29 Documents sorted by
McKesson Case Study

McKesson Case Study

Case Study
77

As it prepared to build its OneCloud infrastructure, McKesson conducted a security audit, turning up three primary compliance and security concerns: Shared local administrator accounts, Overly broad administrator access, and ESXI security hardening compliance. HyTrust C read more

Secondary Approval - Two Person Rule

Secondary Approval - Two Person Rule

Article
70

Enterprises increasingly seek to virtualize their mission critical workloads. Yet, simultaneously, they must monitor and control VMware privileged user access to virtual machines (VMs) in order to ensure the security and regulatory compliance of their Tier 1 application read more

McAfee Business Brief

McAfee Business Brief

Report
70

Virtualizing tier 1 and compliance workloads presents new and daunting security challenges. As a result, virtualization initiatives are losing momentum, and some have outright stalled. The governance, security, and compliance needs of critical applications are substanti read more

Enterprise Class Logging for Virtual Infrastructure

Enterprise Class Logging for Virtual Infrastructure

Article
62

Detailed, comprehensive event logging is critical for security incident response, compliance, and operations. A good log must tell you exactly what was done — or attempted — by whom, and when. A solid forensic trail of activity is mandatory when understanding infrastruc read more

HIPAA/HITECH Compliant in the Cloud

HIPAA/HITECH Compliant in the Cloud

Article
70

IT organizations are only beginning to understand that virtualization has implications that traditional security and compliance measures don’t account for. They’re discovering that the security and audit features of the VMware platform, while usually sufficient for lowe read more

HyTrust DataControl

HyTrust DataControl

Report, Article
69

HyTrust DataControl provides encryption with key management, delivering a data protection solution that enables zero downtime rekeying while remaining fast to deploy and easy to use. Addressing both compliance and security requirements, DataControl drives operational ef read more

Simplivity

Simplivity

Report
47

This document will familiarize you with SimpliVity OmniStack technology and introduce you to HyTrust. It will also provide you with technical details of testing executed by SimpliVity to validate the interoperability of OmniStack systems and the HyTrust Platform in term read more

Compliance Made Easy

Compliance Made Easy

Article
40

The powerful combination of vRealize Air Compliance and HyTrust CloudControl and DataControl enables organizations to monitor their virtual infrastructure to reduce risks and maintain compliance. Autotrader found the solution helped them address the visibility, securit read more

NIST and HyTrust

NIST and HyTrust

Article
35

This paper explores background topics around FISMA, NIST and NIST Special Publication 800-53, examines specific security controls called out by 800-53 and finally, maps how those controls are addressed by HyTrust. With Access Control, HyTrust can, in general, extend and read more

Two Factor Authentication for VMware

Two Factor Authentication for VMware

Article
19

The most important and fundamental control for accounts is “strong authentication”. The most familiar authentication method is a simple username and password. This may be adequate for a personal email account, but not sufficient for a privileged IT account. Usually stro read more

Multi-Tenant Environments

Multi-Tenant Environments

Article
26

A private cloud with multiple “tenants” – such as business units of an enterprise or customers of a cloud service provider – sharing virtualized computing resources offers a potentially high ROI to all parties. To achieve the financial promise of multi-tenant private cl read more

Breaking the APT Kill Chain

Breaking the APT Kill Chain

Report
22

Defending against Advanced Persistent Threats (APTs) is one of the most difficult challenges facing enterprise security teams. To defend against APTs, it is essential to understand the APT “kill chain”– the sequence of actions attackers put in place to accomplish their read more

HIPAA Virtualization White Paper

HIPAA Virtualization White Paper

White Paper
66

Healthcare enterprises have achieved major cost savings, operational benefits, and great ROI from virtualizing lower tier workloads. However, many of these organizations are finding that further data center transformation presents new and daunting challenges. The govern read more

ESG Brief

ESG Brief

Report
100

Everyone knows that server virtualization and cloud computing can introduce new security risks and limit security visibility and control. So what’s needed? New types of virtual security controls that allow organizations to create and enforce policies at the virtual work read more

CoSentry Case Study

CoSentry Case Study

Case Study
49

CoSentry is dedicated to providing a resilient, always-on business environment. The company provides the services and technology that companies need in order to act quickly and maintain a productive enterprise at all times. HyTrust’s offering of the industry’s most reco read more

MOST ACTIVE SOURCES

HyTrust
Search in: