Data Sovereignty | Boundary Control | HyTrust

Data Sovereignty

HyTrust BoundaryControl – Data Sovereignty with Intel TXT​

Regain Control of the Cloud​​

The private and hybrid cloud bring huge advantages in terms of agility and cost. That said, you worry about some of the security aspects of moving to the cloud. The rise of virtualization brought many changes. In the past a host was a heavy piece of metal bolted to a rack in a security controlled server room or data center. A VM on the other hand, nothing more than a set of files, is considerably more portable – easily copied, easily moved with little to prevent an insider or someone with insider-like access from copying those VMs and running them elsewhere.

Additionally, you are also faced with a growing number of location-based requirements coming into play – requirements such as:

  • Compliance with national/regional data sovereignty regulations
  • Preventing sensitive applications and data from leaving a secure datacenter
  • Ensuring that mission-critical applications run on optimal hardware to prevent application downtime or performance issues

Working closely with Intel, HyTrust has developed BoundaryControl for VMs using Intel TXT hardware technology. BoundaryControl allows you to tightly define where your VMs are allowed to run, and where they are not allowed to run. This allows you to meet data sovereignty, data security and hardware specification requirements.​