Checkout our upcoming events
Join HyTrust at Cisco Live, where you get the practical, hands-on knowledge that can advance your career, get compelling insight into the ideas, concepts, and emerging trends that are setting the stage for a more connected and collaborative future.
HyTrust and Intel are collaborating on a live demo of Root of Trust leveraging Intel Trusted Execution Technology (TXT) with a sneak preview of soon-to-be-releaseed HyTrust 3.5.
Black Hat USA is the show that sets the benchmark for all other security conferences. As Black Hat returns for its 16th year to Las Vegas, we bring together the brightest in the world for six days of learning, networking, and skill building. Join us for four intense days of Training and two jam-packed filled days of Briefings.
Visit HyTrust on the Expo Floor and for after hours executive happy hours, dinners, and outings to hear the latest about maintaining continuous compliance while expanding your virtual infrastructure.
Analyst coverage, Solutions overviews, Datasheets, Whitepapers, Case Studies
Try our full feature trial product and secure your cloud infrastructure today!
Awards & Recognition
The Virtualization Practice
One of the huge benefits of virtualization is the compression of multiple physical layers of systems into a much more manageable, single, logical system. Rather than having physically separated servers and network switches, for example, all of that hardware gets flattened down into a logical representation, making it far easier to perform tasks like backup, disaster recovery, etc. The flip side of this equation is that, because previously physical components are now just logical applications or services running on the host, it is potentially far easier to purposely or even inadvertently disrupt operations.
The simplest way to illustrate this risk is via the virtual network switch. In the physical world, the network switch is not only tucked away in a server closet but may have locks on the rack, keycards on the doors, cameras in the room, redundant power sources and built-in hardware bypass. In the virtual world however, a simple right-click of the mouse on the virtual switch brings up a dialog box to power down the device. This presents a significant risk to organizations that rely on these virtual machines as part of their core infrastructure (e.g. switches, firewalls, mail servers, directory servers, etc.)
HyTrust Appliance can eliminate these risks by providing strict access control over which individual or role is allowed to access the virtual infrastructure. HyTrust Appliance can granularly determine on a command-by-command basis what tasks each individual is entitled to perform, eliminating the possibility that an individual can shut down pieces of the infrastructure without express permissions. And HyTrust Appliance can also define the relationships between objects with the virtual infrastructure via Object Policy Labels, similar to "Web 2.0 tagging" for virtual infrastructure objects, which enables better organization and tighter, more consistent controls.
Contact us for more information or to schedule a demonstration specific to your environment.
on what’s happening