Hi [[ session.user.profile.firstName ]]

HyTrust

  • Date
  • Rating
  • Views
  • HyTrust CloudControl for NSX HyTrust CloudControl for NSX HyTrust Recorded: Oct 5 2015 3 mins
    NSX brings tremendous power. Do you have the right controls in place?

    In this presentation, see how HyTrust CloudControl NSX, 2015 winner of the Best of VMworld for Security, Compliance and Virtualization, has fortified VMware NSX with better security, enhanced policy enforcement and better compliance.
  • ​HyTrust BoundaryControl with Intel TXT​ ​HyTrust BoundaryControl with Intel TXT​ HyTrust Recorded: Oct 2 2015 3 mins
    HyTrust has developed BoundaryControl for virtual machines using Intel TXT hardware technology. In this video learn how HyTrust BoundaryControl can help you control where VMs run, helping with compliance, data sovereignty and security.
  • Adding Critical Data Security for Public Cloud Instances Adding Critical Data Security for Public Cloud Instances Steve Pate, Chief Architect at HyTrust Recorded: Jul 15 2015 31 mins
    Time Zones 15:00 UTC / 10 AM ET / 7 AM PT

    The public cloud can offload IT requirements and offer better business agility, but recent IT surveys show more than 50% of IT managers withhold sensitive data from the cloud because of security concerns. Most organizations feel that data in the cloud is data out of their control. But now, it's possible to leverage the public cloud while still maintaining data privacy and security.

    Join Steve Pate, Chief Architect at HyTrust, as he presents the latest breakthrough in cloud encryption and key management - HyTrust DataControl for private and public cloud infrastructures.

    In this webinar, Steve will review how, with DataControl, you can add security and controls in seconds into existing and new public cloud instances by encrypting both Windows and Linux virtual machines.

    He will also discuss how HyTrust DataControl has been helping organizations secure data in both hybrid and public cloud instances, with key advantages, such as:

    - Strong encryption that is operationally transparent to secure data at rest in the public cloud
    - Engineered specifically for the cloud, so security stays with your virtual machines, even if they are replicated or copied
    - Zero-downtime encryption and re-keying for maximum uptime
    - Easy, integrated key management

    We know that you will find this webinar both educational and thought provoking. We look forward to your attendance.
  • How to Achieve Operational Assurance in Your Private Cloud How to Achieve Operational Assurance in Your Private Cloud Rob Babb, Principal Systems Engineer at HyTrust Recorded: Jun 25 2015 43 mins
    As an IT leader, you are under pressure to thwart ‘shadow IT’ and to deliver the agility and cost efficiencies your lines of business are finding in the public cloud.

    Private cloud and software-defined data centers promise this agility, but can introduce greater risk of downtime or breach. Why? Even the most modern, robust hardware and software will still go down if process failure or administrator “pilot error” leads to mistakes in data center operations. And accidental misconfiguration in a highly virtualized environment can impact many more applications than in a traditional, air-gapped data center. As you virtualize more applications and move toward private cloud, maintaining availability at the highest level is absolutely essential.

    In this webinar, Rob Babb, Principal Systems Engineer at HyTrust, will give you the lowdown on how to:

    • Reduce downtime by preventing accidental misconfiguration

    • Prevent large scale errors introduced through automation

    • Achieve faster remediation and recovery with platform hardening,
    alerts, and actionable log data

    • Free up headcount for compliance through automation


    We look forward to your attendance!
  • Three Cloud Security Risks You Must Address Three Cloud Security Risks You Must Address Hosted by HyTrust Recorded: Jun 11 2015 60 mins
    Whether public, private or hybrid, your organization is undoubtedly moving toward the cloud. But cloud infrastructure requires different security, especially when you want to virtualize mission-critical or regulated applications.

    In this webinar, our guests, Forrester Research’s Andras Cser, VP and Principal Analyst serving Security and Risk Professionals, and VMware's Todd Zambrovitz, Senior Manager for vCloud Air, take a deep dive into the fundamentals of cloud security.

    You'll learn:

    - Why cloud security is different than on-premises methods

    - How to approach identity and access management, especially for
    privileged administrators

    - Why software-defined networking deserves special attention from
    a security perspective

    - Approaches for securing data in the cloud

    We look forward to your attendance!
  • The Costs of Failing a PCI Audit The Costs of Failing a PCI Audit Dan Fritsche, CISSP, QSA(P2PE), PA-QSA(P2PE) Managing Director, Application Security at Coalfire Labs Recorded: May 27 2015 38 mins
    In the last few years, security breaches have occurred in various shapes and forms and have shaken up many organizations, especially those in the retail industry. Approaches for auditing and assessment vary from one governance, risk, compliance (GRC) company to the next. Simply checking a box for each regulatory requirement is not sufficient. An approach to meet the challenges that go beyond compliance and address an appropriate security posture should be adopted by organizations.

    This webinar, presented by Dan Fritsche, Managing Director, Application Security at Coalfire Labs, will help you understand the potential costs of failing an audit or getting breached even after having passed a Payment Card Industry Data Security Standard.

    Topics covered include:

    Brand Damage
    Loss of Revenue
    Downtime
    Privacy Penalties
    Forensics Investigations
    Cyber Insurance Coverage

    The presentation will also highlight the steps that organizations can take to address cyber-security risks.
  • Breaking the Cloud "Kill Chain" Breaking the Cloud "Kill Chain" Chris Morales, Principal Systems Engineer at HyTrust Recorded: May 7 2015 28 mins
    Defending against advanced threats is one of the most difficult challenges facing enterprise security teams, and privileged virtualization admin accounts are rich targets.

    In this webinar, Chris Morales, Principal Systems Engineer at HyTrust, will explain the "cloud kill chain" - the sequence of actions attackers put in place to gain unfettered access to virtualized infrastructure - and outline what enterprises can do to break this chain. For highly virtualized organizations, the cloud kill chain has the greatest potential to inflict damage while the attacker remains undetected.

    Topics covered in this webinar include:

    •Privileged Accounts and the Cloud Kill Chain
    •The Nature of the Cloud: Today and in the Future
    •Cloud Adoption Statistics
    •Disrupting the Cloud Kill Chain in three phases
  • Enabling Operational Excellence In Your Virtual And Cloud Environments Enabling Operational Excellence In Your Virtual And Cloud Environments Jeff Ennis, Principal Security Architect at HyTrust Recorded: Feb 19 2015 43 mins
    Organizations and agencies are taking full advantage of the flexibility, agility, and cost savings realized by virtualization. This webinar will focus on the operational challenges facing virtualization professionals and managers.

    In this session, Jeff Ennis, Principal Security Architect at HyTrust, will examine the cost of downtime, the impact of downtime in a virtual environment, share real-world incidents, and highlight mitigation techniques. Attendees will benefit by gaining a better understanding of why operational integrity in the virtualized environment is critical, and the recommended approaches to mitigate the risk of extended outages.
  • What’s New in PCI 3.0 and How it Affects You -  for Organizations in EMEA What’s New in PCI 3.0 and How it Affects You - for Organizations in EMEA HyTrust/Coalfire Recorded: Feb 12 2015 63 mins
    PCI 3.0 came into effect in January, and it brought big changes to PCI compliance requirements and control implementation. The changes highlight the need to maintain compliance continuously to defend against today’s sophisticated threats, rather than focusing on the annual audit. Furthermore, these changes need to be considered against the backdrop of increasing efficiency through mixed-mode architectures and the audit of the virtualization plane.

    Attend this webinar to learn:

    • What are the most important new requirements in PCI 3.0?
    • How does the “Business As Usual” guideline translate into QSA positions on continuous controls and monitoring?
    • How best to implement PCI controls on the vSphere/ESX management plane, including in mixed-mode configurations.

    Feature Speakers:
    Brian Pennington
    Regional Director, Europe at Coalfire

    Jonathan Gohstand
    Cloud Security Architect at HyTrust
  • Planning for PCI Compliance in the Cloud Planning for PCI Compliance in the Cloud Sponsored by HyTrust Recorded: Feb 5 2015 59 mins
    In this webinar featuring Forrester Research VP, principal analyst John Kindervag, and Matt Springfield, Founder and President of 12Feet, Inc., you'll get a fresh perspective on what you need to know about securing the virtualized data center, and the key requirements for PCI that are especially relevant.

    You will leave with a solid understanding of what it takes to securely virtualize your PCI applications and data, and ensure your assessments go smoothly.