Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Unified Policy-Based Controls for Multi-Cloud Infrastructure
    Unified Policy-Based Controls for Multi-Cloud Infrastructure
    Govindarajan Rangarajan, Distinguished Architect, HyTrust; Sai Vaidyam, Product Manager, HyTrust Recorded: Oct 16 2018 57 mins
    Adoption of new technologies like containers, AI, and machine learning has necessitated that enterprises adopt a multi-cloud strategy to meet the demands of various business units within the organization. The security teams are becoming increasingly concerned with the expansion of the threat surface with the adoption of containers and public cloud. In this webinar, we will discuss the security challenges enterprises face as they adopt a multi-cloud strategy and how best to address those challenges using a unified policy-based security solution.

    Register for this webinar to learn:
    - Security challenges in multi-cloud infrastructure.
    - How to solve those security challenges using harmonized governance.
    - Details of new HyTrust CloudControl Security Platform.
  • Jumpstart Your Cybersecurity Strategy with NIST Guidance
    Jumpstart Your Cybersecurity Strategy with NIST Guidance
    Donna Dodson, Chief Cybersecurity Advisor, NIST; Hemma Prafullchandra, CTO and EVP Products, HyTrust Recorded: Feb 20 2018 63 mins
    In 2017, the total cost of a data breach averaged $3.62 million. Companies who experienced a data breach have a 27.7% likelihood of a recurring material data breach over the next two years. These staggering statistics from a 2017 Ponemon Study highlights the need for a strong cybersecurity strategy going into this year.

    In this webinar, experts from the National Institute of Standards and Technology (NIST) will share:

    -Observations and accomplishments from 2017 NIST initiatives
    -NIST’s 2018 cybersecurity focus areas, such as cloud security, internet infrastructure, and industry-aligned (healthcare, financial services) cybersecurity projects
    -Opportunities for industry engagement

    HyTrust experts will provide perspectives on:

    -Best practices for automation and continuous compliance with the NIST Cybersecurity Framework
    -Tips to strengthen your security posture and avoid common pitfalls
    -Key resources to jumpstart your 2018 cybersecurity strategy

    View this webinar to learn more about the state of cybersecurity and what you need to know now to succeed in 2018.
  • GDPR: Control Your Data, Before it Controls You
    GDPR: Control Your Data, Before it Controls You
    Rob Clyde Vice-Chair at ISACA, Renaud Larsen Chief Field Architect,David Siles VP Bus Dev at HyTrust, Mora Gozani, Moderator Recorded: Jan 9 2018 58 mins
    GDPR is just months away – do you know where your sensitive data is?

    GDPR, the most significant and comprehensive data privacy standard to date, is only seven months way and many organizations are struggling to understand what that means to them and their data management practices. What is more alarming is that four out of five organizations don’t even know where their GDPR data is located or how to secure it.

    Join us for an informative and interactive panel of data security and privacy experts who will discuss the wide-ranging implications of GDPR on data management policies and how organizations can begin to gain control of their GDPR data by accelerating their data discovery and classification efforts.

    This panel session will cover:

    - What exactly is “personal data”
    - Key GDPR data privacy provisions
    - The implications to an organization
    - Proactive approaches to understanding and securing data
  • HyTrust CloudControl for NSX
    HyTrust CloudControl for NSX
    HyTrust Recorded: Oct 5 2015 3 mins
    NSX brings tremendous power. Do you have the right controls in place?

    In this presentation, see how HyTrust CloudControl NSX, 2015 winner of the Best of VMworld for Security, Compliance and Virtualization, has fortified VMware NSX with better security, enhanced policy enforcement and better compliance.
  • ​HyTrust BoundaryControl with Intel TXT​
    ​HyTrust BoundaryControl with Intel TXT​
    HyTrust Recorded: Oct 2 2015 3 mins
    HyTrust has developed BoundaryControl for virtual machines using Intel TXT hardware technology. In this video learn how HyTrust BoundaryControl can help you control where VMs run, helping with compliance, data sovereignty and security.
  • Adding Critical Data Security for Public Cloud Instances
    Adding Critical Data Security for Public Cloud Instances
    Steve Pate, Chief Architect at HyTrust Recorded: Jul 15 2015 31 mins
    Time Zones 15:00 UTC / 10 AM ET / 7 AM PT

    The public cloud can offload IT requirements and offer better business agility, but recent IT surveys show more than 50% of IT managers withhold sensitive data from the cloud because of security concerns. Most organizations feel that data in the cloud is data out of their control. But now, it's possible to leverage the public cloud while still maintaining data privacy and security.

    Join Steve Pate, Chief Architect at HyTrust, as he presents the latest breakthrough in cloud encryption and key management - HyTrust DataControl for private and public cloud infrastructures.

    In this webinar, Steve will review how, with DataControl, you can add security and controls in seconds into existing and new public cloud instances by encrypting both Windows and Linux virtual machines.

    He will also discuss how HyTrust DataControl has been helping organizations secure data in both hybrid and public cloud instances, with key advantages, such as:

    - Strong encryption that is operationally transparent to secure data at rest in the public cloud
    - Engineered specifically for the cloud, so security stays with your virtual machines, even if they are replicated or copied
    - Zero-downtime encryption and re-keying for maximum uptime
    - Easy, integrated key management

    We know that you will find this webinar both educational and thought provoking. We look forward to your attendance.
  • How to Achieve Operational Assurance in Your Private Cloud
    How to Achieve Operational Assurance in Your Private Cloud
    Rob Babb, Principal Systems Engineer at HyTrust Recorded: Jun 25 2015 43 mins
    As an IT leader, you are under pressure to thwart ‘shadow IT’ and to deliver the agility and cost efficiencies your lines of business are finding in the public cloud.

    Private cloud and software-defined data centers promise this agility, but can introduce greater risk of downtime or breach. Why? Even the most modern, robust hardware and software will still go down if process failure or administrator “pilot error” leads to mistakes in data center operations. And accidental misconfiguration in a highly virtualized environment can impact many more applications than in a traditional, air-gapped data center. As you virtualize more applications and move toward private cloud, maintaining availability at the highest level is absolutely essential.

    In this webinar, Rob Babb, Principal Systems Engineer at HyTrust, will give you the lowdown on how to:

    • Reduce downtime by preventing accidental misconfiguration

    • Prevent large scale errors introduced through automation

    • Achieve faster remediation and recovery with platform hardening,
    alerts, and actionable log data

    • Free up headcount for compliance through automation

    We look forward to your attendance!
  • Three Cloud Security Risks You Must Address
    Three Cloud Security Risks You Must Address
    Hosted by HyTrust Recorded: Jun 11 2015 60 mins
    Whether public, private or hybrid, your organization is undoubtedly moving toward the cloud. But cloud infrastructure requires different security, especially when you want to virtualize mission-critical or regulated applications.

    In this webinar, our guests, Forrester Research’s Andras Cser, VP and Principal Analyst serving Security and Risk Professionals, and VMware's Todd Zambrovitz, Senior Manager for vCloud Air, take a deep dive into the fundamentals of cloud security.

    You'll learn:

    - Why cloud security is different than on-premises methods

    - How to approach identity and access management, especially for
    privileged administrators

    - Why software-defined networking deserves special attention from
    a security perspective

    - Approaches for securing data in the cloud

    We look forward to your attendance!
  • The Costs of Failing a PCI Audit
    The Costs of Failing a PCI Audit
    Dan Fritsche, CISSP, QSA(P2PE), PA-QSA(P2PE) Managing Director, Application Security at Coalfire Labs Recorded: May 27 2015 38 mins
    In the last few years, security breaches have occurred in various shapes and forms and have shaken up many organizations, especially those in the retail industry. Approaches for auditing and assessment vary from one governance, risk, compliance (GRC) company to the next. Simply checking a box for each regulatory requirement is not sufficient. An approach to meet the challenges that go beyond compliance and address an appropriate security posture should be adopted by organizations.

    This webinar, presented by Dan Fritsche, Managing Director, Application Security at Coalfire Labs, will help you understand the potential costs of failing an audit or getting breached even after having passed a Payment Card Industry Data Security Standard.

    Topics covered include:

    Brand Damage
    Loss of Revenue
    Privacy Penalties
    Forensics Investigations
    Cyber Insurance Coverage

    The presentation will also highlight the steps that organizations can take to address cyber-security risks.
  • Breaking the Cloud "Kill Chain"
    Breaking the Cloud "Kill Chain"
    Chris Morales, Principal Systems Engineer at HyTrust Recorded: May 7 2015 28 mins
    Defending against advanced threats is one of the most difficult challenges facing enterprise security teams, and privileged virtualization admin accounts are rich targets.

    In this webinar, Chris Morales, Principal Systems Engineer at HyTrust, will explain the "cloud kill chain" - the sequence of actions attackers put in place to gain unfettered access to virtualized infrastructure - and outline what enterprises can do to break this chain. For highly virtualized organizations, the cloud kill chain has the greatest potential to inflict damage while the attacker remains undetected.

    Topics covered in this webinar include:

    •Privileged Accounts and the Cloud Kill Chain
    •The Nature of the Cloud: Today and in the Future
    •Cloud Adoption Statistics
    •Disrupting the Cloud Kill Chain in three phases

Embed in website or blog