HyTrust company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

hytrust.com

Founded Year

2007

Stage

Acquired | Acquired

Total Raised

$105M

About HyTrust

HyTrust's mission is to make private, public, and hybrid cloud infrastructure more trustworthy for enterprises, service providers, and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking, and storage workloads to achieve the highest levels of visibility, granular policy control, and data protection.On January 14th, 2021, HyTrust was acquired by Entrust. The terms of the transaction were not disclosed.

HyTrust Headquarter Location

1975 W. El Camino Real Suite 203

Mountain View, California, 94040,

United States

844-681-8100

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Research containing HyTrust

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned HyTrust in 1 CB Insights research brief, most recently on Mar 26, 2020.

Expert Collections containing HyTrust

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

HyTrust is included in 2 Expert Collections, including Regtech.

R

Regtech

1,341 items

Technology that addresses regulatory challenges and facilitates the delivery of compliance requirements in FIs. Regulatory technology helps FIs and regulators address challenges ranging from traditional compliance and risk management to data reporting and transmission.

C

Cybersecurity

4,902 items

HyTrust Patents

HyTrust has filed 24 patents.

The 3 most popular patent topics include:

  • Computer network security
  • Booting
  • Computer security
patents chart

Application Date

Grant Date

Title

Related Topics

Status

9/21/2017

7/20/2021

Cryptography, Computer network security, Computer security, Network protocols, Booting

Grant

Application Date

9/21/2017

Grant Date

7/20/2021

Title

Related Topics

Cryptography, Computer network security, Computer security, Network protocols, Booting

Status

Grant

Latest HyTrust News

Why Threat Detection Needs Zero-Trust Segmentation

Oct 13, 2021

Written by John Skinner October 13, 2021 John Skinner Over the last decade, cybersecurity has become infinitely more complex. Consequently, many organizations have turned to managed security services providers (MSSPs) to help protect them. Up until now, their focus has been almost entirely on threat detection and response , but that decision has had some negative, unintended consequences. For most organizations – commercial, nonprofit or public sector – cybersecurity isn’t a core competency. That’s why many have outsourced some or all of it to an MSSP . And that outsourcing doesn’t just include security operations; it’s often the entire cybersecurity function, including purchasing and strategic planning. When the client of an MSSP has a high-profile security breach, like a widespread ransomware attack, the ensuing conversations aren’t pleasant. The entire reason a company outsources its security function to an MSSP is to avoid those outcomes and their attendant publicity, cost and damage to the brand. AI: Panacea, or a Tool that Needs Assistance? Many vendors have convinced organizations that the answer to their prayers is AI-based threat detection. They’ve been led to believe that if they just spend enough money on AI, they’ll catch those ultra-sneaky attackers. They’ve gone down an AI-based detection rabbit hole, but the results they were expecting haven’t materialized. They haven’t happened. While I agree that AI-based threat detection is a major step forward for our industry, it needs some assistance to get the job done. Enter zero-trust segmentation . If you presegment the network before you go threat hunting, the task of detection – be it AI-assisted or not – becomes much simpler and faster. You reduce the size of the attack surface where you need to look for threats. Pre-emptive segmentation eliminates many of the pathways that would otherwise enable attackers to move laterally across the internal network. The metaphor I use is rather than looking for one needle in one big, complex haystack, you create lots of micro haystacks. Then your tools can look inside these micro haystacks in parallel, so you’re likely to find that needle much sooner. What a Ship Can Teach Us About Segmentation Years ago, in my first active duty assignment as a U.S. Navy midshipman, I boarded the USS McCloy, whose primary mission was to hunt, detect and deter enemy submarines off the U.S. coastline. I had just finished my first year of college as an electrical engineering major and was training to become an officer in the U.S. Navy. I couldn’t wait to learn about the Navy’s sophisticated enemy submarine detection technology and meet members of the McCloy’s elite threat-detection team. So, imagine my surprise on the first day when I was handed some wrenches and screwdrivers, paired with a fellow crew member, and assigned the task of ensuring all 30 or so steel “hatches” (aka doors) on the McCloy were ship-shape. And if they weren’t, to make any repairs. So much for helping my shipmates hunt down malicious adversaries! As I went about my mission, I thought about the phrase “batten down the hatches.” It originated in the 19th century when, at the onset of a major storm or other risk of water breach, ship captains would order their crew to close all doors on the ship and barricade those doors with wooden rods or “battens.” Today, this phrase is a metaphor for the wisdom of taking immediate and decisive action at the onset of any major risk. I came to appreciate that all the McCloy’s elite tech and threat-hunting experts would be at risk of failing their mission if the McCloy’s hatches weren’t there to protect them. Thanks to the McCloy’s built-in segmentation architecture and well-functioning hatches, a hull breach would not escalate into lateral spread of water from hallway-to-hallway, and from room-to-room, sinking the ship. The Cyber Equivalent of Battening Down the Hatches In the 1990 movie “The Hunt for Red October,” the Red October was a Russian submarine with the most advanced detection avoidance technology. In today’s cyber equivalent, we’re not hunting for elusive submarines, but for increasingly stealthy and sophisticated cyber-adversaries in electronic networks . Cyber threat hunters must segment their networks with electronic “hatches” to prevent the lateral movement of intrusions. If you have a breach in your network, you don’t want malware or ransomware to spread, which is why you must divide the network into individual compartments that function as barriers. Segmentation is a security tool, in addition to managed detection and response (MDR) that MSSPs can offer as a service — zero trust segmentation as a service. In my next blog, I’ll further explain why segmentation (and, more specifically, host-based segmentation) is a perfect complement to robust managed detection and response. It’s not only good for MSSP clients, but good for the MSSP as well. John Skinner is vice president of business development at Illumio , a pioneer of zero-trust segmentation. Previously, he was VP of global business development and APAC sales at Shape Security, helping to drive the growth that culminated in the company’s acquisition by F5 Networks, served as the VP of business development at HyTrust and led several technology integration teams at Intel. He holds an MBA from Rutgers, a certificate in AI from DeepLearning, and a bachelor’s degree in electrical/computer engineering from Cornell, where he is a guest lecturer on technology monetization. You may follow him on LinkedIn or @illumio on Twitter.

  • When was HyTrust founded?

    HyTrust was founded in 2007.

  • Where is HyTrust's headquarters?

    HyTrust's headquarters is located at 1975 W. El Camino Real, Mountain View.

  • What is HyTrust's latest funding round?

    HyTrust's latest funding round is Acquired.

  • How much did HyTrust raise?

    HyTrust raised a total of $105M.

  • Who are the investors of HyTrust?

    Investors of HyTrust include Blue Equity.

  • Who are HyTrust's competitors?

    Competitors of HyTrust include Bitglass and 3 more.

You May Also Like

Illumio Logo
Illumio

Illumio specializes in micro-segmentation and the prevention of cyber threats inside data centers and cloud environments. Illumio's Adaptive Security Platform™ uniquely protects critical information with real-time application dependency mapping and micro-segmentation that works in any data center, public cloud, or across hybrid deployments on bare-metal, virtualization, and containers.

Authentic8 Logo
Authentic8

Authentic8 provides a Silo Web Isolation Platform to solve web issues of security, anonymity and compliance.

Ericom Software Logo
Ericom Software

Ericom Software provides businesses with secure access to the web and corporate applications, in the cloud and on-premises, from any device or location. Ericom's solutions ensure that devices and applications are protected from cybersecurity threats, and users can connect to only the specific resources they are authorized to access.

Lookout Logo
Lookout

Lookout is a cybersecurity company on a mission to secure and empower productivity in a privacy-focused world. The company delivers an integrated endpoint-to-cloud security platform that secures data for the world’s leading enterprises and ensures they comply with regulations while respecting the privacy of their team who work anywhere. The company was founded in 2007 and is based in San Francisco, California.

Tanium Logo
Tanium

Tanium gives enterprises and government organizations the ability to secure, control, and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of endpoints across the enterprise, retrieve data on their current and historical state, and execute change as necessary.

v
vArmour Network

vArmour is an API-driven cloud security company that provides a security solution to protect data and applications across public and private cloud environments, especially for organizations in heavily regulated industries.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.