Search company, investor...
HyTrust company logo


Founded Year



Acquired | Acquired

Total Raised


About HyTrust

HyTrust's mission is to make private, public, and hybrid cloud infrastructure more trustworthy for enterprises, service providers, and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking, and storage workloads to achieve the highest levels of visibility, granular policy control, and data protection. On January 14th, 2021, HyTrust was acquired by Entrust. The terms of the transaction were not disclosed.

Headquarters Location

1975 W. El Camino Real Suite 203

Mountain View, California, 94040,

United States


Missing: HyTrust's Product Demo & Case Studies

Promote your product offering to tech buyers.

Reach 1000s of buyers who use CB Insights to identify vendors, demo products, and make purchasing decisions.

Missing: HyTrust's Product & Differentiators

Don’t let your products get skipped. Buyers use our vendor rankings to shortlist companies and drive requests for proposals (RFPs).

Expert Collections containing HyTrust

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

HyTrust is included in 2 Expert Collections, including Regtech.



1,341 items

Technology that addresses regulatory challenges and facilitates the delivery of compliance requirements in FIs. Regulatory technology helps FIs and regulators address challenges ranging from traditional compliance and risk management to data reporting and transmission.



4,937 items

HyTrust Patents

HyTrust has filed 24 patents.

patents chart

Application Date

Grant Date


Related Topics




Cryptography, Computer network security, Computer security, Network protocols, Booting


Application Date


Grant Date



Related Topics

Cryptography, Computer network security, Computer security, Network protocols, Booting



Latest HyTrust News

Why Threat Detection Needs Zero-Trust Segmentation

Oct 13, 2021

Written by John Skinner October 13, 2021 John Skinner Over the last decade, cybersecurity has become infinitely more complex. Consequently, many organizations have turned to managed security services providers (MSSPs) to help protect them. Up until now, their focus has been almost entirely on threat detection and response , but that decision has had some negative, unintended consequences. For most organizations – commercial, nonprofit or public sector – cybersecurity isn’t a core competency. That’s why many have outsourced some or all of it to an MSSP . And that outsourcing doesn’t just include security operations; it’s often the entire cybersecurity function, including purchasing and strategic planning. When the client of an MSSP has a high-profile security breach, like a widespread ransomware attack, the ensuing conversations aren’t pleasant. The entire reason a company outsources its security function to an MSSP is to avoid those outcomes and their attendant publicity, cost and damage to the brand. AI: Panacea, or a Tool that Needs Assistance? Many vendors have convinced organizations that the answer to their prayers is AI-based threat detection. They’ve been led to believe that if they just spend enough money on AI, they’ll catch those ultra-sneaky attackers. They’ve gone down an AI-based detection rabbit hole, but the results they were expecting haven’t materialized. They haven’t happened. While I agree that AI-based threat detection is a major step forward for our industry, it needs some assistance to get the job done. Enter zero-trust segmentation . If you presegment the network before you go threat hunting, the task of detection – be it AI-assisted or not – becomes much simpler and faster. You reduce the size of the attack surface where you need to look for threats. Pre-emptive segmentation eliminates many of the pathways that would otherwise enable attackers to move laterally across the internal network. The metaphor I use is rather than looking for one needle in one big, complex haystack, you create lots of micro haystacks. Then your tools can look inside these micro haystacks in parallel, so you’re likely to find that needle much sooner. What a Ship Can Teach Us About Segmentation Years ago, in my first active duty assignment as a U.S. Navy midshipman, I boarded the USS McCloy, whose primary mission was to hunt, detect and deter enemy submarines off the U.S. coastline. I had just finished my first year of college as an electrical engineering major and was training to become an officer in the U.S. Navy. I couldn’t wait to learn about the Navy’s sophisticated enemy submarine detection technology and meet members of the McCloy’s elite threat-detection team. So, imagine my surprise on the first day when I was handed some wrenches and screwdrivers, paired with a fellow crew member, and assigned the task of ensuring all 30 or so steel “hatches” (aka doors) on the McCloy were ship-shape. And if they weren’t, to make any repairs. So much for helping my shipmates hunt down malicious adversaries! As I went about my mission, I thought about the phrase “batten down the hatches.” It originated in the 19th century when, at the onset of a major storm or other risk of water breach, ship captains would order their crew to close all doors on the ship and barricade those doors with wooden rods or “battens.” Today, this phrase is a metaphor for the wisdom of taking immediate and decisive action at the onset of any major risk. I came to appreciate that all the McCloy’s elite tech and threat-hunting experts would be at risk of failing their mission if the McCloy’s hatches weren’t there to protect them. Thanks to the McCloy’s built-in segmentation architecture and well-functioning hatches, a hull breach would not escalate into lateral spread of water from hallway-to-hallway, and from room-to-room, sinking the ship. The Cyber Equivalent of Battening Down the Hatches In the 1990 movie “The Hunt for Red October,” the Red October was a Russian submarine with the most advanced detection avoidance technology. In today’s cyber equivalent, we’re not hunting for elusive submarines, but for increasingly stealthy and sophisticated cyber-adversaries in electronic networks . Cyber threat hunters must segment their networks with electronic “hatches” to prevent the lateral movement of intrusions. If you have a breach in your network, you don’t want malware or ransomware to spread, which is why you must divide the network into individual compartments that function as barriers. Segmentation is a security tool, in addition to managed detection and response (MDR) that MSSPs can offer as a service — zero trust segmentation as a service. In my next blog, I’ll further explain why segmentation (and, more specifically, host-based segmentation) is a perfect complement to robust managed detection and response. It’s not only good for MSSP clients, but good for the MSSP as well. John Skinner is vice president of business development at Illumio , a pioneer of zero-trust segmentation. Previously, he was VP of global business development and APAC sales at Shape Security, helping to drive the growth that culminated in the company’s acquisition by F5 Networks, served as the VP of business development at HyTrust and led several technology integration teams at Intel. He holds an MBA from Rutgers, a certificate in AI from DeepLearning, and a bachelor’s degree in electrical/computer engineering from Cornell, where he is a guest lecturer on technology monetization. You may follow him on LinkedIn or @illumio on Twitter.

HyTrust Frequently Asked Questions (FAQ)

  • When was HyTrust founded?

    HyTrust was founded in 2007.

  • Where is HyTrust's headquarters?

    HyTrust's headquarters is located at 1975 W. El Camino Real, Mountain View.

  • What is HyTrust's latest funding round?

    HyTrust's latest funding round is Acquired.

  • How much did HyTrust raise?

    HyTrust raised a total of $105M.

  • Who are the investors of HyTrust?

    Investors of HyTrust include Entrust, Paycheck Protection Program, Trident Capital, Epic Ventures, Cisco Investments and 12 more.

  • Who are HyTrust's competitors?

    Competitors of HyTrust include Illumio and 3 more.

Compare HyTrust to Competitors

Illumio Logo

Illumio specializes in micro-segmentation and the prevention of cyber threats inside data centers and cloud environments. It offers zero trust segmentation (ZTS) platform that offers breach containment solutions. It serves industries such as energy, healthcare, banking and financial services, and more. The company was founded in 2013 and is based in Sunnyvale, California.

Netskope Logo

Netskope provides global cybersecurity by redefining cloud, data, and network security to help organizations. The company offers transformation solutions, security modernization solutions, framework solutions, and industry solutions. It was founded in 2012 and is based in Santa Clara, California.

Lookout Logo

Lookout is a cybersecurity company on a mission to secure and empower productivity in a privacy-focused world. The company delivers an integrated endpoint-to-cloud security platform that secures data for the world’s leading enterprises and ensures they comply with regulations while respecting the privacy of their team who work anywhere. The company was founded in 2007 and is based in San Francisco, California.

Airgap Logo

Airgap develops a zero-trust isolation platform to assure threat propagation protection. Its platform helps in implementing zero-trust micro-segmentation solutions without the need for agents, application programming interfaces (APIs), and upgrades. The company was founded in 2019 and is based in San Jose, California.

Zero Networks Logo
Zero Networks

Zero Networks delivers cloud-based network security and automates the development and enforcement of network access rules throughout an entire network. It enables the creation of a hermetically-sealed corporate network of attackers. The company was founded in 2019 and is based in Tel Aviv, Israel.

vArmour Network

vArmour provides API-related cloud security solutions that help protect data and applications across public and private cloud environments, especially for organizations in heavily regulated industries. The company was founded in 2011 and is based in Los Altos, California.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.