Founded in 2007 by veterans in the enterprise infrastructure and security space, HyTrust accelerates datacenter transformation by removing the security concerns that act as a critical inhibitor to virtualization and cloud adoption. HyTrust is partially owned by VMware and Intel.
The mission of HyTrust is to mitigate the risk of catastrophic data center failure and data breaches — especially in light of the concentration of risk that occurs within virtualized and cloud environments. With HyTrust, organizations can now confidently expand virtualization to mission critical applications and take full advantage of the cloud.
HyTrust workload security solutions protect cloud infrastructure allowing you to accelerate savings, reduce risk, simplify compliance and increase availability
CloudControl – Protect Your Virtual Infrastructure
CloudControl helps defend and protect the most important asset in the IT inventory – the hypervisor. For most organizations, their virtualization infrastructure is the crown jewel of the shop and the hypervisor the one ring to rule them all. With that in mind, it is more important than ever to pay particular attention to cloud security solutions that help better harden the hypervisor and lock down access to that vital piece of infrastructure.
Key Control – Multi-Cloud KMIP-Compliant Key Management
HyTrust KeyControl is a Centralized, enterprise-grade, high availability Key Management System that allows organizations to keep complete ownership of their encryption keys and manage them under a single pane of glass, regardless of their Multi-Cloud architecture.
DataControl – Better Data Encryption
HyTrust DataControl enables state of the art encryption as well as encryption and key management. Deployment is fast and easy with ongoing operations intuitive and GUI-based. Encryption and further rekeying can be performed with zero downtime on live environments.
BoundaryControl – Data Sovereignty that leverages Intel TXT
HyTrust BoundaryControl gives you the ability to define trusted areas where your VMs are allowed to run. These could be geographical area, a set of hosts meeting certain compliance or performance requirements or any of a number of other factors. You control where your VMs run, enabling data sovereignty, compliance and giving greater protection against insider threats and external breaches.
HyTrust CloudAdvisor provides answers to questions such as “where is this data located?”, “who is interacting with the data?”, and “why is it stored there?”
Enables organizations to quickly define policies to discover critical business data—including Personally Identifiable information (PII)—detect anomalous user behavior, and defend against unintended exposure, data loss, malicious user access, and regulatory non-compliance.