Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

9/26/2013
01:36 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CloudPassage Extends Cloud Infrastructure Security To Large Enterprises

Halo Enterprise is a security-as-a-service solution built for large-scale, heterogeneous cloud infrastructure environments

San Francisco, Calif. -- September 26, 2013 – CloudPassage®, the leading cloud infrastructure security provider, today announced the availability of Halo Enterprise, a security-as-a-service solution built specifically for large-scale, heterogeneous cloud infrastructure environments.

Halo Enterprise extends CloudPassage's patented Halo cloud security platform to large enterprises with complex security and compliance requirements. Halo currently protects over 400 production cloud deployments and automates security for more than 10,000 new cloud instances monthly.

According to an August 2013 Forrester Research report "Security's Cloud Revolution Is Upon Us" by Ed Ferrara and Andras Cser, "2013 will turn out to be remembered as the year cloud disrupted the information security market. It's clear that cloud architectures (IaaS, PaaS, and SaaS) have already had significant disruptive effects on security technology and services... This means that security and risk pros need to develop hybrid security architectures to protect not only their on-premises infrastructure but cloud-based workloads as well."

"Large organizations have heterogeneous infrastructure environments, usually a dizzying mix of hardware, virtualized systems, and multiple cloud service providers. It's also the norm in large enterprises to have many thousands of systems across a complex maze of business units and subsidiaries," said Carson Sweet, CEO and co-founder, CloudPassage. "Legacy security tools and models were built for another time and are inflexible to the point of being breaking cloud models. Halo was built to be flexible, lightweight and incredibly easy to deploy and scale, regardless the environment. No other security technology provides the same level of visibility and protection at large scale, in real-time, and that keeps up with complex infrastructure models."

Unlike legacy security tools that were built for static environments and fixed perimeters that don't exist with cloud computing, Halo is the only massively scalable, portable security solution that can provide immediate visibility and control over any cloud infrastructure environment, including private cloud, virtualized data centers, public cloud, virtual private or managed clouds, and even bare-metal servers.

Within minutes of deployment, Halo's lightweight agents establish real-time streams of security data between every cloud instance and the Halo Grid, a cloud-based security analytics engine that continuously evaluates thousands of cloud security and compliance data points per instance. By moving security analytics overhead from protected cloud instances to the elastic cloud-powered Halo Grid, Halo automates defense-in-depth with almost zero impact on protected cloud infrastructure.

With Halo Enterprise, CloudPassage delivers the following capabilities designed for heterogeneous, large-scale enterprise cloud environments:

● Real-time, centrally managed automation of comprehensive security capabilities including configuration security monitoring, vulnerability assessment, integrity monitoring, firewall automation, access control and account management.

● Enhanced deployment, management and integration support for private cloud, software-defined and traditional data center infrastructure including VMware, Microsoft, and OpenStack among others.

● Seamless integration with advanced enterprise security and operations tools such as single sign-on gateways, security information event management (SIEM) systems, and systems management and orchestration systems.

● Hierarchical policy and control management allowing security organizations to centrally administer security and compliance for large numbers of applications distributed across complex, multi-cloud infrastructure environments.

Supporting Quotes

"Cloud computing is a cornerstone of Adobe's business strategy. We expect software-as-a-service to be a primary software delivery model across our product portfolio, making it critical to have a security solution that is purpose-built for and works across this highly agile and complex environment. Halo allows security teams to quickly attain visibility and control across cloud infrastructure environments."

Dave Lenoe, Director of Software Engineering, Adobe

"As organizations increasingly adopt cloud technologies, maintaining security efficacy and operational efficiency across heterogeneous cloud and data center environments is difficult if not impossible with traditional security tools. CloudPassage Halo, with its built-for-cloud design, can provide security and compliance across this complex heterogeneous enterprise infrastructure, and help companies pursue the benefits of cloud." - Jon Oltsik, Enterprise Strategy Group

"Within cloud and software-defined datacenter environments, it's easy to forget that you're creating, managing and cloning real systems, each with real vulnerabilities. Halo's extensive automation addresses that problem." - Wendy Nather, 451 Research

About CloudPassage

CloudPassage is the leading cloud infrastructure security provider and creator of Halo, the industry's only security and compliance platform purpose-built for elastic cloud environments. Halo operates seamlessly across public, private and hybrid clouds. Industry-leading companies trust Halo to protect their cloud and software-defined datacenter environments. Headquartered in San Francisco, CA, CloudPassage is backed by Benchmark Capital, Tenaya Capital, Shasta Ventures, and other leading investors. For more information, please visit http://www.cloudpassage.com

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Windows 10 Migration: Getting It Right
Kevin Alexandra, Principal Solutions Engineer at BeyondTrust,  5/15/2019
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/14/2019
When Older Windows Systems Won't Die
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12184
PUBLISHED: 2019-05-19
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
CVE-2019-12173
PUBLISHED: 2019-05-18
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
CVE-2019-12172
PUBLISHED: 2019-05-17
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
CVE-2019-12168
PUBLISHED: 2019-05-17
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
CVE-2019-12170
PUBLISHED: 2019-05-17
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PH...