Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Networking
    • Storage
    • Virtualization

    HyTrust Adds ‘Secondary Approval’ Security to Protect Virtual Environments

    Written by

    Robert J. Mullins
    Published August 29, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      HyTrust, which delivers policy management and access control technology to virtual environments, has added a new feature to its new HyTrust Appliance 3.0 that requires two people to approve certain tasks to protect against accidental or malicious actions that could harm the virtual environment.

      Called “Secondary Approval,” the feature automatically stops certain potentially high-risk actions and tells the user that they need a second person to approve the action, said Eric Chiu, president and founder of HyTrust, who unveiled the new technology at VMworld 2012, which is winding up in San Francisco.

      Chiu compared Secondary Approval to the fail-safe systems used in U.S. nuclear missile silos or Air Force bombers. It requires two people to each turn a key at the same time to launch the missile or drop the bombs. The keys are far enough apart so that no one person can turn both keys at once.

      Secondary approval would be activated if a user sought such actions as to delete a virtual machine, turn off the Microsoft Windows Exchange server in the middle of a workday, or copy or remove from the network sensitive files, such as a database of customer credit card numbers.

      Like the pop-up message that asks “Are You Sure?” in many computer programs, the message in this situation would read, “Permission denied. Secondary Approval required.” The system then sends an email to staff people empowered to approve or deny a request.

      “With Secondary Approval, we have now built workflow-based approvals for those sensitive operations,” Chiu said. “It says you may want a second set of eyes on that before it’s allowed to happen.”

      The person asked to approve the task would likely ask more questions of the requestor to determine whether to approve it or not. It may be that the user wants to delete a virtual machine because it’s a duplicate, which would be okay. Or the attempt would have been inadvertent because the user hit the wrong combination of keys or clicked on the wrong button.

      “Every admin I’ve talked to has a story about how they fat-fingered some production resource at some time. And there’s no ‘Undo’ button,” said Chiu.

      But Secondary Approval could also prevent a malicious action like the one that occurred at Shoinogi Pharmaceuticals in 2011. There, a disgruntled fired employee gained access to the network of the U.S. subsidiary of the Japanese drug company from a WiFi hotspot at a McDonald’s restaurant 100 miles away from the New Jersey data center, Chiu said.

      He snuck in through a back door opening in the network and deleted all the company’s production virtual machines (VMs) and all their VMware ESX host hypervisors. The network was down for a week while IT staff rebuilt the entire virtual infrastructure, he said.

      “It was equivalent to burning down the data center. And he did it in under five minutes,” Chiu said.

      The perpetrator, Jason Cornish, was arrested by the FBI and pleaded guilty to federal charges of computer intrusion.

      HyTrust is now making its 3.0 appliance available on VMware’s vSphere 5.1 virtualization operating system, which was introduced at VMworld 2012. It has also been certified as “Vblock Ready” for the Vblock Systems virtual infrastructure platform from VCE, which is a joint venture between VMware, Cisco Systems and EMC.

      Robert J. Mullins
      Robert J. Mullins
      Robert Mullins is a writer for eWEEK who has covered the technology industry in Silicon Valley for more than a decade. He has written for several tech publications including Network Computing, Information Week, Network World and various TechTarget titles. Mullins also served as a correspondent in the San Francisco Bureau of IDG News Service and, before that, covered technology news for the Silicon Valley/San Jose Business Journal. Back in his home state of Wisconsin, Robert worked as the news director for NPR stations in Milwaukee and LaCrosse in the 1980s.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.