Data Sovereignty with Intel TXT and HyTrust – Conversations in the Cloud – Episode 105

Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
The audio player code can be used without the image as follows:


 
This audio file can be linked to by copying the following URL:


 
Download the audio file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel Chip Chat - iTunes | Spotify | RSS Feed | Email
Intel Conversations in the Cloud - iTunes | Spotify | RSS Feed | Email
 

In this Intel Conversations in the Cloud audio podcast: In this episode of Conversations in the Cloud we are joined by John Skinner, Senior Vice President of Business Development at HyTrust, to discuss security, regulations, and the work that both Intel and HyTrust are doing to make the cloud as secure as possible. John discusses a solution that HyTrust and Intel worked closely on to create called BoundaryControl. BoundaryConrol for VMs uses Intel Trusted Execution Technology (Intel TXT) and runs on Intel Xeon Processors, to secure the most important elements in virtualized datacenters and cloud applications, allowing you to meet data sovereignty, data security, and hardware specification requirements.?

To learn more about HyTrust and data sovereignty go to:
hytrust.com/solutions/data-sovereignty

Follow HyTrust on Twitter at:
twitter.com/HyTrust

Tags: , , , , , , , , , , ,
 
Posted in: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Intel Conversations in the Cloud
 


 


Learn more with Intel IT’s expert on IT Cloud Computing, Das Kamhout on:
Intel.com, LinkedIn, Google+, or follow him on Twitter.