Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

CloudPassage Extends Cloud Security Solution to the Enterprise

CloudPassage, a San Francisco, California-based provider of tools to help companies secure their cloud infrastructure, this week launched Halo Enterprise, an offering purpose-built to protect heterogeneous cloud infrastructure environments at scale.

CloudPassage, a San Francisco, California-based provider of tools to help companies secure their cloud infrastructure, this week launched Halo Enterprise, an offering purpose-built to protect heterogeneous cloud infrastructure environments at scale.

The company, which emerged from stealth mode in January 2011, has extended its flagship Halo security-as-a-service security platform to support large enterprises that may have advanced security and compliance requirements.

Cloud PassageHalo is a scalable, portable security solution that provides immediate visibility and control over any cloud infrastructure environment, including private cloud, virtualized data centers, public cloud, virtual private or managed clouds, and even bare-metal servers, the company said.

The Enterprise edition of Halo brings enhanced deployment, management and integration support for software-defined and traditional data center infrastructure including VMware, Microsoft, OpenStack and others.

In order to use the cloud-based security service, customers must first install a lightweight agent on each server/instance, which then connects to the “Halo Grid”, a cloud-based security analytics engine that constantly evaluates thousands of cloud security and compliance data points per instance.

“By moving security analytics overhead from protected cloud instances to the elastic cloud-powered Halo Grid, Halo automates defense-in-depth with almost zero impact on protected cloud infrastructur,” the company explained.

Halo Enterprise includes new features not previously available in earlier versions of the product, some of which include:

SAML Sign-On Integration – Enables access to the Halo Portal for administrators and users through industry-standard SAML integration.

Integration with other security and operations tools including security information and event management (SIEM) systems, and systems management and orchestration platforms.

Advertisement. Scroll to continue reading.

Private Cloud & Datacenter Support – HTTP proxy-enabled Halo Daemons enable protection within private cloud and datacenter environments.

Nested Policy & Administrative Domains – Consolidate management of Halo accounts for different products or teams under a unified policy and billing structure.

Hierarchical policy and control management – Enables security organizations to centrally administer security and compliance for large numbers of applications distributed across complex, multi-cloud infrastructure environments.

“Within cloud and software-defined datacenter environments, it’s easy to forget that you’re creating, managing and cloning real systems, each with real vulnerabilities. Halo’s extensive automation addresses that problem,” Wendy Nather of 451 Research said in a statement.

“Large organizations have heterogeneous infrastructure environments, usually a dizzying mix of hardware, virtualized systems, and multiple cloud service providers. It’s also the norm in large enterprises to have thousands of systems across a complex maze of business units and subsidiaries,” said Carson Sweet, CloudPassage CEO and co-founder, who previously served as the Principal Solutions Architect at RSA’s financial industry practice.

“Legacy security tools and models were built for another time and are inflexible to the point of breaking cloud models. Halo was built to be flexible, lightweight and incredibly easy to deploy and scale, regardless of the environment,” Carson added.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.