Thank you everyone who joined and registered for the HyTrust and Intel webinar. Hosted by Roy Chua of SDxCentral, and presented by Ashwin Krishnan Senior Vice President of Product Management at HyTrust and Ravi Varasani General Manager of Cloud Security Solutions at Intel Corporation, this special event shone a light on the five key questions one must ask while on the path to a secure and compliant SDDC.
Such questions cover the scope of essential functions and activities like; control, platform readiness, audit and cloud readiness.
During this event, presenters took us through a journey describing how we can monitor updates and changes to the virtualized network and expand your SDDC to the public cloud. At the end of the presentation, the presenters took questions from the audience which results in the below HyTrust Intel Compliant SDDC Webinar Q&A. Please take a look and we’ll see you soon in the SDx community!
How can I make sure that data that I am holding does not leave a national boundary, it seems difficult to guarantee that this doesn’t occur in order to meet a regulatory mandate?
HyTrust: In order to meet data sovereignty requirements, it is often required to enforce polices that will prevent accessing or viewing data by users outside of a national boundary. HyTrust can help meet data sovereignty requirements with its BoundaryControl solution that allows organizations to develop a data encryption and access policy and enforce these policies by tying them to the underlying hardware platform using Intel TXT and TPM technologies. This allows geofencing of data access to meet mandates for data access and encryption. For more information click here.
What platforms does HyTrust DataControl support?
HyTrust: HyTrust DataControl has broad platform support and works on private, public, or hybrid cloud workloads (VCA, VCE, AWS, etc.) and works on SDDC, NSX and other platforms with encryption capability independent of chosen hypervisor.
Can I define a policy based on the kind of workload and have it enforced for all instances of that type of workload?
HyTrust: Yes, you may use software tags that are attached to a workload and have defined policies that apply for that type of workload. All instances of a workload with the same tagging can have policy applied.
Click below for the full event recording and all assets from the HyTrust and Intel Compliant SDDC Webinar