6 Documents sorted by
Multi-Tenant Environments

Multi-Tenant Environments

Article
120

A private cloud with multiple “tenants” – such as business units of an enterprise or customers of a cloud service provider – sharing virtualized computing resources offers a potentially high ROI to all parties. To achieve the financial promise of multi-tenant private cl read more

Two Factor Authentication for VMware

Two Factor Authentication for VMware

Article
100

The most important and fundamental control for accounts is “strong authentication”. The most familiar authentication method is a simple username and password. This may be adequate for a personal email account, but not sufficient for a privileged IT account. Usually stro read more

CJIS Compliance

CJIS Compliance

Article
120

Many of the 100+ controls that are prescribed in CJIS specification v5.3 pertain to controls on processes and procedures for hiring and training datacenter operators, system administrators, etc. Of the remaining CJIS controls that deal with virtual infrastructure admini read more

Cost of Failed Audit

Cost of Failed Audit

Article
110

Breaches at Target, JPMC, Home Depot, NY Presbyterian Hospital and Anthem have significantly impacted these organizations’ financial performances and brand reputations. This paper will explore the financial consequences of these types of security breaches — including br read more

How To Virtualize More By Virtualizing More Securely

How To Virtualize More By Virtualizing More Securely

White Paper
110

The value of datacenter virtualization is undeniable: cost savings, efficiency, and business agility are all driving organizations to virtualize more. However, many companies reach a security roadblock when it comes to virtualizing mission critical or Tier-1 application read more

HyTrust CloudControl

HyTrust CloudControl

Article
39

HyTrust CloudControl provides automated protection and compliance to allow hyper-convergence of virtual workloads on the smallest datacenter footprint all while minimizing time and resources associated with security and compliance. Virtualization should not be an obstac read more

MOST ACTIVE SOURCES

HyTrust
Search in: