Analytics
11/2/2011
11:48 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

RackSpace And StillSecure Partner To Offer Cloud Security

Rackspace joins a growing list of hosting and cloud providers offering Cloud SMS

StillSecure', a managed network security solutions and certified compliance company, today announced that it has joined the Rackspace' (NYSE: RAX) Cloud Tools Program. The relationship with Rackspace provides easy access to StillSecure’s Cloud Security Monitoring Service (Cloud SMS) for Rackspace Cloud customers free of charge. Details on the Cloud SMS solution can be obtained by visiting the Rackspace Cloud Tools site.

StillSecure’s Cloud SMS is a new cloud instance-based security solution. The first iteration of Cloud SMS encompasses firewall management functionality. It is ideal for cloud and dedicated server customers looking to quickly and easily secure their environments without requiring security expertise.

Cloud SMS places a small agent on the Linux-based virtual instance or dedicated server and provides an easy-to-use Web-based UI that allows users to search for the right ports and protocols to block or allow. Further, users can track statistics and utilization via the embedded reports.

Cloud SMS’ firewall management functionality is the first release in a series of cloud security solutions to be delivered by StillSecure.

As part of today’s announcement, StillSecure is also proud to announce that it will be featured under the Rackspace “Cloud Tools Program” partner site. This relationship is designed to offer added value to Rackspace customers who desire to increase cloud security by identifying a trusted industry leader that supports their current cloud environment.

“Rackspace customers are leveraging the cloud for a wide range of mission critical applications. The Rackspace Cloud Tools program is a catalyst for organizations to fully utilize the cloud,” said Ven Shanmugam, Senior Manager, Strategy and Corporate Development at Rackspace. “StillSecure’s Cloud SMS is an exciting product because it is designed to provide a critical layer of security for cloud environments.”

“The Cloud is too powerful of a concept not to be utilized by corporations; however, security is the number one impediment for more widespread cloud adoption,” said James Brown, Chief Technology Officer of StillSecure. “Smart IaaS providers like Rackspace are taking the lead to address this issue up-front by enabling and encouraging their customers to secure their cloud environments. This relationship further validates the need for a solution like Cloud SMS and we look forward to collaborating with Rackspace to help their customers make a safe and seamless transition to the cloud.”

Rackspace joins a growing list of hosting and cloud providers offering Cloud SMS to their customers. Additional StillSecure partners that have made Cloud SMS available to their customers include SoftLayer Technologies, Host.net, Peak 10 and ViaWest.

Cloud SMS was launched September 26, 2011 at the Hosting and Cloud Transformation Summit. StillSecure also offers a suite of managed security services, which includes intrusion detection and prevention, Web application firewall, log management, and over a dozen others that protect customers from a variety of security threats while helping address regulatory compliance. StillSecure’s managed security service solutions are available as physical, virtual, or cloud implementations. Cloud SMS is available immediately through Rackspace at https://cloud.rackspace.stillsecure.com/sign_up.php.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web