Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

HyTrust Acquires Encryption and Key Management Firm HighCloud Security

Fresh off of news that it had raised $18.5 million in an oversubscribed Series C funding round in late August, HyTrust, a provider of policy management and access control solutions for virtual and cloud environments, announced that it has acquired HighCloud Security

Fresh off of news that it had raised $18.5 million in an oversubscribed Series C funding round in late August, HyTrust, a provider of policy management and access control solutions for virtual and cloud environments, announced that it has acquired HighCloud Security, a provider of cloud encryption and key management software.

HyTrust LogoAs a result of the acquisition, HyTrust says it will be able to provide administrative visibility and control integrated with encryption and key management to secure private, public and hybrid cloud environments.

According to HyTrust, the combined technologies from HyTrust and HighCloud enable ‘cloaked’ private, hybrid and public clouds and help address three of the primary security concerns in cloud environments.

· The broad level of access available to privileged users with malicious intent 

· Breaches and other data center disasters caused not by criminal intent but through human error or misconfiguration

· Challenges involved in maintaining the security and privacy of the data itself

“HyTrust represents the control point for cloud management, providing automated policy-based security for private cloud environments that can enable both trusted hybrid clouds and ‘cloaked’ public clouds,” said Eric Chiu, president and founder of HyTrust. “HighCloud encryption, meanwhile, can be deployed in private, hybrid and public clouds, ensuring data security and privacy as organizations migrate between these environments.”

“The service also enables a unique level of ‘walk-way’ freedom by making it possible to securely change cloud providers or decommission from the cloud without having to worry about data being left behind,” Chiu added. “This also makes it easier for corporations to achieve compliance with regulations such as HIPAA and PCI.”

While the technologies can already be used together, HighCloud’s technology will be integrated into HyTrust to more tightly bind administrative controls with data security in cloud environments, making encryption and key management invisible to the end user.

Advertisement. Scroll to continue reading.

Organizations use HyTrust’s technology to reduce the risks in virtualized cloud environments by ensuring that security policies are automated, applied correctly and enforced. In October 2012, the company added a “secondary approval” feature to its HyTrust Appliance that enforces the “two-person rule”, made famous by the US Air Force’s general rule focusing on nuclear missile launches.

“HyTrust sits at the center of an important IT ecosystem, providing the control, security configuration, compliance assurance and visibility needed to reap the benefits of the cloud,” Wayne Pauley, senior analyst at Enterprise Strategy Group said in a statement. “ With HighCloud, HyTrust adds strong, cloud-optimized data security to its portfolio – a critical requirement for data protection and compliance. And customers gain improved security for data at rest – enabling the same level of visibility in the new virtual datacenter as its physical counterparts.”

HighCloud’s engineering team will join HyTrust and continue to provide support and maintenance to existing customers, the company said.

Investors in HyTrust include Intel Capital, Fortinet, VMware, In-Q-Tel, Granite Ventures, Cisco, Trident Capital and Epic Ventures.

Read SecurityWeek’s interview with HyTrust President and Co-Founder Eric Chiu 

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.