HyTrust Blog | HyTrust

Blog

Secure Boot and Measured Boot for VMware ESXi with Intel® TXT

As stated in the article, What is the Difference between Secure Boot and Measured Boot, it can be nearly impossible to remove “‘Persistent threats’, where malware is inserted into a system in a way that the platform always boots in a compromised state, even after legitimate software is re-installed.” But how can you tell if […]

Read More

Your Keys are the Key to Success!

In today’s world of corporate data security, your keys are the key to your success.  Encryption keys, that is!  With the continued and growing challenges of protecting highly sensitive and critical data of your customers, students, employees, or any other demographic that entrusts data to you; enterprises are looking to the widespread use of encryption […]

Read More

HyTrust and Intel Ease Integration of Trusted Compute

Hardware-based cloud security solutions provide a higher level of protection as compared to software only security measures. Unfortunately the industry has found adopting and deploying hardware based security technologies on a broad scale challenging due to the lack of solution integration and deployment tools available. To overcome these challenges, Intel created the Intel® Security Libraries […]

Read More

Security as Code

There is a digital transformation underway in how applications are being built and released/delivered to production. This is primarily propelled by the success of the DevOps paradigm and the cloud native technologies such as Containers & Microservices. Many organizations are now able to release software more frequently and efficiently and there are many that deliver […]

Read More

Securing the Control Plane

Infrastructure Security is primarily comprised of the following: Control Plane Security Endpoint Security Network Security Control Plane Security: The focus of this blog post is around securing the management platforms used for provisioning the compute/network/storage infrastructure. The various business applications/services run on the infrastructure provisioned using management platforms. As customers adopt a multi-cloud strategy they […]

Read More

Rich Deployment Control Policies For Kubernetes

In our previous blog, we outlined the following three categories of container security: Image assurance Infrastructure security Runtime security In this article we dive deeper into the rich capabilities in our HyTrust Cloud Control (HTCC) product version 6.0 for securing the deployment of containers in a Kubernetes environment. Deployment Control is all about securing ‘what’ […]

Read More

The Three Categories of Container Security

Overview When it comes to securing containers one has to consider a holistic approach. Besides the security and integrity of the images one needs to ensure the container infrastructure i.e the container management system such as Kubernetes orchestrator and the virtual machines or hosts where the orchestrator is running are properly secured. Even though the […]

Read More

HyTrust-powered Encryption Available on Pivot3

Today, Pivot3 announced new policy-based security management capabilities, powered by HyTrust, in its Intelligence Engine.  Pivot3’s expanded Intelligence Engine capabilities allow organizations to automate and simplify the process of protecting sensitive data with comprehensive, standards-based security. The platform also facilitates regulatory compliance as customers acquire and manage data across the edge, core and cloud. As […]

Read More

A Unified Approach to Securing a Multi-Cloud Environment

Overview Over the last few years there has been rapid adoption of the public cloud primarily propelled by the following: Emerging technologies such as Docker containers & Kubernetes Increased appetite for cloud native applications Increased need to modernize monolithic applications using microservices etc. More and more enterprises are embracing a multi-cloud strategy for a variety […]

Read More

Think You Checked the Encryption Box with SEDs? Think Again!

In case you missed it, last week a team of researchers from Radboud University in the Netherlands discovered a serious flaw in self-encrypting drives (SEDs). Luckily, it only affects drives from two manufacturers, Crucial and Samsung.  They accomplished this task spending less than 100 Euros, by reverse engineering the firmware of the drives.  You can […]

Read More
We have placed cookies on your device to help make this website better. By continuing to use this website you agree to our Cookie Policy.