{"id":8245,"date":"2013-07-15T17:56:00","date_gmt":"2013-07-15T17:56:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2736583"},"modified":"2013-07-15T17:56:00","modified_gmt":"2013-07-15T17:56:00","slug":"hytrust-buddies-up-with-cias-venture-arm","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/hytrust-buddies-up-with-cias-venture-arm\/","title":{"rendered":"HyTrust Buddies Up with CIA\u2019s Venture Arm"},"content":{"rendered":"<p>HyTrust, the cloud automation security company, has gotten a new funding and strategic pal in In-Q-Tel (IQT), the venture arm of the CIA and other American black ops.<br \/>\nHyTrust said the undisclosed investment, which is supposed to tickle its technology at scale, was a direct result of the need felt in the federal and intelligence sectors for greater controls and visibility over the management of virtualized data and cloud infrastructure.<br \/>\nVMware and Cisco are also invested in HyTrust for its greater controls, Role-Based Monitoring (RBM) and the so-called \u201ctwo-man rule.\u201d<br \/>\nHyTrust helps deliver audit, enforcement and policy controls to the administrative layer, including Secondary Approval to enforce the two-man rule on key transactions and delivers cloud control, visibility and operational readiness for mission-critical workloads run by Fortune 500s and other large organizations worldwide. <\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2736583\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HyTrust, the cloud automation security company, has gotten a new funding and strategic pal in In-Q-Tel (IQT), the venture arm of the CIA and other American black ops.<br \/>\nHyTrust said the undisclosed investment, which is supposed to tickle its technology at scale, was a direct result of the need felt in the federal and intelligence sectors for greater controls and visibility over the management of virtualized data and cloud infrastructure.<br \/>\nVMware and Cisco are also invested in HyTrust for its greater controls, Role-Based Monitoring (RBM) and the so-called &ldquo;two-man rule.&rdquo;<br \/>\nHyTrust helps deliver audit, enforcement and policy controls to the administrative layer, including Secondary Approval to enforce the two-man rule on key transactions and delivers cloud control, visibility and operational readiness for mission-critical workloads run by Fortune 500s and other large organizations worldwide. <\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2736583\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8245","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=8245"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8245\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=8245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=8245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=8245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}