Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:25 PM
Dark Reading
Dark Reading
Products and Releases

CloudSigma Adds Advanced Network Policy Management

New feature lets customers create, manage, and apply enterprise-grade networking policies in relation to their cloud infrastructure

Zurich, Switzerland – November 21, 2013 – CloudSigma, a public cloud IaaS provider with advanced hybrid hosting solutions, today announced the general availability of advanced network policy management across all its cloud locations. With this new feature, customers can create, manage and apply enterprise-grade networking policies in relation to their cloud infrastructure in a fully integrated way. By removing complexity and stressing usability, CloudSigma's new networking policy features enable customers to enhance their security, while also saving time.

"We take security very seriously, and so do our customers," said Robert Jenkins, CEO of CloudSigma. "We've received many requests from our customers about offering this enterprise-grade firewalling. We listened and delivered. We didn't want to deliver a half-baked product. By allowing customers to create policies independent of servers, multiple requirements can easily be maintained, adjusted and reapplied over time."

With CloudSigma's new network policies, customers are able to configure and constrain both inbound and outbound traffic while defining these policies in a simple fashion within the Web interface or directly over the API. The policies range from a single rule that blocks all external public IP traffic, to complex schemes that only allow connections to certain ports from a set of IPs. Network policies are saved and then applied to one or more virtual servers as required. Furthermore, network policies can be reconfigured and reapplied to running servers without service disruption. CloudSigma understands that convenience drives usage and real security requires convenient, easy-to-use security features; its new networking policies deliver that.

"Firewalls are still the fundamental building block for security," said Sergio Loureiro, co-founder and CEO of SecludIT. "CloudSigma's network policies are very powerful and some of the most complete that I've used on an IaaS platform. Being able to control everything via the API is a big plus. On top of that, CloudSigma provides solutions to help customers manage the complexity of the network policies for big deployments and to avoid misconfigurations."

"This feature is very important for us because we can use policies to restrict communication within our private network," said Sébastien Ruel, President of QCCT. "We don't need to configure dedicated firewalls and this saves us money. Using network policies is fast, easy and granular. We also use this feature to add security to our exposed firewall servers. No other IaaS provider has such flexibility. Without CloudSigma we could not do business the way we do."

About CloudSigma

CloudSigma is a pure-cloud infrastructure-as-a-service (IaaS) provider that's enabling the digital industrial economy through its highly-available, flexible, enterprise-class hybrid cloud servers and cloud hosting solutions, both in Europe and the U.S. CloudSigma is the most customizable cloud provider on the market, giving customers full control over their cloud and eliminating restrictions on how users deploy their computing resources. With CloudSigma, customers can provision processing, storage, networks and other fundamental computing resources as they please, as well as extend private networks out of existing infrastructure and elastically into CloudSigma's IaaS cloud to create easy to manage and transparent hybrid cloud solutions. For more information, please visit www.CloudSigma.com or find the company on Twitter, Facebook, LinkedIn and Google+.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.