Analytics
2/1/2012
05:01 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

CloudPassage Launches Network Security In The Cloud Inbox

Halo NetSec aimed at companies running servers in public clouds like EC2 and Rackspace

SAN FRANCISCO – Feb. 1, 2012 – CloudPassage, the leading cloud server security company, today unveils HaloNetSec, an automated solution that provides advanced network access control for servers running in public clouds including Rackspace and Amazon EC2. Halo NetSec is specifically designed for multi-cloud environments, installs in less than five minutes and provides administrators with easy-to-manage perimeter controls. “Cloud computing has ushered in a new set of security risks and challenges that are not addressed at the IaaS level, and traditional firewall defenses do not adequately translate into the cloud,” said Andrew Hay, senior security analyst for 451 Research. “A host-based server security solution designed specifically for cloud environments picks up where the IaaS leaves off, providing organizations with the scalable security they need to consider when migrating traditional on-premise systems to the cloud.” Companies running servers in the public cloud demand a simple network security solution to close the gap between security/compliance requirements and the limited network security features included by cloud providers. A recent CloudPassage survey of IT managers revealed the lack of perimeter defenses in the public cloud is a critical issue, with 45 percent indicating it’s their top cloud security concern. Halo NetSec was purpose-built to address these concerns with centralized host–based firewall management, dynamic two-factor authentication, and a powerful REST API for sophisticated automation. “Given the fluctuating nature of on-demand computing, we’re finding cloud adopters are challenged to find effective ways to secure their servers,” said Rand Wacker, vice president of product management for CloudPassage. “With Halo NetSec, you don’t have to be a security expert to achieve strong network protection for your cloud infrastructure. We’ve packaged the most important network security features into an easy-to-manage and instantly usable SaaS solution, making strong perimeter security dynamic cloud servers a snap.” Halo NetSec is a premium Halo package that offers cloud-ready firewall protection for an unlimited number of servers and includes GhostPorts, a feature that secures remote network access through multi-factor authentication. Users also benefit from access to a powerful REST API for simple integration with other systems and professional support. The Halo NetSec package is part of CloudPassage Halo, the award-winning cloud security platform purpose-built to bridge the gap between traditional data center security and protection of dynamic cloud environments. It addresses cloud security needs through firewall automation, vulnerability management, security, server account management and intrusion detection. Delivered as Software-as-a-Service (SaaS), Halo requires no hardware, complex deployment or special expertise.

Pricing and Availability Halo NetSec is now available on a utility basis at the rate of 3.5 cents per server-hour. Volume discounts are automatically applied as usage increases, and additional discounts are available with monthly minimum usage commitments. To sign up for Halo NetSec, visit http://www.cloudpassage.com/netsec/

About CloudPassage CloudPassage is the leading cloud server security provider, and creator of Halo™, the industry's first and only security and compliance platform, purpose-built for elastic cloud environments. Halo supports cloud server bursting, cloning, and migration and operates across public, private, and hybrid cloud environments. Industry-leading companies like Foursquare, StrongMail and ExoIS trust Halo to seamlessly manage their server security configuration, host-based firewalls, intrusion detection, and server account auditing from one system. Headquartered in San Francisco, Calif., CloudPassage is backed by Benchmark Capital. Among many other awards, Gartner, Inc. named CloudPassage one of four "Cool Vendors in Cloud Security Services, 2011." For more information, please visit: http://www.CloudPassage.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web