Data Sovereignty

​HyTrust BoundaryControl – Data Sovereignty with Intel TXT​

Regain Control of the Cloud​​

INFOGRAPHIC: Top 3 Cloud Security NightmaresThe private and hybrid cloud bring huge advantages in terms of agility and cost. That said, you worry about some of the security aspects of moving to the cloud. The rise of virtualization brought many changes. In the past a host was a heavy piece of metal bolted to a rack in a security controlled server room or data center. A VM on the other hand, nothing more than a set of files, is considerably more portable – easily copied, easily moved with little to prevent an insider or someone with insider-like access from copying those VMs and running them elsewhere.

Additionally, you are also faced with a growing number of location-based requirements coming into play – requirements such as:

  1. 1. Compliance with national/regional data sovereignty regulations
  2. 2. Preventing sensitive applications and data from leaving a secure datacenter
  3. 3. Ensuring that mission-critical applications run on optimal hardware to prevent application downtime or performance issues

Working closely with Intel, HyTrust has developed BoundaryControl for VMs using Intel TXT hardware technology. BoundaryControl allows you to tightly define where your VMs are allowed to run, and where they are not allowed to run. This allows you to meet data sovereignty, data security and hardware specification requirements.​

Video

BoundaryControl: Overview

BoundaryControl, a unique capability of HyTrust enabled by Intel TXT, allows VM geofencing, protection from insider threats and better regulatory compliance.

Watch Video

Video

BoundaryControl: Geofencing

In the SDDC, workloads move to different physical hosts, making the control over what runs where a real challenge. With BoundaryControl, administrators can apply fine grained control over which workloads run where.

Watch Video

Video

BoundaryControl: Insider Threat Protection

The Insider Threat – either intentional theft or vandalism, or well intended but tragic accident or misconfiguration, is one of the biggest challenges for cloud and virtual security. HyTrust BoundaryControl can help.

Watch Video

Video

BoundaryControl: Regulatory Compliance

Regulatory Compliance requirements create unique challenges for the SDDC. Fortunately HyTrust BoundaryControl helps address these needs.

Watch Video

Analyst Reports

HyTrust BoundaryControls: Policy-based Control for Virtual Workloads

ESG’s Jon Oltsik outlines the vulnerability gap that exists between server virtualization and the requirements to secure these dynamic and mobile infrastructures. Jon outlines how new BoundaryControls from HyTrust and Intel can help security professionals address this gap.

Download

White Papers

HyTrust and Intel TXT – Trusted Execution Technology

The Taiwan Stock Exchange Corporation Develops a Secure Cloud Infrastructure.

Download

Solution Briefs

The Road to a Secure, Compliant Cloud

Technology innovation can change not only how enterprises are run, but the way people work. Business is now relying on IT as a collaborative partner in the transformation process. Build a trusted infrastructure with a solution stack from Intel, IBM and HyTrust

Download

Video

HyTrust BoundaryControl with Intel TXT

The agility of virtualization also brings challenges with regards to insuring that the right VMs are run on the right hardware, addressing data sovereignty and service assurance challenges.

Watch Video

Some of our Customers