August 28, 2017 08:00 ET
HyTrust Announces New Security Policy Framework to Protect Workloads and Enable Secure Cloud Transformation
HyTrust CloudSPF™ empowers organizations to enforce security policies across private and public cloud infrastructure
LAS VEGAS, NV--(Marketwired - August 28, 2017) - HyTrust, Inc. today announced a new Security Policy Framework designed to protect workloads by providing organizations with visibility and insight combined with consistent policy enforcement across their multi-cloud environments, all based on the key attributes of a workload, the people interacting with it, the data that resides in it, and the infrastructure on which it resides. The announcement coincides with VMworld 2017, the industry's top cloud computing conference taking place at the Mandalay Bay Hotel & Convention Center in Las Vegas, Nevada from Aug. 27-31.
Foundational to HyTrust's Security Policy Framework is the concept that clouds are workload-centric infrastructure, with the workload itself being the new atomic unit of IT and the building block from which modern data centers and cloud infrastructure is built1. To protect ever evolving workloads (virtual machines, containers), organizations need to gain insights into them and automate the application and enforcement of security policies around three key components of a workload: people, data and infrastructure.
"In the brave, not-so-new world of cloud computing, workloads are dynamic and can span many cloud platforms," said HyTrust Chairman and CEO John De Santis. "The workload has become king, and effective workload security is a key for successful cloud transformation. Automating the application and enforcement of security policies around people, data and infrastructure requires a security policy framework that is workload-centric and can be consistently enforced across any cloud--because policy must follow the workload wherever it goes."
Click to Tweet https://ctt.ec/08C8v: .@HyTrust announces CloudSPF, new Security Policy Framework to protect the workload--the new atomic unit of IT.
Workloads: People, Data and Infrastructure
There are three elements of a workload to consider when developing a security policy.
The people component is about the privileged admins who touch workloads. It is important to define and enforce policies that control who in the organization are allowed to perform what actions on workloads in the environment.
The data component is the lifeblood of the workload and contains the critical information that needs to be protected, whether it is national privacy data (GDPR), protected health information (HIPAA), payment card information (PCI), government data (FedRAMP/FISMA), personally identifiable information (PII), corporate IP and so on. Organizations need to think about the type of data they have, where that data is located, who has access to that data and what they are doing to that data (such as copying or deleting it). Organizations also need to consider what it means to have this data spread across multiple platforms and who holds the keys to access the data, because the data is ultimately their responsibility.
The infrastructure component is all about being able to establish reliable trust between the workload and the infrastructure it is running on, even tapping into the native capabilities of that infrastructure. In other words, organizations need to control where workloads reside and make sure that their workloads are running on proven, trusted infrastructure.
The HyTrust Security Policy Framework
The framework ties together the HyTrust product portfolio; HyTrust CloudControl, HyTrust DataControl and HyTrust KeyControl, and will expand to include the recently acquired DataGravity capabilities as well as future innovations tied to security policy formulation and enforcement.
- HyTrust CloudControl helps organizations protect their virtualized infrastructure with authentication, authorization and auditing. Better visibility and control simplify compliance and accelerate further virtualization and data center transformation.
- HyTrust DataControl provides strong encryption for workloads in any cloud, along with easy-to-deploy key management the organization controls, whether it's running workloads in a private cloud powered by vSphere or in public clouds like IBM SoftLayer, Microsoft Azure, vCloud Air or AWS.
- HyTrust KeyControl provides multi-platform key management that is easy to deploy and works with both HyTrust DataControl and third party encryption enabled by private and public cloud platforms. Organizations can retain full ownership of encryption keys with policy based controls to protect data and meet compliance requirements.
For more information about HyTrust, visit: http://www.hytrust.com
About HyTrust
HyTrust's mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads to achieve the highest levels of visibility, granular policy control and data protection. HyTrust customers benefit from being able to accelerate cloud and virtualization cost savings while improving their security posture by automating and enforcing security policies in real time, adapting quickly to compliance requirements, and preventing unplanned outages.
Headquartered in Mountain View, CA, HyTrust is backed by the leading providers of strategic IT infrastructure including VMware, Cisco, Intel and Fortinet; by the vanguard of innovative solutions for the intelligence community, In-Q-Tel; and by a world class group of financial investors including Sway Ventures, Granite Ventures, Trident Capital and Vanedge Capital.
1 Gartner has identified Cloud Workload Protection Platforms as a market defined by workload-centric security protection solutions that span on-premises, physical and virtual machines (VMs) and multiple public cloud infrastructure as a service (IaaS) environments. Gartner Market Guide for Cloud Workload Protection Platforms http://gtnr.it/2gcOnrg
Share: