CloudControl​ Virtual and Private Cloud Security

HyTrust CloudControl in less than 3 minutes

Access Control, Forensic Logging and Policy Enforcement

The Gold Standard for Automated Security and Compliance in VMware Environments

​Cloud security solutions help defend and protect the most important asset in the IT inventory – the hypervisor. For most organizations, their virtualization infrastructure is the crown jewel of the shop and the hypervisor the one ring to rule them all. With that it mind, it is more important than ever to pay particular attention to cloud security solutions that help better harden the hypervisor, lock down access and provide better visibility into and control over the environment.

With HyTrust CloudControl you get a variety of security and policy enhancements without impacting the GUI that your vSphere, NSX and ESXi admins already know and use.​ Deployed as a transparent proxy, HyTrust CloudControl mediates the actions taken by hyperadministrators using familiar interfaces. Approved actions are allowed, disapproved actions are blocked and additional approval is enabled.

CloudControl Features

  • Role Based Access Control (RBAC) – control which functions have access to what resources. This allows a much closer alignment of access rights to governance and compliance requirements.
  • Policy Control including Two Man Rule – define and more importantly enforce policy including requiring secondary approval for potentially disruptive actions, reducing potential impact of human error or intentional malevolent behavior.
  • Access Control including Two Factor Authentication – with APTs focusing increasingly on privileged administrative accounts, approaches like 2FA can significantly enhance the overall security posture of an organization without the traditional weaknesses that even strong password requirements have.
  • Forensic grade logs – compliance (and good security) often require the ability to not only show who you allowed to do things, but also who was not allowed to do things. Forensic grade logging provides indepth perspective on what has happened as well as what has not happened in your virtual environment.

Solution Briefs

Secondary Approval Prevents Admin Mistakes and Insider Threats

HyTrust CloudControl’s Secondary Approval Workflow...

Learn More


Why Do I Need HyTrust?

Virtualization changes everything - including security....

Watch Video


What is HyTrust CloudControl?

Virtualization concentrates power, and risk, in the...

Watch Video

Data Sheets

HyTrust CloudControl Data Sheet

HyTrust CloudControl provides automated protection...

Learn More