Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

HyTrust Receives Investment from CIA’s Venture Capital Arm

HyTrust, a provider of policy management and access control solutions for virtual and cloud environments, has entered into a strategic investment and technology development agreement with In-Q-Tel (IQT), the not-for-profit venture capital arm of the CIA.

HyTrust, a provider of policy management and access control solutions for virtual and cloud environments, has entered into a strategic investment and technology development agreement with In-Q-Tel (IQT), the not-for-profit venture capital arm of the CIA.

According to the company, the agreement was designed to help fuel product development and enable the expansion of support operations to meet customer demand, and increase HyTrust’s reach into the federal government.

HyTrust LogoIn-Q-Tel Invests in HyTrustLaunched by the CIA in 1999, IQT’s mission is to identify and partner with companies developing cutting-edge technologies that serve the national security interests of the United States. The firm goes beyond investing money alone, and actively engages with entrepreneurs, growth companies, researchers, and investors to deliver technologies that provide superior capabilities for the CIA and the larger Intelligence Community.

Organizations use HyTrust’s technology deploy cloud environments faster and securely virtualize workloads. The company helps organizations realize the benefits of a virtualized infrastructure while minimizing risk by ensuring that security policies are automated, applied correctly and enforced.

In October 2012, the company added a “secondary approval” feature to its HyTrust Appliance that enforces the “two-person rule”, made famous by the US Air Force’s general rule focusing on nuclear missile launches.

Nuclear Launch Controls

“According to US Air Force Instruction (AFI) 91-104, the two-person rule was designed to prevent the accidental or malicious launch of nuclear weapons by a single individual,” HyTrust President and Co-Founder, Eric Chiu explained previously. “Similarly, HyTrust’s Secondary Approval feature mandates designated approvers authorize high-impact operations prior to users with administration privileges being able to execute actions that can impact the business or even bring down the entire data center.”

“HyTrust can help deliver audit, enforcement, and policy controls to the administrative layer, including Secondary Approval to enforce the ‘two man rule’ on key transactions,” said Chiu.

“We’re privileged to join the In-Q-Tel portfolio and look forward to expanding our relationship with IQT and its government partners,” Chiu said.

“Our partnership with HyTrust will accelerate and enhance the company’s technology relating to the control, management and compliance of virtual datacenter environments,” said Robert Ames, Senior Vice President in charge of IQT’s Information and Communication Technologies Practice. “The assurance of critical infrastructure and data assets is paramount, and we believe that the HyTrust solution has the potential to greatly benefit our government customers.”

Advertisement. Scroll to continue reading.

Hytrust is also backed by investors including VMware, Granite Ventures, Cisco Systems, Trident Capital, and Epic Ventures.

Other notable investments made by In-Q-Tel in the security space include Silver Tail Systems (October, 2010), Oculis Labs (September 2011), FireEye (March 2009), Veracode (June 2008), and in November 2002 the firm reportedly invested $3 million in ArcSight, which was eventually acquired by HP for $1.5 billion.

In-Q-Tel has a track record of not disclosing the details of its investments and agreements, and the financial terms of the HyTrust deal were not disclosed.  

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...