Cloud Security and Encryption
BoundaryControl
Set policies for virtualized applications to ensure they can only run on trusted hosts within defined parameters.
Create trust between apps and infrastructure
The cloud brings huge advantages in terms of agility and cost. Workloads are now extremely dynamic. They are easily copied and moved, with little control over where they physically reside.
Entrust BoundaryControl mitigates the risks of the advancing data center transformation. Now, you can tightly define and enforce where workloads are allowed to run. Using software- and hardware-based tags such as Intel TXT, BoundaryControl automates policy enforcement by applying parameters such as:
- Geography: Organizations can specify location control by country, state, county or province. This is an ideal configuration for organizations that need to satisfy regulations to keep data within physical borders, such as the case with GDPR.
- Security Level: Many organizations segment data (and datacenters) based upon risk classifications or levels of confidentiality. For example, security levels allow IT to ensure PCI data only runs on virtual infrastructure classified for PCI, thereby reducing PCI audit scope, or in the case of the government, that data for missions is kept physically separated.
- Resource Level: Availability levels let IT classify and automatically validate that hardware meets the appropriate availability requirements for a given workload. This ensures, for example, that mission-critical applications cannot accidentally be moved to hosts that do not have a specific capacity.
BoundaryControl allows you to tightly define where workloads are allowed to run.