+
+

Related Products

  • Wiz
    1,059 Ratings
    Visit Website
  • phoenixNAP
    6 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Orca Security
    407 Ratings
    Visit Website
  • MongoDB Atlas
    1,640 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • QuantaStor
    6 Ratings
    Visit Website
  • Google Cloud Platform
    60,419 Ratings
    Visit Website
  • ActiveBatch Workload Automation
    353 Ratings
    Visit Website
  • Device42
    172 Ratings
    Visit Website

About

In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads.

About

Juniper Cloud Workload Protection defends application workloads in any cloud or on-premises environment in and against advanced and zero-day exploits, automatically as they happen. It ensures that production applications always have a safety net against vulnerability exploits, keeping business-critical services connected and resilient. Provides real-time protection against attacks and safeguards the application from malicious actions without manual intervention, catching sophisticated attacks that endpoint detection (EDR) and web application firewall (WAF) solutions cannot. Continuously assesses vulnerabilities in applications and containers, detecting serious and critical exploit attempts as they happen. Provides rich, application-level security event generation and reporting, including application connectivity, topology, and detailed information about the attempted attack. Validates the execution of applications and detects attacks without using behavior or signatures.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises requiring a solution to automate security controls for software-defined computing, networking and storage workloads

Audience

Companies searching for a solution to secure their production applications

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

HyTrust
United States
www.hytrust.com

Company Information

Juniper Networks
Founded: 1996
United States
www.juniper.net/us/en/products/security/cloud-workload-protection.html

Alternatives

VaultCore

VaultCore

Fornetix

Alternatives

Aqua

Aqua

Aqua Security
Fidelis Halo

Fidelis Halo

Fidelis Security

Categories

Categories

Compliance Features

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Integrations

Cisco ACI
Dell EMC Avamar
Entrust Certificate Hub
Entrust Identity Enterprise
FortiADC
HP-UX
IBM Cloud
IBM Cloud Secure Virtualization
Ionic Machina
Juniper Mist AI
Microsoft 365
Microsoft Azure
NetApp Cloud Insights
Nexenta
Nutanix AHV
Pivot3
vSRX Virtual Firewall

Integrations

Cisco ACI
Dell EMC Avamar
Entrust Certificate Hub
Entrust Identity Enterprise
FortiADC
HP-UX
IBM Cloud
IBM Cloud Secure Virtualization
Ionic Machina
Juniper Mist AI
Microsoft 365
Microsoft Azure
NetApp Cloud Insights
Nexenta
Nutanix AHV
Pivot3
vSRX Virtual Firewall
Claim HyTrust and update features and information
Claim HyTrust and update features and information
Claim Juniper Cloud Workload Protection and update features and information
Claim Juniper Cloud Workload Protection and update features and information