Overview

HyTrust's mission is to make private, public, and hybrid cloud infrastructure more secure for enterprises, service providers, and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking, and storage workloads to achieve the highest levels of visibility, granular policy control, and data protection. HyTrust customers benefit from being able to fully realize the cost savings associated with virtualization and cloud technologies without sacrificing their security posture by automating and enforcing security policies in real time, adapting quickly to compliance requirements, and minimizing disruption to their business.

Headquartered in Mountain View, CA, HyTrust is backed by the leading providers of strategic IT infrastructure, including VMware, Cisco, Intel, and Fortinet; by the vanguard of innovative solutions for the intelligence community, In-Q-Tel; and by a world-class group of financial investors, including Sway Ventures, Granite Ventures, Trident Capital, and Vanedge Capital. HyTrust was recently named one of CRN's "20 Coolest Cloud Security Vendors," a recipient of VMworld's 2015 Gold Award for Security/Compliance and Virtualization, and the Most Innovative Cloud Company at Intel Security Focus 2015.

Products

  • HyTrust CloudControl

    HyTrust CloudControl helps agencies protect virtualization with verification, approval and assessment. Better visibility and control streamline compliance and expedite further virtual infrastructure.

  • HyTrust DataControl

    HyTrust DataControl encrypts data across public and private cloud environments. Agencies’ data are strongly encrypted securing intellectual property and meeting compliance frameworks like HIPPA. Best of all, DataControl keeps your agency in charge, not the cloud provider.

  • HyTrust KeyControl

    To guarantee strong data security, keys have to be rotated regularly, and transported and stored securely. HyTrust KeyControl allows agencies to easily regulate encryption keys at scale. HyTrust KeyControl streamlines management of encrypted workloads by automating and simplifying the lifecycle of encryption keys; including key storage, distribution, rotation, and key revocation.

  • HyTrust CloudAdvisor

    HyTrust CloudAdvisor for Data empowers agencies to define policies to automatically discover the information that’s important to you, identify abnormal user access activity, and defend your agency against careless exposure, data loss, malicious users, and regulatory noncompliance.

    HyTrust CloudAdvisor for Availability permits System and Backup Administrators to proactively monitor, recognize and address archival data security concerns using agency-defined data classification tags across each backup – as it is created.

Public Sector

HyTrust for Public Sector:

Today Public Sector departments and agencies face numerous operational challenges as they shift from expensive data center deployments to more cost efficient virtualized environments and cloud services. HyTrust can help the Public Sector connect acquired cloud platforms with workload security solutions that reinforce data privacy and security controls, apply privileged access management, automate regulatory compliance tasks, and support secure multi-tenancy deployments across any cloud environment for mission security and operational success.

  • Regulatory Compliance: HyTrust helps agencies secure workloads and ensure IT security while adhering to mandated compliance frameworks such as NIST 800-53, NIST 800-171, CJIS, and HIPAA
  • Data Insights and Protection: HyTrust provides automated data discovery, data classification, access control, encryption, workload geo-fencing, and integrated key management solutions across multiple virtualized environments to strengthen data security in the cloud.
  • Multi-Tenant and Hybrid Cloud Deployments: HyTrust deciphers multi-tenancy challenges by enforcing access control policies for virtualized servers and desktop infrastructure by separating virtual deployments and safely isolating each tenant’s critical applications and data.
  • Protecting Critical Infrastructure and Government Services: IT and compliance automation enables agencies to accelerate their usage of virtualized and cloud environments while meeting the essential operational and regulatory standards that guarantee workload and data security.

Compliance

Virtual and Cloud Compliance for CJIS

  • The Criminal Justice Information Systems Compliance Specification (CJIS), version 5.3, specifies Access Controls, Configuration Management and Systems Protection and Data Integrity and critical control objectives.
  • HyTrust’s encryption, workflow automation, and logging capabilities satisfy more than a dozen relevant CJIS controls that deal with virtual infrastructure administrator access management, separation of duties, least privilege enforcement, and logging of virtual infrastructure administrator activity.

FedRAMP Cloud and Virtualization Compliance

  • Service Providers seeking FedRAMP certification must contend with a large number of required security controls – 297 of them for the “Moderate” Impact Level.
  • HyTrust solutions provide broad control support in two critical areas:
    • HyTrust CloudControl – hypervisor layer administration, activity auditing, and configuration hardening
    • HyTrust DataControl – Data at rest encryption for any Linux or Windows hosted database or application
  • By supporting so many controls in a single solution, providers not only simplify the task of achieving FedRAMP certification, they lower staff training and manpower costs and directly impact the bottom line.

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2019


Events

News

Latest News

HyTrust, the leader in workload security for multi-cloud infrastructure is proud to announce today that it has been selected as a Distinguished Vendor for the 2019 TAG Cyber Security Annual.
READ MORE >
HyTrust announced today that it will demonstrate its mixed workload and broad key management integration with Hyper-Converged Infrastructure (HCI) platforms for compute, storage and virtualization at ...
READ MORE >
HyTrust announced today integration between HyTrust DataControl and HyTrust CloudAdvisor for seamless data discovery, classification and encryption in virtual environments.
READ MORE >
HyTrust announced today results from a survey of security professionals revealing that only 14 percent of organizations believe that they are fully ready to meet the requirements of the General Data ...
READ MORE >
HyTrust announced today that its market-leading CloudAdvisor product now includes fine-grained visibility and insight for cloud data availability solutions from Veeam Software through new product ...
READ MORE >

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Featured

Federal agencies are embracing the cloud more than ever - not only because of Cloud First and other IT-related mandates, but because of the tangible benefits. Read more in this eBook from HyTrust and FCW.

For state and local agencies, complying with the vast array of government and industry standards is business as usual. Learn how to keep on top of everything with this eBook from HyTrust and GCN.

With the ever-increasing volume and publicity of cybersecurity threats, security teams struggle to improve the security posture of their infrastructure and stay up-to-date and in compliance with continuously evolving regulatory requirements. According to ESG research, the most important IT meta-tren...

In this on-demand webcast from GCN, Gregory L. Garcia, and Wayne Lewandowski discuss the factors and approaches to building a trustworthy security system in the cloud.

With new and evolving federal mandates, maintaining compliance is a major challenge. Conflicting requirements can muddy the waters, but cloud migration is still a priority. Clear the waters with this white paper from HyTrust and FCW.

Understanding the federal and state compliance regulations can help agencies determine which ones apply. Untangle the compliance web with this whitepaper from HyTrust and GCN.

Infographic

Download this infographic to learn more about the top 5 reasons to enable vSAN encryption, HyTrust KeyControl features, compliance mandates that call for encryption, and more.

Download this infographic to learn more about the top 5 reasons to enable vSphere encryption, HyTrust KeyControl features, compliance mandates that call for encryption, and more.

Presentation

Take a deeper dive into the following topics with this presentation deck: Evolution of cloudSecurity challenges in multi-cloud infrastructureSecurity controls needed for securing multi-cloud infrastructureUnified VisibilityUnified policyFull-stack support

Solutions Brief

Public sector systems provide services that support the military, critical infrastructure, emergency response, transport, to civilian state and local government operations, and more. The public sector lives under the constant threat of IT infrastructure attack from malware, bad actors, and Advanced ...