Connect with us

Hi, what are you looking for?


Cloud Security

Altor Networks Delivers New Security, Monitoring, and Compliance Suite for Virtual and Cloud Environments

With a fresh Series B funding round of $10 million, winner of this year’s “Most Innovative Company” at the RSA Conference, Altor Networks, has just introduced the latest version of its flagship security product for virtual data centers and clouds.

With a fresh Series B funding round of $10 million, winner of this year’s “Most Innovative Company” at the RSA Conference, Altor Networks, has just introduced the latest version of its flagship security product for virtual data centers and clouds.

Due to concerns about security and compliance within virtualized environments, CIOs, CISOs and IT Directors want to be certain that the measures for auditing and protecting virtualized servers are equivalent to what is in place for the physical network. By unplugging the physical connections in the virtualization process, many enterprises are opening themselves to vulnerabilities and “blind spots” in their infrastructures that they’re often unaware of.

In a March 2010 report, Gartner predicts that through 2012, 60 percent of virtualized servers will be less secure than the physical servers they replace.

The Redwood Shores, California based company aims to address these issues and concerns with the release of Altor 4.0, the next iteration of its virtual server security product. Altor 4.0 includes a high performance stateful firewall and on board intrusion detection with complete virtual network visibility and monitoring, automated security and compliance assessment and reporting. This release is specifically designed to address the security concerns innate to a virtualized or cloud environment.

Leveraging a hypervisor-based footprint, Altor 4.0 helps detect unauthorized changes to VMs in virtual and cloud environments, and can selectively quarantine the offending VMs while alerting IT about the policy violations. Altor 4.0 also inspects all traffic to and from each VM to eliminate blind spots, and enforces policies at the global, group, and per-VM level. With Altor 4.0, enterprises can granularly define security policies within zones of trust and precisely control how VMs within these zones can communicate with one another, ensuring isolation between and within trust levels and allowing for precise micro-segmentation.

“More and more companies are broadening their virtualization deployment across the IT infrastructure,” said Brett Waldman, senior research analyst for Software Appliances and Virtualization at IDC. “However, as companies virtualization solutions mature towards a private cloud scenario, they are finding existing networking and security solutions are being stressed to their limits. Simultaneously, VM density is increasing per server, putting more eggs into a single basket and making each server a mission-critical server. To address these challenges it is time for a new security paradigm purpose-built for virtualization.”

By leveraging Introspection to collect VM attributes, such as installed applications, and coupling it with Altor’s knowledge of the virtual network, Altor 4.0 creates a database of control points by which security policies and compliance rules can be defined. Altor makes this rich data available in intuitive user interfaces (UIs) that let administrators build the entire range of policies from corporate rules on global protocol handling to discrete regulation and compliance driven policies for how VMs should be configured. Built-in templates help jumpstart the process of building policies while tools assist in customizing the rulesets.

As far as performance, Altor 4.0 consumes only 3% of total system throughput at full capacity and the same hardware can support the same number of virtual machines with or without Altor installed. Performance can be attributed to the product being Hypervisor-based and “agent-less,” requiring no additional software to be installed in the virtual machine itself.

Advertisement. Scroll to continue reading.

Securing Virtual Servers

Pricing starts at $1,500 per CPU socket. Altor 4.0 will be available in early Q3’10 with a beta evaluation version currently available for download.

In addition to winning the award of “Most Innovative Company” at the 2010 RSA Conference, it was also recently named to Gartner’s “Cool Vendors in Data and Infrastructure Protection” list. Altor Networks was founded in 2007 by former execs and engineers from Check Point Software, Cisco and Oracle.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cloud Security

Cloud Disaster Recovery - Ingredients for a Recipe that Saves Money and Offers a Safe, More Secure Situation with Greater Accessibility