83 Documents sorted by
From route hijacking to RPKI: How vulnerable is the Internet?

From route hijacking to RPKI: How vulnerable is the Internet?

Presentation
360 4 1

Trust is an important aspect of our daily actions on the Internet. Trust model discussions often focus on endpoints or even venture into TCP/IP and DNS, but rarely do they consider the important role BGP plays. BGP provides distributed control over core decisions, such read more

Hash:
40-POINT CHECKLIST FOR A SUCCESSFUL HTTP TO HTTPS MIGRATION

40-POINT CHECKLIST FOR A SUCCESSFUL HTTP TO HTTPS MIGRATION

Checklist
22

Google recognized ‘Https’ as an important ranking signal on August 6, 2014. Since then, many webmasters are shifting to the Https version of their website; and this exodus seems to be heading in the right direction with Ecommerce websites leading from the front. As e-re read more

McKesson Case Study

McKesson Case Study

Case Study
47

As it prepared to build its OneCloud infrastructure, McKesson conducted a security audit, turning up three primary compliance and security concerns: Shared local administrator accounts, Overly broad administrator access, and ESXI security hardening compliance. HyTrust C read more

HIPAA/HITECH Compliant in the Cloud

HIPAA/HITECH Compliant in the Cloud

Article
50

IT organizations are only beginning to understand that virtualization has implications that traditional security and compliance measures don’t account for. They’re discovering that the security and audit features of the VMware platform, while usually sufficient for lowe read more

HyTrust DataControl

HyTrust DataControl

Report, Article
49

HyTrust DataControl provides encryption with key management, delivering a data protection solution that enables zero downtime rekeying while remaining fast to deploy and easy to use. Addressing both compliance and security requirements, DataControl drives operational ef read more

Compliance Made Easy

Compliance Made Easy

Article
31

The powerful combination of vRealize Air Compliance and HyTrust CloudControl and DataControl enables organizations to monitor their virtual infrastructure to reduce risks and maintain compliance. Autotrader found the solution helped them address the visibility, securit read more

Secondary Approval - Two Person Rule

Secondary Approval - Two Person Rule

Article
39

Enterprises increasingly seek to virtualize their mission critical workloads. Yet, simultaneously, they must monitor and control VMware privileged user access to virtual machines (VMs) in order to ensure the security and regulatory compliance of their Tier 1 application read more

McAfee Business Brief

McAfee Business Brief

Report
44

Virtualizing tier 1 and compliance workloads presents new and daunting security challenges. As a result, virtualization initiatives are losing momentum, and some have outright stalled. The governance, security, and compliance needs of critical applications are substanti read more

Enterprise Class Logging for Virtual Infrastructure

Enterprise Class Logging for Virtual Infrastructure

Article
40

Detailed, comprehensive event logging is critical for security incident response, compliance, and operations. A good log must tell you exactly what was done — or attempted — by whom, and when. A solid forensic trail of activity is mandatory when understanding infrastruc read more

UC Berkeley Case Study

UC Berkeley Case Study

Case Study
24

University of California Berkeley tackles the challenges of a growing virtualized data center and diverse, multiple clients. We’re ‘too big for our britches’ and lack a solid methodology for monitoring, securing, and maintaining our vSphere systems as we continue to exp read more

NIST and HyTrust

NIST and HyTrust

Article
22

This paper explores background topics around FISMA, NIST and NIST Special Publication 800-53, examines specific security controls called out by 800-53 and finally, maps how those controls are addressed by HyTrust. With Access Control, HyTrust can, in general, extend and read more

Financial Case Study

Financial Case Study

Case Study
65

Headquartered in the U.S. Midwest, the Company is one of the world’s leading providers of payment strategies and technology solutions for financial institutions and businesses. The Company needed the ability to grant access to various tenants of the virtual cloud infras read more

Essentials of Virtualization Security

Essentials of Virtualization Security

Report, Article
63

This paper is the first in a series about the essential security issues arising from virtualization and the adoption of private and public Cloud services. This series will provide the reader with an introduction to each area of security risk and provide some solutions, read more

CoSentry Case Study

CoSentry Case Study

Case Study
35

CoSentry is dedicated to providing a resilient, always-on business environment. The company provides the services and technology that companies need in order to act quickly and maintain a productive enterprise at all times. HyTrust’s offering of the industry’s most reco read more

HIPAA Virtualization White Paper

HIPAA Virtualization White Paper

White Paper
42

Healthcare enterprises have achieved major cost savings, operational benefits, and great ROI from virtualizing lower tier workloads. However, many of these organizations are finding that further data center transformation presents new and daunting challenges. The govern read more

MOST ACTIVE SOURCES

Rand Muhtaseb
Hashdoc Content Review
ST
E
Donald Raggs
C
M
Priti Shetti
HyTrust
J
Cueblocks
Schlimmer Consulting
MB
Search in: