DZone
Cloud Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > Cloud Zone > CloudPassage Halo Now in Solution-Specific Packages

CloudPassage Halo Now in Solution-Specific Packages

Halo Protect, Halo Segment, Halo Detect offer cost-effective entry to workload security.

Tom Smith user avatar by
Tom Smith
CORE ·
Aug. 23, 16 · Cloud Zone · News
Like (3)
Save
Tweet
2.43K Views

Join the DZone community and get the full member experience.

Join For Free

CloudPassage today announced new packaged offerings for CloudPassage Halo to more cost-effectively address enterprises' need for workload security. Award-winning CloudPassage Halo is now comprised of three packages--Halo Protect, Halo Segment and Halo Detect--which can be purchased separately or in any combination to provide workload protection, microsegmentation, compromise detection, compliance, DevSecOps and AWS EC2 security. At one-third the full platform pricing, the new packages provide enterprises with a more cost-effective entry point to workload security and the flexibility to add fully integrated functionality as the need arises.

"While most of our customers eventually use the full range of security controls in CloudPassage Halo, many are initially looking for a more tailored solution to a specific security problem," said Jack Marsal, Product Marketing Director, CloudPassage. "These solution-focused packages allow enterprises to address their most acute security problem in the most cost-effective manner while giving them flexibility to add a broader range of security controls as their security needs evolve. Customers can evolve their security systems and posture at the pace which is right for them."

The new CloudPassage Halo packages are designed to meet specific security challenges:

Halo Protect reduces the software attack surface of workloads by ensuring proper security configuration, discovering software vulnerabilities, and controlling administrative access.

  • Configuration Security Monitoring (CSM) automatically monitors operating system and application configurations, processes, networks services, and privileges and compares them to the latest policies and standard industry benchmarks.
  • Software Vulnerability Assessment (SVA) automatically scans servers and cloud workloads to check for software vulnerabilities and to maintain continuous exposure awareness in the cloud and across all environments.
  • Server access management lets IT security managers monitor, audit and evaluate account access and privileges of all servers in any operating environment though a single online management console.

Halo Segment reduces the network attack surface through traffic discovery, host firewall orchestration, and multi-factor network authentication.

  • Traffic discovery and visualization lets IT security managers visualize the IP connection patterns and listening ports of workloads and servers, both between Halo-protected systems as well as connections to and from remote systems. This makes it easy to create dynamic firewall policies that prevent unwanted lateral movement of threats.
  • Workload firewall management lets IT security managers easily deploy and manage dynamic host firewall policies across all environments. Policies are based on the server tags, not the IP addresses, so changes to host firewall tables are made automatically as new servers are added, retired, or as IP addresses change.
  • Multi-factor network authentication lets IT security managers keep server ports and IP addresses hidden and secure while allowing temporary on-demand access for authorized users.

Halo Detect alerts you if any of your workloads have been compromised by monitoring whether important files have changed and by monitoring important server log files.

  • File Integrity Monitoring (FIM) protects cloud server integrity through constant monitoring for unauthorized or malicious changes to important system binaries or files.
  • Log-based Intrusion Detection (LIDS) continuously monitors key server log files for suspicious activity that could indicate misuse, misconfiguration or compromise.

Additional details specific to CloudPassage Halo solutions can be found at https://www.cloudpassage.com/solutions/.

security operating system

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • A Concise Guide to DevSecOps and Their Importance in CI/CD Pipeline
  • Observability Tools Help Catch Application Failures — But Automating the Observer Is Becoming Crucial
  • SRE From Theory to Practice: What's Difficult About On-Call?
  • Diving Deep into Smart Contracts

Comments

Cloud Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo