Security News > 2021 > January > Entrust acquires HyTrust to offer identity, encryption and security policy control for cloud environments
By acquiring HyTrust, Entrust adds a critical management layer for encryption, cryptographic keys, and cloud security policy to its digital security solutions, serving the data protection and compliance needs of organizations accelerating their digital transformations.
"HyTrust solutions help enterprises manage, automate and scale security controls across computing environments. Now, customers can turn to Entrust as a single source for high-assurance data protection, identity and compliance solutions that allow enterprises to encrypt data and enforce security policy across virtualized, public and hybrid cloud environments."
HyTrust customers can accelerate cloud and virtualization cost savings while improving their security posture through real-time automation and security policy enforcement; adapting quickly to compliance requirements; and preventing unplanned outages.
"We are extremely pleased for HyTrust to join the Entrust team. Entrust is an established leader in data protection, identity and payment security solutions, with the crypto expertise and global reach to expand and support our solutions around the world," said, Eric Chiu, co-founder and President of HyTrust, who joins Entrust as part of the acquisition.
Entrust and HyTrust have partnered on joint solutions that combine Entrust nShield® hardware security modules with HyTrust DataControl and KeyControl cryptographic key management servers.
"Having expertise in data encryption, key management and cloud security policy under one roof delivers powerful benefits to our collective customers - improving their security posture and meeting compliance requirements while simplifying encryption and key management across environments," says Cindy Provin, Senior Vice President and General Manager, Identity and Data Protection, Entrust.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/N_Nhr7aIyLU/
Related news
- Cloud Access Security Broker Policy (source)
- Cloud Security Policy (source)
- Whitepaper: Reach higher in your career with cloud security (source)
- Transforming cloud security with real-time visibility (source)
- Top 5 Cloud Security Automations for SecOps Teams (source)
- Microsoft lost some customers’ cloud security logs (source)
- Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers (source)
- Apple Opens PCC Source Code for Researchers to Identify Bugs in Cloud AI Security (source)
- How AI Is Changing the Cloud Security and Risk Equation (source)