Resources Archive - Page 3 of 12 - HyTrust

Two-Factor Authentication for VMware

Two-Factor Authentication for VMware

Administrator accounts typically have very broad privileges within a virtualized data center, making them a prime target for attackers wishing to infiltrate an organization. Two-factor authentication provides a critical layer of defense against these kinds of attacks, but this functionality is not native to VMware. HyTrust CloudControl™ introduces broad support for secondary authentication within VMware environments.

Read More

Can You Be HIPAA/HITECH Compliant in the Cloud?

As more organizations virtualize their clinical and ePHI applications, their virtual servers must now be brought into compliance with HIPAA/HITECH. The native capabilities in virtualization platforms such as VMware vSphere are not sufficient to meet all HIPAA/HITECH control requirements. 

Read More

Achieving Operational Assurance in Your Private Cloud

Private cloud promises agility and cost efficiencies, but even small errors or misconfiguration can result in costly downtime. Learn how HyTrust can automate operational assurance, reducing downtime, preventing large scale errors, enable faster remediation, and free up IT headcount by simplifying compliance.

Read More

The Cloud Kill Chain

This infographic illustrates the nature of how attackers breach a company, and why the virtualized data center and private cloud are such rich targets.

Learn More

HyTrust CloudControl Data Sheet

HyTrust CloudControl provides automated protection and compliance to allow hyper-convergence of virtual workloads on the smallest datacenter footprint all while minimizing time and resources costs associated with security and compliance.

Read More

HyTrust DataControl Data Sheet

HyTrust DataControl helps organizations lock down virtual machines and their data so they remain secure throughout their lifecycle, from creation until they are securely decommissioned, easily and automatically.

Read More

HyTrust Security for VMware NSX

Save time on compliance and audit reporting and speed time to resolution for trouble shooting with advanced reporting on NSX admin access and changes.

Read More

CJIS Compliance with HyTrust, VMware, and Intel

The Criminal Justice Information Systems (CJIS) Compliance Specification v5.3 prescribes “Access Controls”, “Configuration Management”, and “Systems Protection and Data Integrity” as critical control objectives. This document summarizes how HyTrust software can simplify CJIS compliance, by automating VM encryption and administrative controls in a virtualized datacenter running VMware vSphere on Intel processors.

Read More

Preventing Insider Threats with HyTrust’s Two-Person Rule

The exposure of extremely confidential national security information by a rogue NSA systems administrator highlighted the catastrophic consequences of inadequate monitoring and access controls. Enterprises that virtualize mission critical applications and data without addressing this issue leave themselves open to similarly devastating outcomes.

Read More
We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.