Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

9/26/2013
01:36 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CloudPassage Extends Cloud Infrastructure Security To Large Enterprises

Halo Enterprise is a security-as-a-service solution built for large-scale, heterogeneous cloud infrastructure environments

San Francisco, Calif. -- September 26, 2013 – CloudPassage®, the leading cloud infrastructure security provider, today announced the availability of Halo Enterprise, a security-as-a-service solution built specifically for large-scale, heterogeneous cloud infrastructure environments.

Halo Enterprise extends CloudPassage's patented Halo cloud security platform to large enterprises with complex security and compliance requirements. Halo currently protects over 400 production cloud deployments and automates security for more than 10,000 new cloud instances monthly.

According to an August 2013 Forrester Research report "Security's Cloud Revolution Is Upon Us" by Ed Ferrara and Andras Cser, "2013 will turn out to be remembered as the year cloud disrupted the information security market. It's clear that cloud architectures (IaaS, PaaS, and SaaS) have already had significant disruptive effects on security technology and services... This means that security and risk pros need to develop hybrid security architectures to protect not only their on-premises infrastructure but cloud-based workloads as well."

"Large organizations have heterogeneous infrastructure environments, usually a dizzying mix of hardware, virtualized systems, and multiple cloud service providers. It's also the norm in large enterprises to have many thousands of systems across a complex maze of business units and subsidiaries," said Carson Sweet, CEO and co-founder, CloudPassage. "Legacy security tools and models were built for another time and are inflexible to the point of being breaking cloud models. Halo was built to be flexible, lightweight and incredibly easy to deploy and scale, regardless the environment. No other security technology provides the same level of visibility and protection at large scale, in real-time, and that keeps up with complex infrastructure models."

Unlike legacy security tools that were built for static environments and fixed perimeters that don't exist with cloud computing, Halo is the only massively scalable, portable security solution that can provide immediate visibility and control over any cloud infrastructure environment, including private cloud, virtualized data centers, public cloud, virtual private or managed clouds, and even bare-metal servers.

Within minutes of deployment, Halo's lightweight agents establish real-time streams of security data between every cloud instance and the Halo Grid, a cloud-based security analytics engine that continuously evaluates thousands of cloud security and compliance data points per instance. By moving security analytics overhead from protected cloud instances to the elastic cloud-powered Halo Grid, Halo automates defense-in-depth with almost zero impact on protected cloud infrastructure.

With Halo Enterprise, CloudPassage delivers the following capabilities designed for heterogeneous, large-scale enterprise cloud environments:

● Real-time, centrally managed automation of comprehensive security capabilities including configuration security monitoring, vulnerability assessment, integrity monitoring, firewall automation, access control and account management.

● Enhanced deployment, management and integration support for private cloud, software-defined and traditional data center infrastructure including VMware, Microsoft, and OpenStack among others.

● Seamless integration with advanced enterprise security and operations tools such as single sign-on gateways, security information event management (SIEM) systems, and systems management and orchestration systems.

● Hierarchical policy and control management allowing security organizations to centrally administer security and compliance for large numbers of applications distributed across complex, multi-cloud infrastructure environments.

Supporting Quotes

"Cloud computing is a cornerstone of Adobe's business strategy. We expect software-as-a-service to be a primary software delivery model across our product portfolio, making it critical to have a security solution that is purpose-built for and works across this highly agile and complex environment. Halo allows security teams to quickly attain visibility and control across cloud infrastructure environments."

Dave Lenoe, Director of Software Engineering, Adobe

"As organizations increasingly adopt cloud technologies, maintaining security efficacy and operational efficiency across heterogeneous cloud and data center environments is difficult if not impossible with traditional security tools. CloudPassage Halo, with its built-for-cloud design, can provide security and compliance across this complex heterogeneous enterprise infrastructure, and help companies pursue the benefits of cloud." - Jon Oltsik, Enterprise Strategy Group

"Within cloud and software-defined datacenter environments, it's easy to forget that you're creating, managing and cloning real systems, each with real vulnerabilities. Halo's extensive automation addresses that problem." - Wendy Nather, 451 Research

About CloudPassage

CloudPassage is the leading cloud infrastructure security provider and creator of Halo, the industry's only security and compliance platform purpose-built for elastic cloud environments. Halo operates seamlessly across public, private and hybrid clouds. Industry-leading companies trust Halo to protect their cloud and software-defined datacenter environments. Headquartered in San Francisco, CA, CloudPassage is backed by Benchmark Capital, Tenaya Capital, Shasta Ventures, and other leading investors. For more information, please visit http://www.cloudpassage.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.