Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:55 PM
Connect Directly

Startup Offers Cloud-Based Security For The Cloud

'Halo' architecture from CloudPassage built for securing software-as-a-service offerings

A startup came out of stealth mode today with two free service offerings that secure servers for SaaS providers.

CloudPassage's new Halo architecture for securing cloud servers uses a lightweight, 2 MB daemon that runs on the server and connects them to the Halo's grid. "We provide the elastic cloud that does the heavy-lifting for all the daemons," says Carson Sweet, co-founder and CEO of CloudPassage. "Very little computing is done on the individual servers, which preserves the performance of the VMs themselves."

CloudPassage is basically offering a cloud service for the cloud. "We're securing the cloud versus spray-painting for the cloud," says Sweet, former principal solutions architect at RSA.

The company's target customer is the SaaS provider, or customers that use infrastructure services like Amazon's EC2. One of its first customers is social networking company Foursquare, which is based on EC2. David Birdsong, senior operations engineer for Foursquare, says the social network needed continuous firewall and vulnerability management.

CloudPassage's Halo Firewall centrally manages host-based firewalls, and handles real-time policy changes, updates, and other administrative tasks. "Amazon, for example, recommends that you use IP tables for the firewall in addition to the cloud provider's. But the problem is that there's no automated way to update policies, so you have to go out and touch many servers," Carson says. "[Halo Firewall] lets us deal with IP tables management ... on a very large scale."

And Halo SVM (Server Vulnerability Management) handles vulnerability scanning, configuration issues, and compliance. "It [does] scanning from insider the server using the daemon so you don't have to get around issues with the cloud not permitting people to do remote scans," Sweet says.

SaaS providers to date for the most part have had to roll their own security, which is labor-intensive to manage and difficult to lock down. "They had to use existing [security] products made for the enterprise, which doesn't work well in the cloud," says Sweet, a former RSA executive.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.