How to Protect Critical Data within Your Cloud Infrastructure – Intel Chip Chat – Episode 662

Image for FaceBook

Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
This post can be linked to directly with the following short URL:

The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other

The audio player code can be used without the image as follows:

This audio file can be linked to by copying the following URL:

Right/Ctrl-click to download the audio file.
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel Chip Chat - iTunes | Spotify | RSS Feed | Email

In this Intel Conversations in the Cloud audio podcast: In this episode of Intel Chip Chat, Pat Conte, Senior VP of Global Business Development at HyTrust talks about the ever-evolving security landscape and the work they are doing to deliver a more secure cloud infrastructure. HyTrust is a cybersecurity company focused on locking down virtual infrastructure that support all cloud environments, and protecting the critical data within the cloud workloads. Security is a top priority for IT managers, and HyTrust partners with Intel to help secure the underlying infrastructure. Pat chats about BoundaryControl, a HyTrust solution that integrates Intel Trusted Execution Technology (Intel TXT) and Intel Trusted Platform Modules (Intel TPM) technologies to essentially put a boundary around a designated server or servers to help ensure that workload is only getting executed on the server that you designate it to. New capabilities and evolving landscape gives Intel and HyTrust the opportunity to enhance encryption and geo-fencing and adopt new Intel Security Technologies, like the 2nd Generation Intel Xeon Scalable Processors with Intel Security Libraries for Data Centers (Intel SecL–DC).

HyTrust and Intel Ease Integration of Trusted Compute:

Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at:

Tags: , , , , , , , , , , ,
Posted in: Audio Podcast, Intel, Intel Chip Chat