a must. Protecting business-critical data and systems in a world of data leaks, infiltration, malware and more requires taking proactive measures before there is a problem. However, as more systems are deployed in a virtual infrastructure, complexity increases, along with […]

Encryption and Deduplication – Have Your Cake and Eat it!

The question of how encryption and deduplication work together is a question that comes up often. The concern is that if you encrypt data, every block will be different, deduplication won’t work and now you need more storage than you did before. And often a lot more storage. But this isn’t always the case. In […]

Unlocking the use of BitLocker Encryption with vTPM Support

Unlocking the use of BitLocker Encryption with vTPM Support In this article we will be showing how HyTrust KeyControl works in conjunction with VMware support for vTPM and explores the difference between BitLocker and HyTrust DataControl. What is a TPM vs vTPM? A TPM (Trusted Platform Module) is a hardware device that provides mini-HSM-like capabilities […]

vTPM Support in vSphere 6.7

In April, VMware introduced support for vTPM for Windows 10 and Windows Server 2016 in vSphere 6.7. This follows on from Microsoft adding vTPM support in Hyper-V in Windows Server 2016. Why add vTPM support? The main driver is to allow customers to use BitLocker for encryption. BitLocker relies on a TPM for storing its […]

G is for Global, Except for GDPR

What is GDPR? For organizations holding information on individuals that must consider data privacy requirements, the G stands for “General” as the General Data Protection Regulation. Is G not for Global? Occasionally I hear someone incorrectly refer to “Global” regarding the G in GDPR. Beyond the G, there seems to be some confusion  about GDPR […]

The Motivations of Those with #Privilege

Recent events with the Twitter handle @realDonaldTrump serve as a reminder of the power of privilege and the potential risk when that power is misused. In this case it appears that a Twitter employee (insider, who was supposedly on the way out the door), perhaps felt motivated based on tweets that they found objectionable or […]

ISACA-LA Presentation “Cybersecurity in Trump Era”

At my recent talk presented at ISACA-LA titled “Cybersecurity in Trump Era” , I shared with the audience the areas that vendors, enterprises, and auditors need to follow to be prepared for anticipated changes in Federal cybersecurity legislation. While the presentation was lengthy, here are some brief highlights: Trump has signed an executive order extending […]

GDPR Demystified

GDPR – General Data Protection Regulation – is a pan-European data protection law that goes into effect in May 2018. Much has been said and written about it and the scaremongers keep rubbing the fine of ‘€20 million or 4% of the organization’s global annual turnover per incident’ in the event of non-compliance by any […]

IBM Cloud Secure Virtualization: A HyTrust Joint Solution with IBM Cloud and Intel

HyTrust is proud to announce our new joint solution with IBM Cloud and Intel, IBM Cloud Secure Virtualization. This new offering solves for security and compliance barriers to cloud adoption, enabling organizations, especially in highly regulated industries, to take full advantage of the efficiency, agility and scalability of the cloud without worry. HyTrust has partnered […]

We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.