13 min

How to Protect Critical Data within Your Cloud Infrastructure – Intel® Chip Chat episode 662 Intel Chip Chat

    • Technology

In this episode of Intel Chip Chat, Pat Conte, Senior VP of Global Business Development at HyTrust talks about the ever-evolving security landscape and the work they are doing to deliver a more secure cloud infrastructure. HyTrust is a cybersecurity company focused on locking down virtual infrastructure that support all cloud environments, and protecting the critical data within the cloud workloads. Security is a top priority for IT managers, and HyTrust partners with Intel to help secure the underlying infrastructure. Pat chats about BoundaryControl, a HyTrust solution that integrates Intel® Trusted Execution Technology (Intel TXT) and Intel® Trusted Platform Modules (Intel TPM) technologies to essentially put a boundary around a designated server or servers to help ensure that workload is only getting executed on the server that you designate it to. New capabilities and evolving landscape gives Intel and HyTrust the opportunity to enhance encryption and geo-fencing and adopt new Intel® Security Technologies, like the 2nd Generation Intel® Xeon Scalable Processors with Intel® Security Libraries for Data Centers (Intel® SecL–DC).
More Information:

HyTrust and Intel Ease Integration of Trusted Compute: https://www.hytrust.com/blog/hytrust-and-intel-ease-integration-of-trusted-compute/

Intel technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.

Intel, the Intel logo, and Xeon are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

*Other names and brands may be claimed as the property of others.

© Intel Corporation

In this episode of Intel Chip Chat, Pat Conte, Senior VP of Global Business Development at HyTrust talks about the ever-evolving security landscape and the work they are doing to deliver a more secure cloud infrastructure. HyTrust is a cybersecurity company focused on locking down virtual infrastructure that support all cloud environments, and protecting the critical data within the cloud workloads. Security is a top priority for IT managers, and HyTrust partners with Intel to help secure the underlying infrastructure. Pat chats about BoundaryControl, a HyTrust solution that integrates Intel® Trusted Execution Technology (Intel TXT) and Intel® Trusted Platform Modules (Intel TPM) technologies to essentially put a boundary around a designated server or servers to help ensure that workload is only getting executed on the server that you designate it to. New capabilities and evolving landscape gives Intel and HyTrust the opportunity to enhance encryption and geo-fencing and adopt new Intel® Security Technologies, like the 2nd Generation Intel® Xeon Scalable Processors with Intel® Security Libraries for Data Centers (Intel® SecL–DC).
More Information:

HyTrust and Intel Ease Integration of Trusted Compute: https://www.hytrust.com/blog/hytrust-and-intel-ease-integration-of-trusted-compute/

Intel technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.

Intel, the Intel logo, and Xeon are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

*Other names and brands may be claimed as the property of others.

© Intel Corporation

13 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
TED Radio Hour
NPR
Darknet Diaries
Jack Rhysider